Our maintenance/support contract ended, we're on LT 7.13
Are we able to patch to 7.13.7 without an active support license?
The plan was to migrate to the cloud service, which is why it lapsed.
Hello @Jeff McMurray ! Welcome to the Atlassian Community!
To update your version of Confluence, even to the 7.13.7 version, you'll need an active license/maintenance agreement.
You actually need to be current for your migration as well.
One solution I see is getting a trial Data Center license. Details are here: https://support.atlassian.com/migration/docs/migrate-to-cloud-with-an-expired-server-license/
Current as in an active license, or current as in the latest patch?
You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.
Current as in active license/maintenance agreement.
You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.
Ok, thanks, it looks like the trial and migrate will work.
Thanks for the help.
You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.
Wait, so does this mean that there is no fix for CVE-2022-26134 if you don't currently have support/maintenance? Our maintenance is also lapsed and we are on confluence server 7.4.3. This doesn't seem acceptable for Atlassian to leave those without maintenance exposed to a critical remote code execution vulnerability currently being exploited by threat actors. Is everyone in this boat rushing out to purchase thousands of dollars in maintenance just so they dont get hacked?
You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.
Yeah, pretty ridiculous. It seems like it should be a patch outside of maintenance contracts.
You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.
Thanks Rodolfo, We have already implemented those changes, however Atlassian lists it specifically as a TEMPORARY (in bold) workaround, which is the cause of my concern. I would feel better about it if they didn't emphasize that it should be temporary. I guess to that response, my question is... Are we safe to implement this "temporary workaround" for a few years, or does it still leave some vulnerabilities?
You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.
Online forums and learning are now in one easy-to-use experience.
By continuing, you accept the updated Community Terms of Use and acknowledge the Privacy Policy. Your public name, photo, and achievements may be publicly visible and available in search engines.
You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.