And let me explain the difference vs. when we talk about "our" code.

* When we release a fix to CVE in our code, the code we release is covered
by the ASF 2,0 licence. Clearly and plainly. No responsibility whatsoever.
* What happens when we release a statement about others code?  If we add
ASF 2.0 licence to VEX file - does it cover the liability ? it's not the
code we are releasing, we are releasing metadata about other's code. Is it
covered by ASF 2.0 licence we attach to the VEX? I am not sure.IANAL. But
at least we - as a Foundation with legal and our board eventually should
discuss this and agree what is our interpretation. Or maybe come up with a
different licence, or amendment to the existing licence.

I am just not at all sure that the current licence is good for that case.

J.


On Thu, Feb 6, 2025 at 9:22 AM Jarek Potiuk <ja...@potiuk.com> wrote:

> > I don't see how VEX introduces a new risk here.
>
> It really depends on whether the VEX entry states: "Not affected" or
> "Possibly not affected". As you see in my responses - those are exactly
> what I am explaining in my responses is exactly what you explained. In one
> of those issues I responded to the user that "we do not use that affected
> functionally, so likely we are not affected". But yet the user demanded,
> and expected and was very persistent about it, to have 100% certainty and
> an authoritative answer.
>
> I am absolutely fine in putting in VEX:
>
> * don't know, did not check (when we did not want to spend days
> investigating it and it's difficult)
> * possibly not affected (when we think we are not affected)
> * affected, please upgrade (when we know)
>
> All those are fine, and if in the VEX we will be able to do it and be very
> clear that this is the meaning, I am perfectly fine with it.
>
> But I would - under any circumstances - never put "Certainly not affected"
> there. And this is what all commercial users will be expecting. None of the
> above answers (except affected) is satisfying to the consumer of VEX if you
> ask me and it's pretty useless.
>
>
> J.
>
>
> On Thu, Feb 6, 2025 at 9:10 AM Mark Thomas <ma...@apache.org> wrote:
>
>> On 05/02/2025 14:53, Jarek Potiuk wrote:
>> >> If this is true, then I don't see how anyone, ever, would issue a
>> > "not affected" statement as mentioned by Arnout.
>> >
>> > Yep. I don't see it either. I would not do it for sure if I knew what
>> legal
>> > implications it brings.
>> >
>> > This is why my response to those questions are like this:
>> >
>> https://github.com/apache/airflow/discussions/44865#discussioncomment-11656354
>> > and this https://github.com/apache/airflow/discussions/40590 and I
>> would
>> > never, ever respond differently.
>> >
>> > It makes some of our users angry, but I don't see how I can answer
>> > differently currently without putting ASF and myself at risk. Not until
>> we
>> > have clarity on how to do it at least.
>>
>> I think risk of the scenario outlined a couple of messages earlier in
>> this thread (and shown below) happening is very low.
>>
>> The statement that Apache ABC is "not affected" by a CVE is no different
>> to the statement that the CVE "is mitigated" in Apache ABC by doing X.
>>
>> We (and everybody else writing software) have been doing the latter for
>> years. Sometimes we get it wrong, and the result is simply a new CVE
>> with the updated (hopefully complete) mitigation.
>>
>> I don't see how VEX introduces a new risk here.
>>
>> Statements around CVEs have always had the implied caveats of "To the
>> best of our knowledge...", "As as as we are aware..." etc and I don't
>> see why VEX statements should be any different.
>>
>> I certainly doesn't hurt to be more explicit about stating these caveats
>> and I think there are benefits to being explicit. But I don't think
>> there is a big new risk here.
>>
>> Mark
>>
>>
>> > J.
>> >
>> >
>> > On Wed, Feb 5, 2025 at 3:44 PM Gilles Sadowski <gillese...@gmail.com>
>> wrote:
>> >
>> >> Hi.
>> >>
>> >> Le mer. 5 févr. 2025 à 13:51, Jarek Potiuk <ja...@potiuk.com> a écrit
>> :
>> >>>
>> >>> And let me repeat what I wrote on slack today:
>> >>>
>> >>> For ASF the legal risk is huge. If someone gets billions of dollars in
>> >>> damage because they trusted we told them "we are not vulnerable to
>> this
>> >>> 3rd-party vulnerability" - they might sue ASF and demand all our
>> >> trademarks
>> >>> as compensation (not the money we have in the bank). This is is a HUGE
>> >> risk
>> >>> for ASF and the whole open-source community if you ask me.
>> >>
>> >> If this is true, then I don't see how anyone, ever, would issue a
>> >> "not affected" statement as mentioned by Arnout.
>> >>
>> >> Regards,
>> >> Gilles
>> >>
>> >>>> [...]
>> >>
>> >> ---------------------------------------------------------------------
>> >> To unsubscribe, e-mail:
>> security-discuss-unsubscr...@community.apache.org
>> >> For additional commands, e-mail:
>> >> security-discuss-h...@community.apache.org
>> >>
>> >>
>> >
>>
>>
>> ---------------------------------------------------------------------
>> To unsubscribe, e-mail: security-discuss-unsubscr...@community.apache.org
>> For additional commands, e-mail:
>> security-discuss-h...@community.apache.org
>>
>>

Reply via email to