Dave

Il giorno ven 28 mag 2021 alle ore 01:24 Dave Fisher <w...@apache.org>
ha scritto:
>
>
>
> > On May 27, 2021, at 2:49 PM, Michael Marshall <mikemars...@gmail.com> wrote:
> >
> > Hi Pulsar Community,
> >
> >
> > I would like to discuss defining and documenting a process for an official
> > Pulsar version EOL policy. This process will help users know when the
> > version they are running will no longer be supported with security patches.
> >
> > After the recent announcement of CVE-2021-22160, I looked on the official
> > pulsar website for a documented process describing which branches will
> > receive security patches when vulnerabilities are discovered. I could not
> > find a process on the website. I did find a policy for handling version EOL
> > described in PIP-47, though (
> > https://github.com/apache/pulsar/wiki/PIP-47%3A-Time-Based-Release-Plan#what-is-our-eol-policy).
> > Based on the policy, I would have expected a release of 2.6.4 with the
> > security patch for CVE-2021-22160, but that patch was not cherry-picked to
> > branch-2.6 until this week after the publication of the CVE, and we’re only
> > just now starting the process to release 2.6.4.
> >
> > I think it’s also relevant to consult the ASF guide for vulnerability
> > handling. The process is outlined here:
> > https://www.apache.org/security/committers.html. Regarding releasing fixes,
> > it only mentions the following:
> >
> >> 15. The project team creates a release that includes the fix.
> >
> >> 16. The project team announces the vulnerability. The vulnerability
> > announcement should be sent after, or at the same time as, the release
> > announcement to the following destinations.
> >
> > Given the above information, I think it would be appropriate to have a
> > policy that ensures all active/supported branches receive security patches
> > before a CVE is announced.
> >
> > I propose we adopt a policy similar to Apache Spark’s policy, which is to
> > provide security fixes for feature branches for at least 18 months after
> > the initial minor version release:
> > https://spark.apache.org/versioning-policy.html. If we apply this policy to
> > Pulsar, 2.6.x will receive security patches until December 2021 (2.6.0 was
> > released in June 2020).
> >
> > When I brought this up at the community meeting today, Matteo mentioned
> > supporting releases for a year. I am open to that time frame as well. My
> > main objective is to have a policy that is documented and easily discovered
> > by our users.
>
> Looking at this as a PMC member who has had to triage security for a very 
> widely downloaded and old project codebase (OpenOffice) there is some record 
> keeping that the PMC should do in private to track vulnerabilities before 
> they are CVEs.
>
> The PMC can also assign members to a secur...@pulsar.apache.org mailing list.

This ML does not exist,
can we create it ?

I am part of ZooKeeper PMC, and we are using
secur...@zookeeper.apache.org for this purpose and it works pretty
well.

Can you please start a discussion inside Pulsar PMC to create that ML ?
I will be also interested in being subscribed

Enrico


>
> The PMC can request a private SVN repository and/or private Confluence Wiki 
> for keeping records and assuring that such missed back ports are less likely. 
> (Private Git limited to the PMC is not currently possible (it is an Infra 
> wish)) Doing this allows even “non-technical” PMC members to help manage the 
> CVE process.
>
> All The Best,
> Dave
>
> >
> > I look forward to your thoughts and suggestions.
> >
> > Thanks,
> >
> > Michael Marshall
>

Reply via email to