Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:deb/debian/lucene-solr@3.6.2%2Bdfsg-11?distro=trixie
purl pkg:deb/debian/lucene-solr@3.6.2%2Bdfsg-11?distro=trixie
Vulnerabilities affecting this package (0)
Vulnerability Summary Fixed by
This package is not known to be affected by vulnerabilities.
Vulnerabilities fixed by this package (2)
Vulnerability Summary Aliases
VCID-ke61-vddr-4udk When using the Index Replication feature, Apache Solr nodes can pull index files from a master/leader node using an HTTP API which accepts a file name. However, Solr before 5.5.4 and 6.x before 6.4.1 did not validate the file name, hence it was possible to craft a special request involving path traversal, leaving any file readable to the Solr server process exposed. Solr servers protected and restricted by firewall rules and/or authentication would not be at risk since only trusted clients and users would gain direct HTTP access. CVE-2017-3163
GHSA-387v-84cv-9qmc
VCID-rys3-pnnk-a7e4 Remote code execution occurs in Apache Solr before 7.1 with Apache Lucene before 7.1 by exploiting XXE in conjunction with use of a Config API add-listener command to reach the RunExecutableListener class. Elasticsearch, although it uses Lucene, is NOT vulnerable to this. Note that the XML external entity expansion vulnerability occurs in the XML Query Parser which is available, by default, for any query request with parameters deftype=xmlparser and can be exploited to upload malicious data to the /upload request handler or as Blind XXE using ftp wrapper in order to read arbitrary local files from the Solr server. Note also that the second vulnerability relates to remote code execution using the RunExecutableListener available on all affected versions of Solr. CVE-2017-12629
GHSA-mh7g-99w9-xpjm

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-16T12:49:24.450391+00:00 Debian Importer Fixing VCID-ke61-vddr-4udk https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:32:16.003308+00:00 Debian Importer Fixing VCID-rys3-pnnk-a7e4 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-13T08:47:56.047171+00:00 Debian Importer Fixing VCID-ke61-vddr-4udk https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:21:32.351833+00:00 Debian Importer Fixing VCID-rys3-pnnk-a7e4 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-03T07:45:22.910922+00:00 Debian Importer Fixing VCID-ke61-vddr-4udk https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:45:22.872297+00:00 Debian Importer Fixing VCID-rys3-pnnk-a7e4 https://security-tracker.debian.org/tracker/data/json 38.1.0