[ 
https://issues.apache.org/jira/browse/SOLR-15355?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=17431354#comment-17431354
 ] 

Kevin Risden commented on SOLR-15355:
-------------------------------------

{quote} Any idea what might be up with this Kevin?{quote}

Ummm no idea why this would break [~dsmiley]. My first guess is the AWS library 
upgrade behind the scenes? Another guess is are you using the s3guard stuff and 
if that state could be corrupt? Another idea is if you are using consistent s3 
(I don't know if that is just GA for everyone now or still opt in - S3 used to 
be eventually consistent)

{quote}Do you think upgrading to 3.3.1 might be straight-forward; perhaps that 
could fix it?{quote}

This might I know there are always improvements to the AWS s3 code behind each 
release. I don't think it would be a major upgrade. The biggest issue is some 
of the HDFS tests and some of the copied classes to make Solr thread leak check 
happy.

> CVE-2020-9492: Upgrade hadoop-hdfs-client to 3.2.2
> --------------------------------------------------
>
>                 Key: SOLR-15355
>                 URL: https://issues.apache.org/jira/browse/SOLR-15355
>             Project: Solr
>          Issue Type: Bug
>          Components: hdfs, security
>    Affects Versions: 8.6, 8.6.2
>            Reporter: Nazerke Seidan
>            Priority: Major
>             Fix For: 8.10
>
>          Time Spent: 1.5h
>  Remaining Estimate: 0h
>
> CVE-2020-9492 vuln. issue is found in 8x component 
> maven:org.apache.hadoop:hadoop-hdfs-client (version3.2.0) It seems with the 
> version 3.2.0 hdfs client might send authorization header to remote url 
> without verification. 
> ([https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9492])



--
This message was sent by Atlassian Jira
(v8.3.4#803005)

---------------------------------------------------------------------
To unsubscribe, e-mail: issues-unsubscr...@solr.apache.org
For additional commands, e-mail: issues-h...@solr.apache.org

Reply via email to