Also - should we vote on VEX's publishing/release with that information
and have 3 +1 PMC votes? This is what we do with code we release with
fixes, and this is the legal act of foundation.

On Thu, Feb 6, 2025 at 9:37 AM Jarek Potiuk <ja...@potiuk.com> wrote:

> And let me explain the difference vs. when we talk about "our" code.
>
> * When we release a fix to CVE in our code, the code we release is covered
> by the ASF 2,0 licence. Clearly and plainly. No responsibility whatsoever.
> * What happens when we release a statement about others code?  If we add
> ASF 2.0 licence to VEX file - does it cover the liability ? it's not the
> code we are releasing, we are releasing metadata about other's code. Is it
> covered by ASF 2.0 licence we attach to the VEX? I am not sure.IANAL. But
> at least we - as a Foundation with legal and our board eventually should
> discuss this and agree what is our interpretation. Or maybe come up with a
> different licence, or amendment to the existing licence.
>
> I am just not at all sure that the current licence is good for that case.
>
> J.
>
>
> On Thu, Feb 6, 2025 at 9:22 AM Jarek Potiuk <ja...@potiuk.com> wrote:
>
>> > I don't see how VEX introduces a new risk here.
>>
>> It really depends on whether the VEX entry states: "Not affected" or
>> "Possibly not affected". As you see in my responses - those are exactly
>> what I am explaining in my responses is exactly what you explained. In one
>> of those issues I responded to the user that "we do not use that affected
>> functionally, so likely we are not affected". But yet the user demanded,
>> and expected and was very persistent about it, to have 100% certainty and
>> an authoritative answer.
>>
>> I am absolutely fine in putting in VEX:
>>
>> * don't know, did not check (when we did not want to spend days
>> investigating it and it's difficult)
>> * possibly not affected (when we think we are not affected)
>> * affected, please upgrade (when we know)
>>
>> All those are fine, and if in the VEX we will be able to do it and be
>> very clear that this is the meaning, I am perfectly fine with it.
>>
>> But I would - under any circumstances - never put "Certainly not
>> affected" there. And this is what all commercial users will be expecting.
>> None of the above answers (except affected) is satisfying to the consumer
>> of VEX if you ask me and it's pretty useless.
>>
>>
>> J.
>>
>>
>> On Thu, Feb 6, 2025 at 9:10 AM Mark Thomas <ma...@apache.org> wrote:
>>
>>> On 05/02/2025 14:53, Jarek Potiuk wrote:
>>> >> If this is true, then I don't see how anyone, ever, would issue a
>>> > "not affected" statement as mentioned by Arnout.
>>> >
>>> > Yep. I don't see it either. I would not do it for sure if I knew what
>>> legal
>>> > implications it brings.
>>> >
>>> > This is why my response to those questions are like this:
>>> >
>>> https://github.com/apache/airflow/discussions/44865#discussioncomment-11656354
>>> > and this https://github.com/apache/airflow/discussions/40590 and I
>>> would
>>> > never, ever respond differently.
>>> >
>>> > It makes some of our users angry, but I don't see how I can answer
>>> > differently currently without putting ASF and myself at risk. Not
>>> until we
>>> > have clarity on how to do it at least.
>>>
>>> I think risk of the scenario outlined a couple of messages earlier in
>>> this thread (and shown below) happening is very low.
>>>
>>> The statement that Apache ABC is "not affected" by a CVE is no different
>>> to the statement that the CVE "is mitigated" in Apache ABC by doing X.
>>>
>>> We (and everybody else writing software) have been doing the latter for
>>> years. Sometimes we get it wrong, and the result is simply a new CVE
>>> with the updated (hopefully complete) mitigation.
>>>
>>> I don't see how VEX introduces a new risk here.
>>>
>>> Statements around CVEs have always had the implied caveats of "To the
>>> best of our knowledge...", "As as as we are aware..." etc and I don't
>>> see why VEX statements should be any different.
>>>
>>> I certainly doesn't hurt to be more explicit about stating these caveats
>>> and I think there are benefits to being explicit. But I don't think
>>> there is a big new risk here.
>>>
>>> Mark
>>>
>>>
>>> > J.
>>> >
>>> >
>>> > On Wed, Feb 5, 2025 at 3:44 PM Gilles Sadowski <gillese...@gmail.com>
>>> wrote:
>>> >
>>> >> Hi.
>>> >>
>>> >> Le mer. 5 févr. 2025 à 13:51, Jarek Potiuk <ja...@potiuk.com> a
>>> écrit :
>>> >>>
>>> >>> And let me repeat what I wrote on slack today:
>>> >>>
>>> >>> For ASF the legal risk is huge. If someone gets billions of dollars
>>> in
>>> >>> damage because they trusted we told them "we are not vulnerable to
>>> this
>>> >>> 3rd-party vulnerability" - they might sue ASF and demand all our
>>> >> trademarks
>>> >>> as compensation (not the money we have in the bank). This is is a
>>> HUGE
>>> >> risk
>>> >>> for ASF and the whole open-source community if you ask me.
>>> >>
>>> >> If this is true, then I don't see how anyone, ever, would issue a
>>> >> "not affected" statement as mentioned by Arnout.
>>> >>
>>> >> Regards,
>>> >> Gilles
>>> >>
>>> >>>> [...]
>>> >>
>>> >> ---------------------------------------------------------------------
>>> >> To unsubscribe, e-mail:
>>> security-discuss-unsubscr...@community.apache.org
>>> >> For additional commands, e-mail:
>>> >> security-discuss-h...@community.apache.org
>>> >>
>>> >>
>>> >
>>>
>>>
>>> ---------------------------------------------------------------------
>>> To unsubscribe, e-mail:
>>> security-discuss-unsubscr...@community.apache.org
>>> For additional commands, e-mail:
>>> security-discuss-h...@community.apache.org
>>>
>>>

Reply via email to