[ 
https://issues.apache.org/jira/browse/SOLR-17498?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=17889742#comment-17889742
 ] 

Gus Heck edited comment on SOLR-17498 at 10/15/24 4:16 PM:
-----------------------------------------------------------

Solr 8.11.3 upgraded to jetty 9.4.53.v20231009  which fixes this CVE  (see 
[https://solr.apache.org/docs/8_11_4/changes/Changes.html#v8.11.3.other_changes)]

If you have evidence that the most recent 8.x (8.11.4) it is still vulnerable 
please supply it, but please be aware that 8.x is very nearly EOL, and even if 
you can demonstrate this vulnerability, it's unlikely there will be another 8x 
release to provide a fix. Lucene is currently trying to relase 10.x and Solr 
will follow soon.

Upgrading to 9.x is likely your best option if you do find this CVE to still be 
present.

Also please read [https://solr.apache.org/security.html] noting especially the 
very first paragraph :)


was (Author: gus_heck):
Solr 8.11.3 upgraded to jetty 9.4.53.v20231009  which fixes this CVE  (see 
[https://solr.apache.org/docs/8_11_4/changes/Changes.html#v8.11.3.other_changes)]

If you have evidence that the most recent 8.x (8.11.4) it is still vulnerable 
please supply it, but please be aware that 8.x is very nearly EOL, and even if 
you can demonstrate this vulnerability, it's unlikely there will be another 8x 
release to provide a fix. Lucene is currently trying to relase 10.x and Solr 
will follow soon.

Upgrading to 9.x is likely your best option if you do find this CVE to still be 
present.

Also please read [https://solr.apache.org/security.html] noting especially the 
very first line of the very first paragraph :)

> Apache Solr 8.11.3 - CVE-2023-44487
> -----------------------------------
>
>                 Key: SOLR-17498
>                 URL: https://issues.apache.org/jira/browse/SOLR-17498
>             Project: Solr
>          Issue Type: Bug
>      Security Level: Public(Default Security Level. Issues are Public) 
>    Affects Versions: 8.11.3
>            Reporter: Nikhil
>            Priority: Critical
>              Labels: security
>             Fix For: 8.11.3
>
>
> The HTTP/2 protocol allows a denial of service (server resource consumption) 
> because request cancellation can reset many streams quickly, as exploited in 
> the wild in August through October 2023.



--
This message was sent by Atlassian Jira
(v8.20.10#820010)

---------------------------------------------------------------------
To unsubscribe, e-mail: issues-unsubscr...@solr.apache.org
For additional commands, e-mail: issues-h...@solr.apache.org

Reply via email to