We (as a company) are publishing VEX (in CSAF) statements and we think
about them as we do about any other piece of code that enters our
codebase: Every statement needs a review by a second person.

I know that not every ASF project follows a review-then-commit workflow.
Personally I'd say a PMC vote is too much but a review process makes
sense to me.

We looked at dozens of tools and couldn't find one to support such a
workflow so we engaged with an open-source project and got it
implemented there: https://github.com/MaibornWolff/SecObserve

On Thu, Feb 6, 2025 at 9:39 AM Jarek Potiuk <ja...@potiuk.com> wrote:
>
> Also - should we vote on VEX's publishing/release with that information
> and have 3 +1 PMC votes? This is what we do with code we release with
> fixes, and this is the legal act of foundation.
>
> On Thu, Feb 6, 2025 at 9:37 AM Jarek Potiuk <ja...@potiuk.com> wrote:
>
> > And let me explain the difference vs. when we talk about "our" code.
> >
> > * When we release a fix to CVE in our code, the code we release is covered
> > by the ASF 2,0 licence. Clearly and plainly. No responsibility whatsoever.
> > * What happens when we release a statement about others code?  If we add
> > ASF 2.0 licence to VEX file - does it cover the liability ? it's not the
> > code we are releasing, we are releasing metadata about other's code. Is it
> > covered by ASF 2.0 licence we attach to the VEX? I am not sure.IANAL. But
> > at least we - as a Foundation with legal and our board eventually should
> > discuss this and agree what is our interpretation. Or maybe come up with a
> > different licence, or amendment to the existing licence.
> >
> > I am just not at all sure that the current licence is good for that case.
> >
> > J.
> >
> >
> > On Thu, Feb 6, 2025 at 9:22 AM Jarek Potiuk <ja...@potiuk.com> wrote:
> >
> >> > I don't see how VEX introduces a new risk here.
> >>
> >> It really depends on whether the VEX entry states: "Not affected" or
> >> "Possibly not affected". As you see in my responses - those are exactly
> >> what I am explaining in my responses is exactly what you explained. In one
> >> of those issues I responded to the user that "we do not use that affected
> >> functionally, so likely we are not affected". But yet the user demanded,
> >> and expected and was very persistent about it, to have 100% certainty and
> >> an authoritative answer.
> >>
> >> I am absolutely fine in putting in VEX:
> >>
> >> * don't know, did not check (when we did not want to spend days
> >> investigating it and it's difficult)
> >> * possibly not affected (when we think we are not affected)
> >> * affected, please upgrade (when we know)
> >>
> >> All those are fine, and if in the VEX we will be able to do it and be
> >> very clear that this is the meaning, I am perfectly fine with it.
> >>
> >> But I would - under any circumstances - never put "Certainly not
> >> affected" there. And this is what all commercial users will be expecting.
> >> None of the above answers (except affected) is satisfying to the consumer
> >> of VEX if you ask me and it's pretty useless.
> >>
> >>
> >> J.
> >>
> >>
> >> On Thu, Feb 6, 2025 at 9:10 AM Mark Thomas <ma...@apache.org> wrote:
> >>
> >>> On 05/02/2025 14:53, Jarek Potiuk wrote:
> >>> >> If this is true, then I don't see how anyone, ever, would issue a
> >>> > "not affected" statement as mentioned by Arnout.
> >>> >
> >>> > Yep. I don't see it either. I would not do it for sure if I knew what
> >>> legal
> >>> > implications it brings.
> >>> >
> >>> > This is why my response to those questions are like this:
> >>> >
> >>> https://github.com/apache/airflow/discussions/44865#discussioncomment-11656354
> >>> > and this https://github.com/apache/airflow/discussions/40590 and I
> >>> would
> >>> > never, ever respond differently.
> >>> >
> >>> > It makes some of our users angry, but I don't see how I can answer
> >>> > differently currently without putting ASF and myself at risk. Not
> >>> until we
> >>> > have clarity on how to do it at least.
> >>>
> >>> I think risk of the scenario outlined a couple of messages earlier in
> >>> this thread (and shown below) happening is very low.
> >>>
> >>> The statement that Apache ABC is "not affected" by a CVE is no different
> >>> to the statement that the CVE "is mitigated" in Apache ABC by doing X.
> >>>
> >>> We (and everybody else writing software) have been doing the latter for
> >>> years. Sometimes we get it wrong, and the result is simply a new CVE
> >>> with the updated (hopefully complete) mitigation.
> >>>
> >>> I don't see how VEX introduces a new risk here.
> >>>
> >>> Statements around CVEs have always had the implied caveats of "To the
> >>> best of our knowledge...", "As as as we are aware..." etc and I don't
> >>> see why VEX statements should be any different.
> >>>
> >>> I certainly doesn't hurt to be more explicit about stating these caveats
> >>> and I think there are benefits to being explicit. But I don't think
> >>> there is a big new risk here.
> >>>
> >>> Mark
> >>>
> >>>
> >>> > J.
> >>> >
> >>> >
> >>> > On Wed, Feb 5, 2025 at 3:44 PM Gilles Sadowski <gillese...@gmail.com>
> >>> wrote:
> >>> >
> >>> >> Hi.
> >>> >>
> >>> >> Le mer. 5 févr. 2025 à 13:51, Jarek Potiuk <ja...@potiuk.com> a
> >>> écrit :
> >>> >>>
> >>> >>> And let me repeat what I wrote on slack today:
> >>> >>>
> >>> >>> For ASF the legal risk is huge. If someone gets billions of dollars
> >>> in
> >>> >>> damage because they trusted we told them "we are not vulnerable to
> >>> this
> >>> >>> 3rd-party vulnerability" - they might sue ASF and demand all our
> >>> >> trademarks
> >>> >>> as compensation (not the money we have in the bank). This is is a
> >>> HUGE
> >>> >> risk
> >>> >>> for ASF and the whole open-source community if you ask me.
> >>> >>
> >>> >> If this is true, then I don't see how anyone, ever, would issue a
> >>> >> "not affected" statement as mentioned by Arnout.
> >>> >>
> >>> >> Regards,
> >>> >> Gilles
> >>> >>
> >>> >>>> [...]
> >>> >>
> >>> >> ---------------------------------------------------------------------
> >>> >> To unsubscribe, e-mail:
> >>> security-discuss-unsubscr...@community.apache.org
> >>> >> For additional commands, e-mail:
> >>> >> security-discuss-h...@community.apache.org
> >>> >>
> >>> >>
> >>> >
> >>>
> >>>
> >>> ---------------------------------------------------------------------
> >>> To unsubscribe, e-mail:
> >>> security-discuss-unsubscr...@community.apache.org
> >>> For additional commands, e-mail:
> >>> security-discuss-h...@community.apache.org
> >>>
> >>>

---------------------------------------------------------------------
To unsubscribe, e-mail: security-discuss-unsubscr...@community.apache.org
For additional commands, e-mail: security-discuss-h...@community.apache.org

Reply via email to