Hi Christoph,

That sounds reasonable to me and an interesting solution. Could SimRel
include it as a sub/composite repo? Would adding it to the released
composite repos cause the Check for Updates to remove (prompt to remove)
the problematic jars?

Is that a p2 site you can craft for this issue? My p2 knowledge isn't
sufficient for such a task.

Jonah



~~~
Jonah Graham
Kichwa Coders
www.kichwacoders.com


On Mon, 13 Dec 2021 at 11:30, Christoph Läubrich <lae...@laeubi-soft.de>
wrote:

> Hi Ed,
>
> I wonder if it would not be possible to publish a general purpose
> "CVE mitigation" Updatesite everyone could add to an existing eclipse
> install.
>
> Such an Updatesite could contain a Unit for a given CVE (e.g.
> CVE-2021-44228 in this case) that defines a negative requirement on any
> affected version (in this case any org.apache.logging.log4j with version
> range < 2.15).
>
> What will happen then is that P2 will give the user the choice to
> install this mitigation unit and uninstall
>
> a) the dangerous bundle
> b) any dependent and affected unit (passage in this case)
>
> from the current IDE.
>
> Once an Update is in place, passage could be installed (e.g. with a
> separate update-site) again including a fixed version of the problematic
> dependecy.
>
> Even though such a site would currently need some kind of handcrafted
> metadata, we could enhance this so we probably once have some automatic
> import of CVE from public databases and automatic notification of users
> about new CVE affecting their IDE.
>
> Including such a site in a target platform of a build could effectively
> fail the build (and make projects automatically aware of new problems)
> as they arise, also preventing one from including problematic
> dependencies in the future.
>
> What do you think does this sounds reasonable?
>
> Am 12.12.21 um 14:07 schrieb Ed Merks:
> > Alexander,
> >
> > Will you set the lower bound to force the fixed version and to disallow
> > the older version?
> >
> > If only the installer and its product catalogs were involved, I could
> > fix the problem easily by adding an update site and forcing the version
> > range to install the fixed version.  I wouldn't even need a new version
> > of Passage to force/fix that...
> >
> > But we're also talking about the release train repository, which would
> > need a respin.  Unfortunately there are updates in the SimRel repo after
> > the 2021-12 tag:
> >
> > Some of those will be needed because the
> > https://download.eclipse.org/eclipse/updates/4.22-I-builds repository
> is
> > gone.  Hopefully other projects contributed stable repositories with
> > unchanging released content rather than pointing at "moving target" that
> > has changed its content since the release.
> >
> > If we decide we need to do a respin and we accomplish that, then EPP
> > needs to respin as well.   This will be something the Planning Council
> > will need to discuss and to decide which actions to take.
> >
> > Only you know how Passage uses the logging facility to know if there is
> > in actual fact a risk.  I.e., is Passage actually logging information
> > obtained from an internet connection and is that actually
> > enabled/activated in the RCP/RAP package itself?  I.e., does what Jens
> > Lideström   outlined apply?  (Thanks Jens!)  If not, then perhaps we're
> > unduly alarmed.  I could see nothing that appears to be related to
> > Passage in an IDE into which I installed Passage, i.e., no preferences,
> > no wizards, no views, nothing obvious.   Is it perhaps the case that the
> > security problems would only manifest themselves in applications where
> > Passage is deployed at runtime for licensing control of that application?
> >
> > Please try to outline the risk factors of Passage's development tools
> > being installed in a IDE application to help inform the Planning Council
> > in making a decision.
> >
> > P.S., Passage in the only component on the 2021-12 train that is
> > affected; I cannot comment on all Eclipse-distributed content in
> general...
> >
> > Regards,
> > Ed
> >
> > On 12.12.2021 11:04, Alexander Fedorov wrote:
> >> Passage Team is working to provide Eclipse Passage 2.2.1 that will
> >> consume fixed logger from
> >>
> https://download.eclipse.org/tools/orbit/downloads/drops2/I20211211225428/repository
> >>
> >>
> >> Ed, how could we then provide an update for released SimRel 2021-12?
> >>
> >> Regards,
> >> AF
> >>
> >> P.S. I'm really surprised to have the only component affected after
> >> having org.apache.*logging**.log4j 2.8.2 *published in Eclipse Orbit
> >> starting from 2020-09 (6 releases).
> >>
> >>
> >>
> >> 12/12/2021 12:41 PM, Ed Merks пишет:
> >>>
> >>> Just to avoid any confusion such as that which Ed Willink mentioned,
> >>> the https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44228
> >>> issue is specifically about the class
> >>> org.apache.logging.log4j.core/lookup.JndiLookup.which is not in a
> >>> package provided by org.apache.*log4j *but rather in a package
