Il Mer 26 Feb 2025, 22:00 Lari Hotari <lhot...@apache.org> ha scritto:

> The releases continue to be blocked by a lack of binding votes.
>
> Regarding the semi-automated validation with
> https://github.com/lhotari/pulsar-release-validation in a Docker
> container, the solution now uses a persistent Docker volume to cache Maven
> dependency downloads across multiple runs. This prevents the "downloading
> the internet" problem, and you will only need to do the download once (or
> after you delete the Docker volume). I have also added instructions for
> using a personal cloud VM for validation on GCP. The README in the
> repository contains the details. The validation script is also extensively
> tested across the supported platforms.
>
> Are there remaining obstacles preventing release votes from our PMC
> members?
>

I am sorry,  I will try to cast my vote tomorrow


Enrico


> Please note that our users are waiting for the critical severity
> CVE-2025-24970 fix (details in the thread).
>
> -Lari
>
> On 2025/02/26 00:04:39 Lari Hotari wrote:
> > Bumping this thread again to remind Pulsar PMC members that we urgently
> need binding votes to publish releases containing a critical severity
> CVE-2025-24970 fix (details in the thread).
> >
> > These are the active release voting threads:
> > * [VOTE] Release Apache Pulsar 3.0.10 based on 3.0.10-candidate-1
> > - https://lists.apache.org/thread/62jh7sj666mq2plr1rmlj7qrfx4zdj4x
> > * [VOTE] Release Apache Pulsar 3.3.5 based on 3.3.5-candidate-2
> > - https://lists.apache.org/thread/vwgzdqybtrd4vny87c9qz1t6yqo4v6kz
> > * [VOTE] Release Apache Pulsar 4.0.3 based on 4.0.3-candidate-2
> > - https://lists.apache.org/thread/81ownrk38w692wfvhpp5f689dvo8vs5n
> >
> > Understanding that the effort required for Pulsar release validation may
> be causing the lack of binding votes, I have enhanced the semi-automated
> Pulsar Release candidate validation script. It can now run in a docker
> container on Linux, MacOS, or Windows without requiring JVM or tooling
> installation on the host environment. Everything is included in the docker
> container. This script assists with Pulsar release candidate validation by
> automating the steps described in "Validating release candidates." [1]
> >
> > Please visit https://github.com/lhotari/pulsar-release-validation to
> check how to run validation steps with this solution, unless you already
> have a preferred method for handling Pulsar release candidate validation.
> >
> > The primary goal is to lower the barrier to participation in the voting
> process. This tool doesn't replace the need to review results, but it
> should simplify the process. Currently, releases are delayed due to
> insufficient binding votes. The 3.0.10-candidate-1 vote has been open since
> February 19th—almost a week—and has received only one vote from Yike with
> no binding votes from PMC members.
> >
> > -Lari
> >
> > 1 - https://pulsar.apache.org/contribute/validate-release-candidate/
> >
> > On 2025/02/25 15:11:43 Lari Hotari wrote:
> > > 3.3.5-candidate-2 and 4.0.3-candidate-2 have now been made ready for
> voting. 3.0.10-candidate-1 voting continues.
> > >
> > > Please vote on the 3.0.10, 3.3.5 and 4.0.3 releases so that we get the
> CVE fix published:
> > > * [VOTE] Release Apache Pulsar 3.0.10 based on 3.0.10-candidate-1
> > > - https://lists.apache.org/thread/62jh7sj666mq2plr1rmlj7qrfx4zdj4x
> > > * [VOTE] Release Apache Pulsar 3.3.5 based on 3.3.5-candidate-2
> > > - https://lists.apache.org/thread/vwgzdqybtrd4vny87c9qz1t6yqo4v6kz
> > > * [VOTE] Release Apache Pulsar 4.0.3 based on 4.0.3-candidate-2
> > > - https://lists.apache.org/thread/81ownrk38w692wfvhpp5f689dvo8vs5n
> > >
> > > -Lari
> > >
> > > On 2025/02/12 08:52:50 Lari Hotari wrote:
> > > > Hi all,
> > > >
> > > > I'd like to discuss initiating the next set of Pulsar releases
> > > > (3.0.10, 3.3.5, and 4.0.3) due to a recently disclosed high-severity
> > > > security vulnerability in Netty (CVE-2025-24970). Netty has released
> > > > version 4.1.118.Final which contains the fix.
> > > >
> > > > The CVE-2025-24970 vulnerability details [1] summarized:
> > > > - A specially crafted packet received via SslHandler can lead to a
> > > > native crash when using native SSLEngine
> > > > - Due to the crash behavior, this is categorized as a
> > > > denial-of-service vulnerability
> > > > - This impacts Pulsar brokers and proxies that use native SSL
> > > > implementation (default setting)
> > > > - CVSS Score: 7.5 (High)
> > > > - Fixed in Netty 4.1.118.Final
> > > >
> > > > While this primarily affects broker and proxy components, many
> > > > enterprise users will need an updated client due to vulnerability
> > > > scanning and security policies that flag the vulnerable Netty
> > > > dependency.
> > > >
> > > > Important reminder: As documented in the Apache Pulsar Helm chart
> > > > (
> https://github.com/apache/pulsar-helm-chart?tab=readme-ov-file#pulsar-proxy-security-considerations
> ),
> > > > Pulsar components including the Pulsar Proxy are not designed for
> > > > direct exposure to the public internet. Deployments should be
> > > > protected by appropriate network perimeter security measures. This
> > > > architectural assumption is particularly relevant given the nature of
> > > > this vulnerability.
> > > >
> > > > I propose the following timeline:
> > > > - Release candidates by February 14th, 2025
> > > > - Releases by February 21th, 2025
> > > >
> > > > I'm volunteering to be the release manager for these releases.
> > > > Please let me know if you have any concerns or feedback on this plan.
> > > >
> > > > Best regards,
> > > >
> > > > Lari Hotari
> > > >
> > > > 1 - For technical details on CVE-2025-24970, see:
> > > >
> https://github.com/netty/netty/security/advisories/GHSA-4g8c-wm8x-jfhw
> > > >
> > >
> >
>

Reply via email to