+1 for fixing it in these versions and doing quick releases. Looks good to me.

Best,
Jingsong

On Mon, Dec 13, 2021 at 2:18 PM Becket Qin <becket....@gmail.com> wrote:
>
> +1. The solution sounds good to me. There have been a lot of inquiries
> about how to react to this.
>
> Thanks,
>
> Jiangjie (Becket) Qin
>
> On Mon, Dec 13, 2021 at 12:40 PM Prasanna kumar <
> prasannakumarram...@gmail.com> wrote:
>
> > 1+ for making Updates for 1.12.5 .
> > We are looking for fix in 1.12 version.
> > Please notify once the fix is done.
> >
> >
> > On Mon, Dec 13, 2021 at 9:45 AM Leonard Xu <xbjt...@gmail.com> wrote:
> >
> > > +1 for the quick release and the special vote period 24h.
> > >
> > > > 2021年12月13日 上午11:49,Dian Fu <dian0511...@gmail.com> 写道:
> > > >
> > > > +1 for the proposal and creating a quick release.
> > > >
> > > > Regards,
> > > > Dian
> > > >
> > > >
> > > > On Mon, Dec 13, 2021 at 11:15 AM Kyle Bendickson <k...@tabular.io>
> > > wrote:
> > > >
> > > >> +1 to doing a release for this widely publicized vulnerability.
> > > >>
> > > >> In my experience, users will often update to the latest minor patch
> > > version
> > > >> without much fuss. Plus, users have also likely heard about this and
> > > will
> > > >> appreciate a simple fix (updating their version where possible).
> > > >>
> > > >> The work-around will need to still be noted for users who can’t
> > upgrade
> > > for
> > > >> whatever reason (EMR hasn’t caught up, etc).
> > > >>
> > > >> I also agree with your assessment to apply a patch on each of those
> > > >> previous versions with only the log4j commit, so that they don’t need
> > > to be
> > > >> as rigorously tested.
> > > >>
> > > >> Best,
> > > >> Kyle (GitHub @kbendick)
> > > >>
> > > >> On Sun, Dec 12, 2021 at 2:23 PM Stephan Ewen <se...@apache.org>
> > wrote:
> > > >>
> > > >>> Hi all!
> > > >>>
> > > >>> Without doubt, you heard about the log4j vulnerability [1].
> > > >>>
> > > >>> There is an advisory blog post on how to mitigate this in Apache
> > Flink
> > > >> [2],
> > > >>> which involves setting a config option and restarting the processes.
> > > That
> > > >>> is fortunately a relatively simple fix.
> > > >>>
> > > >>> Despite this workaround, I think we should do an immediate release
> > with
> > > >> the
> > > >>> updated dependency. Meaning not waiting for the next bug fix releases
> > > >>> coming in a few weeks, but releasing asap.
> > > >>> The mood I perceive in the industry is pretty much panicky over this,
> > > >> and I
> > > >>> expect we will see many requests for a patched release and many
> > > >> discussions
> > > >>> why the workaround alone would not be enough due to certain
> > guidelines.
> > > >>>
> > > >>> I suggest that we preempt those discussions and create releases the
> > > >>> following way:
> > > >>>
> > > >>>  - we take the latest already released versions from each release
> > > >> branch:
> > > >>>     ==> 1.14.0, 1.13.3, 1.12.5, 1.11.4
> > > >>>  - we add a single commit to those that just updates the log4j
> > > >> dependency
> > > >>>  - we release those as 1.14.1, 1.13.4, 1.12.6, 1.11.5, etc.
> > > >>>  - that way we don't need to do functional release tests, because the
> > > >>> released code is identical to the previous release, except for the
> > > log4j
> > > >>> dependency
> > > >>>  - we can then continue the work on the upcoming bugfix releases as
> > > >>> planned, without high pressure
> > > >>>
> > > >>> I would suggest creating those RCs immediately and release them with
> > a
> > > >>> special voting period (24h or so).
> > > >>>
> > > >>> WDYT?
> > > >>>
> > > >>> Best,
> > > >>> Stephan
> > > >>>
> > > >>> [1] https://nvd.nist.gov/vuln/detail/CVE-2021-44228
> > > >>> [2] https://flink.apache.org/2021/12/10/log4j-cve.html
> > > >>>
> > > >>
> > >
> > >
> >



-- 
Best, Jingsong Lee

Reply via email to