> >>> provided by org.apache.*logging**.log4j *as illustrated here in a CBI
> >>> p2 aggregator repo view:
> >>>
> >>> Based on the analysis tool I've been developing for better managing
> >>> SimRel, e.g., to provide traceability and dependency analysis, it's
> >>> definitely the case that only Passage depends on this bundle:
> >>>
> >>>
> >>> Specifically via bundle requirements (as opposed to package
> >>> requirements):
> >>>
> >>>
> >>> Those requirements have no upper bound, only an inclusive lower
> >>> bound, such that they will resolve and use any higher version of
> >>> org.apache.logging.log4j.  As such, installing Passage with
> >>>
> https://download.eclipse.org/tools/orbit/downloads/drops2/I20211211225428/repository
> >>> in the available sites and enabling to use those, does install the
> >>> newer version:
> >>>
> >>>
> >>> The bad news is that the RCP/RAP package contains Passage and hence
> >>> the bad version of the org.apache.logging.log4j bundle.
> >>>
> >>> What's not clear is whether Passage actually logs messages whose
> >>> content can be externally subverted/exploited via contact to the web
> >>> and whether such actions are activity is actually enabled by default,
> >>> e.g., in the RCP/RAP package...
> >>>
> >>> Regards,
> >>> Ed
> >>>
> >>>
> >>> On 11.12.2021 20:48, Gunnar Wagenknecht wrote:
> >>>> Thanks Matthias!
> >>>>
> >>>> According to Wayne, 2.15 has already been vetted and is good for use:
> >>>> https://www.eclipse.org/lists/eclipse.org-committers/msg01333.html
> >>>>
> >>>> -Gunnar
> >>>>
> >>>> --
> >>>> Gunnar Wagenknecht
> >>>> gun...@wagenknecht.org, http://guw.io/
> >>>>
> >>>>
> >>>>
> >>>>> On Dec 11, 2021, at 20:36, Matthias Sohn <matthias.s...@gmail.com>
> >>>>> wrote:
> >>>>>
> >>>>> On Sat, Dec 11, 2021 at 11:35 AM Gunnar Wagenknecht
> >>>>> <gun...@wagenknecht.org> wrote:
> >>>>>
> >>>>>     Alexander,
> >>>>>
> >>>>>>     On Dec 11, 2021, at 10:16, Alexander Fedorov
> >>>>>>     <alexander.fedo...@arsysop.ru> wrote:
> >>>>>>     It would be great to learn vulnerability clean-up process with
> >>>>>>     Eclipse Orbit team to then apply it to Eclipse Passage.
> >>>>>
> >>>>>
> >>>>>     There is no Orbit team. Orbit is driven by project committers
> >>>>>     using/needing libraries in Orbit.
> >>>>>     I encourage the Eclipse Passage project to submit a Gerrit
> >>>>>     review for a newer version.
> >>>>>
> >>>>>
> >>>>> considering the buzz around this vulnerability I went ahead and
> >>>>> pushed an update to log4j 2.15 for orbit
> >>>>> https://git.eclipse.org/r/c/orbit/orbit-recipes/+/188768
> >>>>> note that the required clearlydefined score isn't reached yet, if
> >>>>> this doesn't change soon
> >>>>> maybe someone can contribute the missing information to
> >>>>> clearlydefined or
> >>>>> we file CQs to get the license approval for the new version
> >>>>>
> >>>>>     You can also try a new way as described by Mickael here:
> >>>>>     https://www.eclipse.org/lists/orbit-dev/msg05509.html
> >>>>>
> >>>>>     -Gunnar
> >>>>>     _______________________________________________
> >>>>>     orbit-dev mailing list
> >>>>>     orbit-...@eclipse.org
> >>>>>     To unsubscribe from this list, visit
> >>>>>     https://www.eclipse.org/mailman/listinfo/orbit-dev
> >>>>>
> >>>>> _______________________________________________
> >>>>> cross-project-issues-dev mailing list
> >>>>> cross-project-issues-dev@eclipse.org
> >>>>> To unsubscribe from this list, visit
> >>>>> https://www.eclipse.org/mailman/listinfo/cross-project-issues-dev
> >>>>
> >>>>
> >>>> _______________________________________________
> >>>> cross-project-issues-dev mailing list
> >>>> cross-project-issues-dev@eclipse.org
> >>>> To unsubscribe from this list, visithttps://
> www.eclipse.org/mailman/listinfo/cross-project-issues-dev
> >>>
> >>> _______________________________________________
> >>> cross-project-issues-dev mailing list
> >>> cross-project-issues-dev@eclipse.org
> >>> To unsubscribe from this list, visithttps://
> www.eclipse.org/mailman/listinfo/cross-project-issues-dev
> >>
> >>
> >> _______________________________________________
> >> cross-project-issues-dev mailing list
> >> cross-project-issues-dev@eclipse.org
> >> To unsubscribe from this list, visithttps://
> www.eclipse.org/mailman/listinfo/cross-project-issues-dev
> >
> > _______________________________________________
> > cross-project-issues-dev mailing list
> > cross-project-issues-dev@eclipse.org
> > To unsubscribe from this list, visit
> https://www.eclipse.org/mailman/listinfo/cross-project-issues-dev
> >
> _______________________________________________
> cross-project-issues-dev mailing list
> cross-project-issues-dev@eclipse.org
> To unsubscribe from this list, visit
> https://www.eclipse.org/mailman/listinfo/cross-project-issues-dev
>
_______________________________________________
cross-project-issues-dev mailing list
cross-project-issues-dev@eclipse.org
To unsubscribe from this list, visit 
https://www.eclipse.org/mailman/listinfo/cross-project-issues-dev

Reply via email to