-
Notifications
You must be signed in to change notification settings - Fork 3.6k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[Security] v2.10.2 contains 35 fixable vulnerabilities #18348
Comments
Several of these have been fixed, and others are brought in by presto. @nicoloboschi does security scanning of the pulsar code base and frequently contributes updates to dependencies, when possible. |
yes and there is also an automated OWASP Dependency Check running since June 2021 #10855 doing all this, |
The final release candidate of 2.10.2 is 23 days ago. And most of fixes comes in the early September. I think the problem is that the current release process have too many work and not automated. It took too long for a version to be released. And I don't see any check process of CVEs before we cut the release. I am pretty sure "OWASP Dependency Check" passed before the first release candidate is cut. |
Looks like there are several points helping to produce this non-perfect state:
|
I agree. I think we're moving in the right direction by breaking out the C++ and Python clients, but it will take time to see those benefits. Maybe it is worth a mailing list discussion of how to share the load on the release manager? |
Yes, this is one of the motivations of PIP-175: Extend time based release process |
when looking through the security report again, the question: |
hmm just another number: the ubuntu 20.04 included, added 77 vulnerabilities with CVE... |
This is from @hpvd I think you can start a discuss thread on the mail-list to get more attention on this matter. |
@Jason918 No. The upgrade of Trino (PrestoSQL) dependency happened only for the unreleased master (2.12.0). |
And yes, if we don't update Trino dependency for 2.10 (I think so), these reports should be suppressed. |
The issue had no activity for 30 days, mark with Stale label. |
This issue is still relevant with release 3.1.0. Plenty of vulnerabilities in the latest release, especially with the connectors and offloaders... Edit: this also applies to 3.1.1 and upcoming release 3.0.2. See #21457 for more information. |
when stale label is added automatically, edit: added an issue for this: |
Search before asking
Version
v2.10.2
Minimal reproduce step
look into trivy powered inspection for vulnerabilities
at artifacthub.io
https://artifacthub.io/packages/helm/apache/pulsar?modal=security-report
open details of in the latest helm chart v3.0.0 included pulsar v2.10.2 image
What did you expect to see?
very few fixable vulnerabilities, since v2.10.2 was released just 8 days ago https://github.com/apache/pulsar/releases
What did you see instead?
Anything else?
[Security] v2.10.2 contains up to 9 year old vulnerabilities/CVEs -> get rid of the oldest #18338
Arguments for "why pulsar is secure?" #18041
[security] further reduction of the 136 vulnerabilities (79 fixable) in helm chart v3.0.0 pulsar-helm-chart#334
Are you willing to submit a PR?
The text was updated successfully, but these errors were encountered: