[GitHub] [solr-operator] HoustonPutman commented on issue #384: How to apply mitigation for CVE-2021-44228

2021-12-14 Thread GitBox
HoustonPutman commented on issue #384: URL: https://github.com/apache/solr-operator/issues/384#issuecomment-993836456 It should be mentioned that the official Docker images ([_/solr](https://hub.docker.com/_/solr)) have been updated to have this fix included by default. If you have `imageP

[GitHub] [solr-operator] HoustonPutman commented on issue #384: How to apply mitigation for CVE-2021-44228

2021-12-14 Thread GitBox
HoustonPutman commented on issue #384: URL: https://github.com/apache/solr-operator/issues/384#issuecomment-993640127 @nosvalds from here: https://github.com/apache/solr-site/pull/55, the consensus is that the Solr Prometheus Exporter is not actually susceptible to this CVE -- This is a

[GitHub] [solr-operator] HoustonPutman commented on issue #384: How to apply mitigation for CVE-2021-44228

2021-12-10 Thread GitBox
HoustonPutman commented on issue #384: URL: https://github.com/apache/solr-operator/issues/384#issuecomment-991105023 Pinning this, so that others can see the mitigation step if they come looking for information. -- This is an automated message from the Apache Git Service. To respond to

[GitHub] [solr-operator] HoustonPutman commented on issue #384: How to apply mitigation for CVE-2021-44228

2021-12-10 Thread GitBox
HoustonPutman commented on issue #384: URL: https://github.com/apache/solr-operator/issues/384#issuecomment-991101468 That is the correct way to mitigate the CVE. And you are correct, it's a good option to have by default. -- This is an automated message from the Apache Git Service