lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date: Tue, 27 Feb 2018 20:38:50 +0100
From: Moritz Muehlenhoff <jmm@...ian.org>
To: bugtraq@...urityfocus.com
Subject: [SECURITY] [DSA 4124-1] lucene-solr security update

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- -------------------------------------------------------------------------
Debian Security Advisory DSA-4124-1                   security@...ian.org
https://www.debian.org/security/                       Moritz Muehlenhoff
February 27, 2018                     https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : lucene-solr
CVE ID         : CVE-2017-3163 CVE-2017-12629

Two vulnerabilities have been found in Solr, a search server based on
Lucene, which could result in the execution of arbitrary code or
path traversal.

For the oldstable distribution (jessie), these problems have been fixed
in version 3.6.2+dfsg-5+deb8u1.

For the stable distribution (stretch), these problems have been fixed in
version 3.6.2+dfsg-10+deb9u1.

We recommend that you upgrade your lucene-solr packages.

For the detailed security status of lucene-solr please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/lucene-solr

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@...ts.debian.org
-----BEGIN PGP SIGNATURE-----
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=yr9U
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