Please see the blog post @ https://pulsar.apache.org/blog/

December 11, 2021

Matteo Merli
 <>
Yesterday, a new serious vulnerability was reported regarding Log4j that can 
allow remote execution for attackers.

The vulnerability issue is described and tracked under CVE-2021-44228 
<https://nvd.nist.gov/vuln/detail/CVE-2021-44228>.

Current releases of Apache Pulsar are bundling Log4j2 versions that are 
affected by this vulnerability. We strongly recommend to follow the advisory of 
the Apache Log4j community and patch your systems as soon as possible.

There are 2 workarounds to patch a Pulsar deployments. You can set either of:

Java property: -Dlog4j2.formatMsgNoLookups=true
Environment variable: LOG4J_FORMAT_MSG_NO_LOOKUPS=true
Both approaches are effective in mitigating the vulnerability for Pulsar 
services.

Additionally, when running Pulsar Functions with Kubernetes runtime, you should 
update your Docker images, following the example described here 
<https://github.com/lhotari/pulsar-docker-images-patch-CVE-2021-44228>.

If you are using the Pulsar Helm Chart for deploying in Kubernetes, a new 
version of the chart 
<https://github.com/apache/pulsar-helm-chart/releases/tag/pulsar-2.7.6> is 
already available and it applies the above mentioned workaround.

We are already preparing new patch releases, 2.7.4, 2.8.2 and 2.9.1. These 
releases will be ready in the next few days and will bundle the Log4j2 2.15.0, 
which contains the vulnerability fix.

Reply via email to