Apache Solr's Docker images were updated some hours ago with a simple
remediation to avoid the Log4j 2 vulnerability[1] that many of you are
becoming aware of -- Log4j 2 CVE-2021-44228.
Just a "docker pull solr:tagVersionYouUse"  (e.g. 8.11 or whatever) will
update it for you.  The remediation in these updated images was simply
setting a Java system property to disable this misfeature of Log4j 2.  If
you have your own custom Docker image, you can easily do likewise, e.g. by
customizing the command to run the image to have an additional argument[2]
(a common remediation for other affected images).  To have confidence that
this was done correctly, log into your Solr admin screen and see the "Args"
section and look for
"-Dlog4j2.formatMsgNoLookups=true".

This is sufficient, but understand that vulnerability scanners will
continue to report that Solr's images are vulnerable because they can't
realistically know if Solr's configuration (e.g. via this system property)
defeats the problem.  It's possible the Solr project may retroactively
update these images in the future for this reason.

[1]
https://solr.apache.org/security.html#apache-solr-affected-by-apache-log4j-cve-2021-44228
[2] https://www.docker.com/blog/apache-log4j-2-cve-2021-44228/

~ David Smiley
Apache Lucene/Solr Search Developer
http://www.linkedin.com/in/davidwsmiley

Reply via email to