+1

I didn't think this was necessary when I published the blog post on Friday,
but this has made higher waves than I expected over the weekend.



On Mon, Dec 13, 2021 at 8:23 AM Yuan Mei <yuanmei.w...@gmail.com> wrote:

> +1 for quick release.
>
> On Mon, Dec 13, 2021 at 2:55 PM Martijn Visser <mart...@ververica.com>
> wrote:
>
> > +1 to address the issue like this
> >
> > On Mon, 13 Dec 2021 at 07:46, Jingsong Li <jingsongl...@gmail.com>
> wrote:
> >
> > > +1 for fixing it in these versions and doing quick releases. Looks good
> > to
> > > me.
> > >
> > > Best,
> > > Jingsong
> > >
> > > On Mon, Dec 13, 2021 at 2:18 PM Becket Qin <becket....@gmail.com>
> wrote:
> > > >
> > > > +1. The solution sounds good to me. There have been a lot of
> inquiries
> > > > about how to react to this.
> > > >
> > > > Thanks,
> > > >
> > > > Jiangjie (Becket) Qin
> > > >
> > > > On Mon, Dec 13, 2021 at 12:40 PM Prasanna kumar <
> > > > prasannakumarram...@gmail.com> wrote:
> > > >
> > > > > 1+ for making Updates for 1.12.5 .
> > > > > We are looking for fix in 1.12 version.
> > > > > Please notify once the fix is done.
> > > > >
> > > > >
> > > > > On Mon, Dec 13, 2021 at 9:45 AM Leonard Xu <xbjt...@gmail.com>
> > wrote:
> > > > >
> > > > > > +1 for the quick release and the special vote period 24h.
> > > > > >
> > > > > > > 2021年12月13日 上午11:49,Dian Fu <dian0511...@gmail.com> 写道:
> > > > > > >
> > > > > > > +1 for the proposal and creating a quick release.
> > > > > > >
> > > > > > > Regards,
> > > > > > > Dian
> > > > > > >
> > > > > > >
> > > > > > > On Mon, Dec 13, 2021 at 11:15 AM Kyle Bendickson <
> > k...@tabular.io>
> > > > > > wrote:
> > > > > > >
> > > > > > >> +1 to doing a release for this widely publicized
> vulnerability.
> > > > > > >>
> > > > > > >> In my experience, users will often update to the latest minor
> > > patch
> > > > > > version
> > > > > > >> without much fuss. Plus, users have also likely heard about
> this
> > > and
> > > > > > will
> > > > > > >> appreciate a simple fix (updating their version where
> possible).
> > > > > > >>
> > > > > > >> The work-around will need to still be noted for users who
> can’t
> > > > > upgrade
> > > > > > for
> > > > > > >> whatever reason (EMR hasn’t caught up, etc).
> > > > > > >>
> > > > > > >> I also agree with your assessment to apply a patch on each of
> > > those
> > > > > > >> previous versions with only the log4j commit, so that they
> don’t
> > > need
> > > > > > to be
> > > > > > >> as rigorously tested.
> > > > > > >>
> > > > > > >> Best,
> > > > > > >> Kyle (GitHub @kbendick)
> > > > > > >>
> > > > > > >> On Sun, Dec 12, 2021 at 2:23 PM Stephan Ewen <
> se...@apache.org>
> > > > > wrote:
> > > > > > >>
> > > > > > >>> Hi all!
> > > > > > >>>
> > > > > > >>> Without doubt, you heard about the log4j vulnerability [1].
> > > > > > >>>
> > > > > > >>> There is an advisory blog post on how to mitigate this in
> > Apache
> > > > > Flink
> > > > > > >> [2],
> > > > > > >>> which involves setting a config option and restarting the
> > > processes.
> > > > > > That
> > > > > > >>> is fortunately a relatively simple fix.
> > > > > > >>>
> > > > > > >>> Despite this workaround, I think we should do an immediate
> > > release
> > > > > with
> > > > > > >> the
> > > > > > >>> updated dependency. Meaning not waiting for the next bug fix
> > > releases
> > > > > > >>> coming in a few weeks, but releasing asap.
> > > > > > >>> The mood I perceive in the industry is pretty much panicky
> over
> > > this,
> > > > > > >> and I
> > > > > > >>> expect we will see many requests for a patched release and
> many
> > > > > > >> discussions
> > > > > > >>> why the workaround alone would not be enough due to certain
> > > > > guidelines.
> > > > > > >>>
> > > > > > >>> I suggest that we preempt those discussions and create
> releases
> > > the
> > > > > > >>> following way:
> > > > > > >>>
> > > > > > >>>  - we take the latest already released versions from each
> > release
> > > > > > >> branch:
> > > > > > >>>     ==> 1.14.0, 1.13.3, 1.12.5, 1.11.4
> > > > > > >>>  - we add a single commit to those that just updates the
> log4j
> > > > > > >> dependency
> > > > > > >>>  - we release those as 1.14.1, 1.13.4, 1.12.6, 1.11.5, etc.
> > > > > > >>>  - that way we don't need to do functional release tests,
> > > because the
> > > > > > >>> released code is identical to the previous release, except
> for
> > > the
> > > > > > log4j
> > > > > > >>> dependency
> > > > > > >>>  - we can then continue the work on the upcoming bugfix
> > releases
> > > as
> > > > > > >>> planned, without high pressure
> > > > > > >>>
> > > > > > >>> I would suggest creating those RCs immediately and release
> them
> > > with
> > > > > a
> > > > > > >>> special voting period (24h or so).
> > > > > > >>>
> > > > > > >>> WDYT?
> > > > > > >>>
> > > > > > >>> Best,
> > > > > > >>> Stephan
> > > > > > >>>
> > > > > > >>> [1] https://nvd.nist.gov/vuln/detail/CVE-2021-44228
> > > > > > >>> [2] https://flink.apache.org/2021/12/10/log4j-cve.html
> > > > > > >>>
> > > > > > >>
> > > > > >
> > > > > >
> > > > >
> > >
> > >
> > >
> > > --
> > > Best, Jingsong Lee
> > >
> >
>


-- 

Konstantin Knauf

https://twitter.com/snntrable

https://github.com/knaufk

Reply via email to