Commit Graph

18 Commits

Author SHA1 Message Date
sthen
250b9a2e64 update to solr-8.4.1 2020-01-15 16:45:13 +00:00
sthen
b9a3611c2f update to solr-8.4.0 2019-12-30 13:55:48 +00:00
sthen
39a09181d1 update to solr-8.3.1 2019-12-03 14:27:58 +00:00
sthen
153ed2619b update to solr-8.3.0 2019-11-03 19:09:46 +00:00
sthen
f4fd274a89 update to solr-8.2.0 2019-08-01 12:40:52 +00:00
kurt
7705a5ad0b Revision bump all java ports for the jre package removal and java.port.mk
changes.
2019-06-11 00:38:33 +00:00
sthen
9c6e9626b9 s/PERMIT_PACKAGE_CDROM/PERMIT_PACKAGE/ and some light whitespace tidying
in ports which I maintain
2019-06-03 16:06:50 +00:00
sthen
917d0473b9 update to solr-8.1.1 2019-05-29 21:28:59 +00:00
sthen
60bb36eb70 update to solr-8.1.0 2019-05-15 08:18:34 +00:00
sthen
bcda23c550 update to solr-8.0.0 2019-03-21 13:15:35 +00:00
sthen
eb69ece243 update to solr-7.7.0 2019-02-11 11:31:54 +00:00
sthen
8740369ab4 update to solr-7.6.0 2018-12-30 21:58:00 +00:00
sthen
a6795e69da update to solr-7.5.0, take maintainer 2018-10-04 20:43:02 +00:00
sthen
f5121b352f bump to ensure -current version is > -stable version for future updates
(plist/pkg_add changes mean the -current plist couldn't be copied directly
to -stable)
2018-07-04 19:20:52 +00:00
sthen
848214b9c2 update to solr-7.4.0 2018-06-23 14:55:03 +00:00
sthen
ebb8f3ba27 update to solr-7.3.1, if you aren't restricting to local-only traffic
then you probably want this ..

CVE-2018-8010: XXE vulnerability due to Apache Solr configset upload
2018-05-24 10:24:37 +00:00
sthen
5f0f3115d0 security update to solr-7.3.0
CVE-2018-1308: XXE attack through Apache Solr's DIH's dataConfig request parameter

This vulnerability relates to an XML external entity expansion (XXE) in the
`&dataConfig=<inlinexml>` parameter of Solr's DataImportHandler. It can be
used as XXE using file/ftp/http protocols in order to read arbitrary local
files from the Solr server or the internal network. See [1] for more details.

Mitigation:
Users are advised to upgrade to either Solr 6.6.3 or Solr 7.3.0 releases both
of which address the vulnerability. Once upgrade is complete, no other steps
are required. Those releases disable external entities in anonymous XML files
passed through this request parameter.

If users are unable to upgrade to Solr 6.6.3 or Solr 7.3.0 then they are
advised to disable data import handler in their solrconfig.xml file and
restart their Solr instances. Alternatively, if Solr instances are only used
locally without access to public internet, the vulnerability cannot be used
directly, so it may not be required to update, and instead reverse proxies or
Solr client applications should be guarded to not allow end users to inject
`dataConfig` request parameters.
2018-04-10 12:22:39 +00:00
sthen
70fc0e3ef9 import ports/textproc/solr, ok landry@
Solr is a standalone enterprise search server with a REST-like API
supporting JSON, XML, CSV or binary over HTTP for document addition
and searches.
2018-03-06 11:06:21 +00:00