-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 - ----------------------------------------------------------------------- Debian LTS Advisory DLA-2327-1 debian-...@lists.debian.org https://www.debian.org/lts/security/ Markus Koschany August 15, 2020 htps://wiki.debian.org/LTS - -------------------------------------------------------------------------
Package : lucene-solr Version : 3.6.2+dfsg-10+deb9u3 CVE ID : CVE-2019-0193 A security vulnerability was discovered in lucene-solr, an enterprise search server. The DataImportHandler, an optional but popular module to pull in data from databases and other sources, has a feature in which the whole DIH configuration can come from a request's "dataConfig" parameter. The debug mode of the DIH admin screen uses this to allow convenient debugging / development of a DIH config. Since a DIH config can contain scripts, this parameter is a security risk. Starting from now on, use of this parameter requires setting the Java System property "enable.dih.dataConfigParam" to true. For example this can be achieved with solr-tomcat by adding -Denable.dih.dataConfigParam=true to JAVA_OPTS in /etc/default/tomcat8. For Debian 9 stretch, this problem has been fixed in version 3.6.2+dfsg-10+deb9u3. We recommend that you upgrade your lucene-solr packages. For the detailed security status of lucene-solr please refer to its security tracker page at: https://security-tracker.debian.org/tracker/lucene-solr Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS -----BEGIN PGP SIGNATURE----- iQKTBAEBCgB9FiEErPPQiO8y7e9qGoNf2a0UuVE7UeQFAl84eJdfFIAAAAAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldEFD RjNEMDg4RUYzMkVERUY2QTFBODM1RkQ5QUQxNEI5NTEzQjUxRTQACgkQ2a0UuVE7 UeQjABAAo3wHwe9idOyNv1JPZhrOj3bMeIm/GioWdz5EuVTaV/l6XKVDMxFS/DRW 13FZ6LH2A4lywj20BrUErTK8f1KqPQcJ4xbd5dkl9TSWv/xKmtPVDcEsT3oQXkI1 I2NjVcgp4jrTOaSHJjCZAj8uq0dV+/XUXbaVfRp84JEc0pXBQtVk/65TR3Qyu2Z1 4pSC62y2ogCfqwmJLof3xSDhYHNpFiGt5U301SsFd1p8ttYm9l1XaySC7kMnF3s/ pAknt39JzH5mzZ1pMTlq/zwSjzO6oHMG3I86TOIcch4lVqOt5mlvbQAnHnkZTqYy kwJ2bTbTgKW8XLadIcWP6FsGDx5w1rRAR3dba47fdzH4+7p2E4QSePoz9qwFi7vf rbpIUzL94SzmufVM/SIg9E0tO21vmArW/AgS0+X01dpGU/Y/T59nohlk37wIJ6au yqEjgO5CtKTeDYnLl7tMaGVCF7ZvCcwubEbkdZn1h7G90dJmyRJZcHVEzI3FKGk3 bxMbLd+GKjelo4WJmvzMhAf0wfxKqP5UTGfTv95fSHDbtC/ZgfJxfcgQFVz/VrN0 NI5CckgSMvlNOijtEv1alSbpbo1gXYuqOVy9MOjGWA1GfusJOJJnNxb0SGbm+rJi qW9engdXmFDjrO/biSgk0QoykDWdbEqitmSRWbTrz3gIjSySFTs= =5Rgr -----END PGP SIGNATURE-----