blob: 2c97f9d0c654b4df9aa96dada68ef05f7ab4104d [file] [log] [blame]
<?xml version="1.0" encoding="utf-8"?>
<feed xmlns="http://www.w3.org/2005/Atom"><title>Apache Lucene - news</title><link href="/" rel="alternate"></link><link href="/feeds/news.atom.xml" rel="self"></link><id>/</id><updated>2019-09-06T00:00:00+00:00</updated><subtitle></subtitle><subtitle></subtitle><entry><title>New mailing lists</title><link href="/" rel="alternate"></link><published>2019-09-06T00:00:00+00:00</published><updated>2019-09-06T00:00:00+00:00</updated><author><name>Lucene Developers</name></author><id>tag:None,2019-09-06:/</id><summary type="html">&lt;p&gt;The Lucene project has added two new announce mailing lists, &lt;code&gt;issues@lucene.apache.org&lt;/code&gt; and &lt;code&gt;builds@lucene.apache.org&lt;/code&gt;.
High-volume automated emails from our bug tracker, JIRA and GitHub will be moved from the &lt;code&gt;dev@&lt;/code&gt; list to &lt;code&gt;issues@&lt;/code&gt; and
automated emails from our Jenkins CI build servers will be moved …&lt;/p&gt;</summary><content type="html">&lt;p&gt;The Lucene project has added two new announce mailing lists, &lt;code&gt;issues@lucene.apache.org&lt;/code&gt; and &lt;code&gt;builds@lucene.apache.org&lt;/code&gt;.
High-volume automated emails from our bug tracker, JIRA and GitHub will be moved from the &lt;code&gt;dev@&lt;/code&gt; list to &lt;code&gt;issues@&lt;/code&gt; and
automated emails from our Jenkins CI build servers will be moved from the &lt;code&gt;dev@&lt;/code&gt; list to &lt;code&gt;builds@&lt;/code&gt;.&lt;/p&gt;
&lt;p&gt;This is an effort to reduce the sometimes overwhelming email volume on our main development mailing list and thus make it
easier for the community to follow important discussions by humans on the &lt;code&gt;dev@lucene.apache.org&lt;/code&gt; list.&lt;/p&gt;
&lt;p&gt;Everyone who wants to continue receiving these automated emails should sign up for one or both of the two new lists.
Sign-up instructions can be found on the &lt;a href="https://lucene.apache.org/core/discussion.html"&gt;Lucene-java&lt;/a&gt;
and &lt;a href="https://lucene.apache.org/solr/community.html#mailing-lists-irc"&gt;Solr&lt;/a&gt; web sites.&lt;/p&gt;</content><category term="news"></category></entry><entry><title>Please secure your Apache Solr servers since a zero-day exploit has been reported on a public mailing list</title><link href="/" rel="alternate"></link><published>2017-10-12T00:00:00+00:00</published><updated>2017-10-12T00:00:00+00:00</updated><author><name>Lucene Developers</name></author><id>tag:None,2017-10-12:/</id><summary type="html">&lt;p&gt;Please secure your Solr servers since a zero-day exploit has been
reported on a &lt;a href="https://s.apache.org/FJDl"&gt;public mailing list&lt;/a&gt;.
This has been assigned a public CVE (CVE-2017-12629) which we
will reference in future communication about resolution and mitigation
steps.&lt;/p&gt;
&lt;p&gt;Here is what we're recommending and what we're doing now:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;Until fixes are …&lt;/p&gt;&lt;/li&gt;&lt;/ul&gt;</summary><content type="html">&lt;p&gt;Please secure your Solr servers since a zero-day exploit has been
reported on a &lt;a href="https://s.apache.org/FJDl"&gt;public mailing list&lt;/a&gt;.
This has been assigned a public CVE (CVE-2017-12629) which we
will reference in future communication about resolution and mitigation
steps.&lt;/p&gt;
&lt;p&gt;Here is what we're recommending and what we're doing now:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;Until fixes are available, all Solr users are advised to restart their
Solr instances with the system parameter &lt;code&gt;-Ddisable.configEdit=true&lt;/code&gt;.
This will disallow any changes to be made to configurations via the
Config API. This is a key factor in this vulnerability, since it allows
GET requests to add the RunExecutableListener to the config. This is
sufficient to protect you from this type of attack, but means you cannot
use the edit capabilities of the Config API until the other fixes
described below are in place. Users are also advised to remap
the XML Query Parser to another parser to mitigate the XXE
vulnerability. For example, adding the following to the solrconfig.xml
file maps the &lt;code&gt;xmlparser&lt;/code&gt; to the &lt;code&gt;edismax&lt;/code&gt; parser:
&lt;code&gt;&amp;lt;queryParser name="xmlparser" class="solr.ExtendedDismaxQParserPlugin"/&amp;gt;&lt;/code&gt;.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;A new release of Lucene/Solr was in the vote phase, but we have now
pulled it back to be able to address these issues in the upcoming 7.1
release. We will also determine mitigation steps for users on earlier
versions, which may include a 6.6.2 release for users still on 6.x.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;The RunExecutableListener will be removed in 7.1. It was previously
used by Solr for index replication but has been replaced and is no
longer needed.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;The XML Parser will be fixed and the fixes will be included in the 7.1
release.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;The 7.1 release was already slated to include a change to disable the
&lt;code&gt;stream.body&lt;/code&gt; parameter by default, which will further help protect
systems.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;</content><category term="news"></category></entry><entry><title>Recommendation to update Apache POI in Apache Solr 4.8.0, 4.8.1, and 4.9.0 installations</title><link href="/" rel="alternate"></link><published>2014-08-18T00:00:00+00:00</published><updated>2014-08-18T00:00:00+00:00</updated><author><name>Lucene Developers</name></author><id>tag:None,2014-08-18:/</id><summary type="html">&lt;p&gt;Apache Solr versions 4.8.0, 4.8.1, 4.9.0 bundle Apache POI 3.10-beta2 with its binary release tarball.
