[ https://issues.apache.org/jira/browse/SOLR-17498?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=17889742#comment-17889742 ]
Gus Heck edited comment on SOLR-17498 at 10/15/24 4:16 PM: ----------------------------------------------------------- Solr 8.11.3 upgraded to jetty 9.4.53.v20231009 which fixes this CVE (see [https://solr.apache.org/docs/8_11_4/changes/Changes.html#v8.11.3.other_changes)] If you have evidence that the most recent 8.x (8.11.4) it is still vulnerable please supply it, but please be aware that 8.x is very nearly EOL, and even if you can demonstrate this vulnerability, it's unlikely there will be another 8x release to provide a fix. Lucene is currently trying to relase 10.x and Solr will follow soon. Upgrading to 9.x is likely your best option if you do find this CVE to still be present. Also please read [https://solr.apache.org/security.html] noting especially the very first paragraph :) was (Author: gus_heck): Solr 8.11.3 upgraded to jetty 9.4.53.v20231009 which fixes this CVE (see [https://solr.apache.org/docs/8_11_4/changes/Changes.html#v8.11.3.other_changes)] If you have evidence that the most recent 8.x (8.11.4) it is still vulnerable please supply it, but please be aware that 8.x is very nearly EOL, and even if you can demonstrate this vulnerability, it's unlikely there will be another 8x release to provide a fix. Lucene is currently trying to relase 10.x and Solr will follow soon. Upgrading to 9.x is likely your best option if you do find this CVE to still be present. Also please read [https://solr.apache.org/security.html] noting especially the very first line of the very first paragraph :) > Apache Solr 8.11.3 - CVE-2023-44487 > ----------------------------------- > > Key: SOLR-17498 > URL: https://issues.apache.org/jira/browse/SOLR-17498 > Project: Solr > Issue Type: Bug > Security Level: Public(Default Security Level. Issues are Public) > Affects Versions: 8.11.3 > Reporter: Nikhil > Priority: Critical > Labels: security > Fix For: 8.11.3 > > > The HTTP/2 protocol allows a denial of service (server resource consumption) > because request cancellation can reset many streams quickly, as exploited in > the wild in August through October 2023. -- This message was sent by Atlassian Jira (v8.20.10#820010) --------------------------------------------------------------------- To unsubscribe, e-mail: issues-unsubscr...@solr.apache.org For additional commands, e-mail: issues-h...@solr.apache.org