Jonathan,

Providing guides to Pulsar users on how to build a 2.6 image rather than
promoting a vendor image is much better.

- Sijie

On Thu, May 27, 2021 at 12:40 PM Jonathan Ellis <jbel...@gmail.com> wrote:

> Hi Sijie,
>
> Given the serious nature of this vulnerability, we thought it was best to
> provide Apache Pulsar users with a 2.6 build as quickly as possible, in
> parallel with helping out on an official 2.6.4 release.
>
> On Thu, May 27, 2021 at 2:24 PM Sijie Guo <guosi...@gmail.com> wrote:
>
>> Chris - I don't think it is appropriate to promote a vendor image here
>> from
>> a vendor perspective.
>>
>> A better approach is to point out the change has been cherry-picked to
>> branch-2.6 and an ongoing discussion for getting a new bugfix release for
>> branch 2.6. is out.
>>
>> - Sijie
>>
>> On Thu, May 27, 2021 at 12:15 PM Chris Bartholomew <
>> chris.bartholo...@kesque.com> wrote:
>>
>> > For folks on Pulsar 2.6 using token-based authentication, since there
>> is no
>> > 2.6 version with the CVE fix yet available, you are welcome to use our
>> > Pulsar Docker images which contain the fix and which we have confirmed
>> > resolves the CVE:
>> >
>> >
>> >    -
>> >
>> >    datastax/pulsar:2.6.2_1.0.1
>> >    <
>> >
>> https://hub.docker.com/layers/datastax/pulsar/2.6.2_1.0.1/images/sha256-598c4a99f4716de43838657b741b92f0310cea8539b9538659d4657ef8aaee17?context=explore
>> > >
>> >    -
>> >
>> >    datastax/pulsar-all:2.6.2_1.0.1
>> >    <
>> >
>> https://hub.docker.com/layers/datastax/pulsar-all/2.6.2_1.0.1/images/sha256-dfb4fa500372c17e009427322fd84a6302d7a4bf716cd511c103449756bad79f?context=explore
>> > >
>> >
>> >
>> > The fix
>> > <
>> >
>> https://github.com/apache/pulsar/commit/67e7e0cd23157ebbc8c18f40ce0eb87f600dafb6
>> > >
>> > has been committed to branch-2.6 (by Enrico). We (DataStax) are looking
>> to
>> > help get an official 2.6 release out for this vulnerability fix ASAP.
>> >
>> > Chris
>> >
>> >
>> > On Tue, 25 May 2021 at 09:27, PengHui Li <peng...@apache.org> wrote:
>> >
>> > > CVE-2021-22160 Apache Pulsar Information Disclosure
>> > >
>> > > Severity: High
>> > >
>> > > Versions Affected:
>> > > Apache Pulsar < 2.7.1
>> > >
>> > > Description:
>> > > If Apache Pulsar is configured to authenticate clients using tokens
>> > > based on JSON Web Tokens (JWT), the signature of the token is not
>> > > validated if the algorithm of the presented token is set to "none".
>> > > This allows an attacker to connect to Pulsar instances as any user
>> > > (incl. admins).
>> > >
>> > > Mitigation:
>> > > Users of the affected versions should apply one of the following
>> > > mitigations:
>> > > Upgrade to Apache Pulsar 2.7.1 or later
>> > >
>> > > Credit:
>> > > This issue was identified by Peter Stöckli
>> > >
>> >
>>
>
>
> --
> Jonathan Ellis
> co-founder, http://www.datastax.com
> @spyced
>

Reply via email to