This version (and all previous ones) of Apache POI are vulnerable to the following issues:
CVE-2014-3529 &lt;em&gt;(XML External Entity (XXE) problem in Apache POI's OpenXML parser)&lt;/em&gt;,
CVE-2014-3574 &lt;em&gt;(XML …&lt;/em&gt;&lt;/p&gt;</summary><content type="html">&lt;p&gt;Apache Solr versions 4.8.0, 4.8.1, 4.9.0 bundle Apache POI 3.10-beta2 with its binary release tarball.
This version (and all previous ones) of Apache POI are vulnerable to the following issues:
CVE-2014-3529 &lt;em&gt;(XML External Entity (XXE) problem in Apache POI's OpenXML parser)&lt;/em&gt;,
CVE-2014-3574 &lt;em&gt;(XML Entity Expansion (XEE) problem in Apache POI's OpenXML parser)&lt;/em&gt;.&lt;/p&gt;
&lt;p&gt;The Apache POI PMC released a bugfix version (3.10.1) today.&lt;/p&gt;
&lt;p&gt;Solr users are affected by these issues, if they enable the "Apache Solr Content Extraction Library (Solr Cell)"
contrib module from the folder "contrib/extraction" of the release tarball.&lt;/p&gt;
&lt;p&gt;Users of Apache Solr are strongly advised to keep the module disabled if they don't use it.
Alternatively, users of Apache Solr 4.8.0, 4.8.1, or 4.9.0 can update the affected libraries by
replacing the vulnerable JAR files in the distribution folder. Users of previous versions have
to update their Solr release first, patching older versions is impossible.&lt;/p&gt;
&lt;p&gt;For detailed instructions, see &lt;a href="/solr/solrnews.html#18-august-2014-recommendation-to-update-apache-poi-in-apache-solr-480-481-and-490-installations"&gt;Solr's News&lt;/a&gt;&lt;/p&gt;</content><category term="news"></category></entry><entry><title>Open Relevance sub-project closed</title><link href="/" rel="alternate"></link><published>2014-06-11T00:00:00+00:00</published><updated>2014-06-11T00:00:00+00:00</updated><author><name>Lucene Developers</name></author><id>tag:None,2014-06-11:/</id><content type="html">&lt;p&gt;The Apache Lucene Project Management Committee decided in a vote,
that the Apache Lucene sub-project "Open Relevance" will be discontinued. There was only modest activity during the last
years and the project made no releases. Thank you to all committers for their support in this project!&lt;/p&gt;</content><category term="news"></category></entry><entry><title>Apache Lucene 4.8 and Apache Solr 4.8 will require Java 7</title><link href="/" rel="alternate"></link><published>2014-03-12T00:00:00+00:00</published><updated>2014-03-12T00:00:00+00:00</updated><author><name>Lucene Developers</name></author><id>tag:None,2014-03-12:/</id><summary type="html">&lt;p&gt;The Apache Lucene/Solr committers decided with a large majority on the vote to require &lt;strong&gt;Java 7&lt;/strong&gt; for the next minor release of Apache Lucene and Apache Solr (version 4.8)!&lt;/p&gt;
&lt;p&gt;The next release will also contain some improvements for Java 7:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;Better file handling (especially on Windows) in the …&lt;/p&gt;&lt;/li&gt;&lt;/ul&gt;</summary><content type="html">&lt;p&gt;The Apache Lucene/Solr committers decided with a large majority on the vote to require &lt;strong&gt;Java 7&lt;/strong&gt; for the next minor release of Apache Lucene and Apache Solr (version 4.8)!&lt;/p&gt;
&lt;p&gt;The next release will also contain some improvements for Java 7:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;Better file handling (especially on Windows) in the directory implementations. Files can now be deleted on windows, although the index is still open - like it was always possible on Unix environments (delete on last close semantics).&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Speed improvements in sorting comparators: Sorting now uses Java 7's own comparators for integer and long sorts, which are highly optimized by the Hotspot VM.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;If you want to stay up-to-date with Lucene and Solr, you should upgrade your infrastructure to Java 7.
Please be aware that you must use at least use Java 7u1.
The recommended version at the moment is Java 7u25. Later versions like 7u40, 7u45,... have a bug causing index corrumption.
Ideally use the Java 7u60 prerelease, which has fixed this bug. Once 7u60 is out, this will be the recommended version.
In addition, there is no more Oracle/BEA JRockit available for Java 7, use the official Oracle Java 7.
JRockit was never working correctly with Lucene/Solr (causing index corrumption), so this should not be an issue.
Please also review our list of JVM bugs: &lt;a href="http://wiki.apache.org/lucene-java/JavaBugs"&gt;http://wiki.apache.org/lucene-java/JavaBugs&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;EDIT (as of 15 April 2014):&lt;/em&gt; The recently released Java 7u55 fixes the above bug causing index corrumption.
This version is now the recommended version for running Apache Lucene and Solr.&lt;/p&gt;</content><category term="news"></category></entry></feed>