Debian alert DLA-1954-1 (lucene-solr)
From: | Markus Koschany <apo@debian.org> | |
To: | debian-lts-announce@lists.debian.org | |
Subject: | [SECURITY] [DLA 1954-1] lucene-solr security update | |
Date: | Thu, 10 Oct 2019 21:16:36 +0200 | |
Message-ID: | <009bb875-dbe0-7bc5-c981-c50bc81e69ed@debian.org> |
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 Package : lucene-solr Version : 3.6.2+dfsg-5+deb8u3 CVE ID : CVE-2019-0193 A security vulnerability was discovered in lucene-solr, an enterprise search server. The DataImportHandler, an optional but popular module to pull in data from databases and other sources, has a feature in which the whole DIH configuration can come from a request's "dataConfig" parameter. The debug mode of the DIH admin screen uses this to allow convenient debugging / development of a DIH config. Since a DIH config can contain scripts, this parameter is a security risk. Starting from now on, use of this parameter requires setting the Java System property "enable.dih.dataConfigParam" to true. For example this can be achieved with solr-tomcat by adding -Denable.dih.dataConfigParam=true to JAVA_OPTS in /etc/default/tomcat7. For Debian 8 "Jessie", this problem has been fixed in version 3.6.2+dfsg-5+deb8u3. We recommend that you upgrade your lucene-solr packages. Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS -----BEGIN PGP SIGNATURE----- iQKTBAEBCgB9FiEErPPQiO8y7e9qGoNf2a0UuVE7UeQFAl2fg5RfFIAAAAAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldEFD RjNEMDg4RUYzMkVERUY2QTFBODM1RkQ5QUQxNEI5NTEzQjUxRTQACgkQ2a0UuVE7 UeTVNxAAuEwe3PMnQduc9YzLmK3hduRsQzaj6BalWAbXehYqbMw4vukl+mf6D0Ss fbfIS8ajSTTuegRO/W6vlVLyKYbXPI4N5I5khn5zfru4ypJTojfCWGDHeHGpvfet 218MHQOXU+B0b0vJKVWb624MS8kHse88tKlAxvRBnZRS4WAnPrOhM9P+q/zOHikL BKwLwBMVYPloe/7+5JIKYOZikociq2gzaiFwUQILFK/SAkz9TrimBPquTNFmosWw 2vwxpc4LQ7KDLqRlGF0rxiePmUlecVcBfZnDT7ZpXBWq8dI6iQZk5Y77Uaqw03CR nBp287gvYFD4MvVxRzbd4bv1RuO/CEcvQSxrruwCvWhLzjO9BZdSl2NHNBHJtVfa n1ZgS1u6+1tC2AjVOvXMFP+7auvYYix50BLFZyEwPx9zRD1XEtgvGQPwuvqWG7fR RxyEursttbGIDGdaqahWD2F54UoT0b/khcFRvZZFTryk4z4uRC+npWqJhP+9sG46 i+Ej9ERfH46y+22jAcNGHttD3L7Q9fUHZJoWzWRL2OtNZtV38Z7lofI5lHnHIbu/ BfSdOXttAx6O2sJgKYKdbW4f1w60dtvbb08HTcC53NqB+5SzahkA21AV2aQfu8gt TecDB7Hi70/YSC3Rhb4ro2KLj95dVIF3BJRqzhuvILIqw3dCfBE= =zOae -----END PGP SIGNATURE-----