The first question I have is:

Is anyone running 1.3.0 in production today?

That release is over a year old and there are many known problems that have
been fixed on 1.4.0. I would be quite surprised if anyone is running 1.3.0
successfully without some additional custom patches on top of it. If they
have a patched 1.3.0, then a new release won't help, as it would be easier
to just cherry pick the CVE fix on top of their custom build.


On Mon, Feb 12, 2024 at 10:39 AM István Fajth <fapi...@gmail.com> wrote:

> Hi developers,
>
> Me and Attila had a discussion about a PR
> <https://github.com/apache/ozone/pull/6100> that is posted by @ivandika3.
>
> In our SECURITY.md file we have a table about our supported versions.
> In light of the recent CVE, the idea is to remove the supported flag from
> any release prior to 1.3.0, and leave 1.3.0 and 1.4.0 supported.
>
> I tend to believe this is something that is reasonable considering that
> 1.2.1 is over 2 years old.
>
> However, leaving 1.3.0 supported means that we should release 1.3.1 in
> order to have the recently released CVE-2023-39196 fixed for the 1.3.x
> line.
> There was an effort earlier to release 1.3.1, but we have abandoned that
> effort.
>
> *What do you think, which way should we manage this?*
> 1. Leave 1.3.1 branch as it is cherry-pick the CVE fix, and release it?
> 2. Leave 1.3.1 alone, and release the fix for the CVE from a new branch as
> (a) 1.3.0.1, or (b)1.3.2?
> 3. Prepare a proper 1.3.1 release with all the critical fixes that we have,
> including the fix for the CVE?
> 4. Mark 1.3.0 unsupported which is also something that I can imagine,
> however that release is just over 1 year old.
>
> A minimalistic approach - As we dropped the idea of 1.3.1 already - to just
> go with 2a.
> The simplest is to choose to drop support for 1.3.0.
> If we support 1.3.0 today, and we want to do it right, then releasing 1.3.1
> in the next 1-2 weeks seems to be the proper approach.
>
> I am +1 for all these 3 approaches and I am not against the approach listed
> in point 1., however I do not support it either.
> I can not - at the moment - take on a full 1.3.1 release, so if the
> community decides to go that route, we will need a release manager also for
> that.
>
> What I can volunteer for, is to update the SECURITY.md based on the
> decision, and in case a minimalistic release approach is taken (2a or 2b),
> I can take on releasing that.
>
> --
> Pifta
>

Reply via email to