-
Notifications
You must be signed in to change notification settings - Fork 33
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
CVE-2021-44228 Log4Shell: log4j Remote code execution #357
Comments
The CVE mentions that java 8 protects against remote code execution. Solr 7.7 seems to be using java 11, so maybe that one is fine ? https://github.com/docker-solr/docker-solr/blob/86159575c4b6da2010ae9ee003bf5a6de31157cb/7.7/Dockerfile |
@bnagykekesi Java version is only relevant for specific attack vector |
After some searching with @Schnitzel , we found the following versions of
This patch in #358 protects solr versions Solr Elasticsearch is running:
This patch in #358 protects elasticsearch versions |
In order to protect our infrastructure faster the amazee.io security team decided to roll out the same mitigation as in the #358 patch as env variables to all running pods, we achieved this: solr:
elasticsearch
Like the patch this will only work for Solr 7 and Solr 8. We don't have any mitigations for Solr 6 currently. |
just for completeness, in case somebody uses opendistro installed from the documentation on how to install lagoon on an elasticsearch cluster (https://docs.lagoon.sh/lagoon/using-lagoon-advanced/installing-lagoon-into-existing-kubernetes-cluster), this diff: shows how to add the mitigation to the opendistro pods. |
A Lagoon-images release will come out in the next couple of hours to add these variables |
Solr uses log4j: https://solr.apache.org/guide/6_6/configuring-logging.html
So we should check if our solr base images are affected by CVE-2021-44228 and if yes release update images asap.
Plus also check if any other base images include log4j
The text was updated successfully, but these errors were encountered: