Also - should we vote on VEX's publishing/release with that information and have 3 +1 PMC votes? This is what we do with code we release with fixes, and this is the legal act of foundation.
On Thu, Feb 6, 2025 at 9:37 AM Jarek Potiuk <ja...@potiuk.com> wrote: > And let me explain the difference vs. when we talk about "our" code. > > * When we release a fix to CVE in our code, the code we release is covered > by the ASF 2,0 licence. Clearly and plainly. No responsibility whatsoever. > * What happens when we release a statement about others code? If we add > ASF 2.0 licence to VEX file - does it cover the liability ? it's not the > code we are releasing, we are releasing metadata about other's code. Is it > covered by ASF 2.0 licence we attach to the VEX? I am not sure.IANAL. But > at least we - as a Foundation with legal and our board eventually should > discuss this and agree what is our interpretation. Or maybe come up with a > different licence, or amendment to the existing licence. > > I am just not at all sure that the current licence is good for that case. > > J. > > > On Thu, Feb 6, 2025 at 9:22 AM Jarek Potiuk <ja...@potiuk.com> wrote: > >> > I don't see how VEX introduces a new risk here. >> >> It really depends on whether the VEX entry states: "Not affected" or >> "Possibly not affected". As you see in my responses - those are exactly >> what I am explaining in my responses is exactly what you explained. In one >> of those issues I responded to the user that "we do not use that affected >> functionally, so likely we are not affected". But yet the user demanded, >> and expected and was very persistent about it, to have 100% certainty and >> an authoritative answer. >> >> I am absolutely fine in putting in VEX: >> >> * don't know, did not check (when we did not want to spend days >> investigating it and it's difficult) >> * possibly not affected (when we think we are not affected) >> * affected, please upgrade (when we know) >> >> All those are fine, and if in the VEX we will be able to do it and be >> very clear that this is the meaning, I am perfectly fine with it. >> >> But I would - under any circumstances - never put "Certainly not >> affected" there. And this is what all commercial users will be expecting. >> None of the above answers (except affected) is satisfying to the consumer >> of VEX if you ask me and it's pretty useless. >> >> >> J. >> >> >> On Thu, Feb 6, 2025 at 9:10 AM Mark Thomas <ma...@apache.org> wrote: >> >>> On 05/02/2025 14:53, Jarek Potiuk wrote: >>> >> If this is true, then I don't see how anyone, ever, would issue a >>> > "not affected" statement as mentioned by Arnout. >>> > >>> > Yep. I don't see it either. I would not do it for sure if I knew what >>> legal >>> > implications it brings. >>> > >>> > This is why my response to those questions are like this: >>> > >>> https://github.com/apache/airflow/discussions/44865#discussioncomment-11656354 >>> > and this https://github.com/apache/airflow/discussions/40590 and I >>> would >>> > never, ever respond differently. >>> > >>> > It makes some of our users angry, but I don't see how I can answer >>> > differently currently without putting ASF and myself at risk. Not >>> until we >>> > have clarity on how to do it at least. >>> >>> I think risk of the scenario outlined a couple of messages earlier in >>> this thread (and shown below) happening is very low. >>> >>> The statement that Apache ABC is "not affected" by a CVE is no different >>> to the statement that the CVE "is mitigated" in Apache ABC by doing X. >>> >>> We (and everybody else writing software) have been doing the latter for >>> years. Sometimes we get it wrong, and the result is simply a new CVE >>> with the updated (hopefully complete) mitigation. >>> >>> I don't see how VEX introduces a new risk here. >>> >>> Statements around CVEs have always had the implied caveats of "To the >>> best of our knowledge...", "As as as we are aware..." etc and I don't >>> see why VEX statements should be any different. >>> >>> I certainly doesn't hurt to be more explicit about stating these caveats >>> and I think there are benefits to being explicit. But I don't think >>> there is a big new risk here. >>> >>> Mark >>> >>> >>> > J. >>> > >>> > >>> > On Wed, Feb 5, 2025 at 3:44 PM Gilles Sadowski <gillese...@gmail.com> >>> wrote: >>> > >>> >> Hi. >>> >> >>> >> Le mer. 5 févr. 2025 à 13:51, Jarek Potiuk <ja...@potiuk.com> a >>> écrit : >>> >>> >>> >>> And let me repeat what I wrote on slack today: >>> >>> >>> >>> For ASF the legal risk is huge. If someone gets billions of dollars >>> in >>> >>> damage because they trusted we told them "we are not vulnerable to >>> this >>> >>> 3rd-party vulnerability" - they might sue ASF and demand all our >>> >> trademarks >>> >>> as compensation (not the money we have in the bank). This is is a >>> HUGE >>> >> risk >>> >>> for ASF and the whole open-source community if you ask me. >>> >> >>> >> If this is true, then I don't see how anyone, ever, would issue a >>> >> "not affected" statement as mentioned by Arnout. >>> >> >>> >> Regards, >>> >> Gilles >>> >> >>> >>>> [...] >>> >> >>> >> --------------------------------------------------------------------- >>> >> To unsubscribe, e-mail: >>> security-discuss-unsubscr...@community.apache.org >>> >> For additional commands, e-mail: >>> >> security-discuss-h...@community.apache.org >>> >> >>> >> >>> > >>> >>> >>> --------------------------------------------------------------------- >>> To unsubscribe, e-mail: >>> security-discuss-unsubscr...@community.apache.org >>> For additional commands, e-mail: >>> security-discuss-h...@community.apache.org >>> >>>