Hi Denis,

Yes - that seems best. I can help with the actual story - as can others on
this list (I hope :-).

Jonah
~~~
Jonah Graham
Kichwa Coders
www.kichwacoders.com


On Mon, 13 Dec 2021 at 13:58, Denis Roy <denis....@eclipse-foundation.org>
wrote:

> Good question.
>
> If we agree on a story (ie, if someone can help me write what the actual
> story is), I can certainly post a blog post on the blogs.eclipse.org
> domain. From there, we could tweet about it from the official @EclipseFdn
> twitter account, and perhaps add links to the post from the Newcomers forum.
>
> Does that seem acceptable?
>
>
> Denis
>
>
>
>
>
> On 2021-12-13 13:44, Jonah Graham wrote:
>
> Thanks everyone for working on this - I think we have a pretty good story
> now about what the Eclipse IDE / SimRel has done for the log4j
> vulnerability.
>
> The last thing is to say so in a concise way - where can/should we say so
> (besides this mailing list)?
>
> Thanks,
> Jonah
> ~~~
> Jonah Graham
> Kichwa Coders
> www.kichwacoders.com
>
>
> On Mon, 13 Dec 2021 at 12:58, Ed Merks <ed.me...@gmail.com> wrote:
>
>> Christoph,
>>
>> I really appreciate your creative ideas.  I think "we, i.e., as an I"
>> should indeed plan long term for the possibility of expedient mitigation
>> of such problems in the future using this type of approach.
>>
>> For the project catalogs I've regenerated them such than installing any
>> version of the RCP package (with any installer) will install the latest
>> version of Passage which strictly requires the updated/fix version of
>> org.apache.logging.log4j.  Also any installer-created RCP package
>> installation will ask to update itself upon startup/restart.
>>
>>
>> https://git.eclipse.org/c/oomph/org.eclipse.oomph.git/commit/?id=929d140afc34ecdb85b7996c63ce0b36b6723a34
>>
>> Another thought I had is that the donation support I've added opens a
>> browser page.  In this case we could change the URL such that a page
>> with information about this CVE could be presented...
>>
>> But now it's late in the day and I'm done for now.
>>
>> Regards,
>> Ed
>>
>> On 13.12.2021 18:03, Christoph Läubrich wrote:
>> > Hi Ed,
>> >
>> > > One problem is we don't know all the things that strictly require the
>> > > older bundle.
>> >
>> > In the end what matters is that the bundle is no longer available. If
>> > we don't uninstall them at laes they won't resolve anymore and people
>> > will go to the project website, report an issue and/or install an
>> > update :-)
>> >
>> > > In the end it at the simplest, it could just be a feature with p2.inf
>> > > with negative requirements for bundles that have been determined to be
>> > > unsafe.
>> >
>> > yep that's what I have had in mind, I think it would be cool to have
>> > one global feature "CVE Mitigation" or something and this
>> > requires/includes individual CVE features that ship with appropriate
>> > p2.inf items.
>> > Thus way, once added to an IDE this will enable us to make CVE fixes
>> > available tor a broad audience and make people more aware of them
>> > through the update capabilities of eclipse itself.
>> >
>> > >> What do you think does this sounds reasonable?
>> > > It's a creative idea.  I like it.
>> >
>> > Good to hear! As you probably know much more about p2.inf magic than
>> > me can you craft such a feature so we can investigate this more? As
>> > mentioned before this is more an idea so I can't shar any concrete
>> > code samples yet and have no idea where this would bes be placed (part
>> > of the platform cbi? github/gitlab project under eclipse umbrella?
>> > eclipse cbi maybe?)
>> >
>> >
>> > Am 13.12.21 um 17:48 schrieb Ed Merks:
>> >> Christoph,
>> >>
>> >> Comments below.
>> >>
>> >> On 13.12.2021 17:29, Christoph Läubrich wrote:
>> >>> Hi Ed,
>> >>>
>> >>> I wonder if it would not be possible to publish a general purpose
>> >>> "CVE mitigation" Updatesite everyone could add to an existing
>> >>> eclipse install.
>> >> Of course not everyone has Passage installed, nor this specific
>> >> bundle...
>> >>>
>> >>> Such an Updatesite could contain a Unit for a given CVE (e.g.
>> >>> CVE-2021-44228 in this case) that defines a negative requirement on
>> >>> any affected version (in this case any org.apache.logging.log4j with
>> >>> version range < 2.15).
>> >> Yes that's theoretically possible.  (And in the catalog I can easily
>> >> do this, but not all installation are installed from the catalog.)
>> >>>
>> >>> What will happen then is that P2 will give the user the choice to
>> >>> install this mitigation unit and uninstall
>> >> P2 generally wants to install features so such a thing would need to
>> >> be packaged up as a feature...
>> >>>
>> >>> a) the dangerous bundle
>> >>> b) any dependent and affected unit (passage in this case)
>> >>>
>> >>> from the current IDE.
>> >> One problem is we don't know all the things that strictly require the
>> >> older bundle.  The parts of Passage contributed to the train only
>> >> have lower bounds, but there are Passage features that include this
>> >> bundle with an exact range...
>> >>>
>> >>> Once an Update is in place, passage could be installed (e.g. with a
>> >>> separate update-site) again including a fixed version of the
>> >>> problematic dependecy.
>> >>>
>> >> Another question is what else out there that might already be
>> >> installed depend on logging.log4j and would also need to be updated
>> >> or uninstalled?  That's an open ended question...
>> >>> Even though such a site would currently need some kind of
>> >>> handcrafted metadata, we could enhance this so we probably once have
>> >>> some automatic import of CVE from public databases and automatic
>> >>> notification of users about new CVE affecting their IDE.
>> >>>
>> >> Yes, such a thing will follow some pattern so generating such a thing
>> >> would be good...
>> >>> Including such a site in a target platform of a build could
>> >>> effectively fail the build (and make projects automatically aware of
>> >>> new problems) as they arise, also preventing one from including
>> >>> problematic dependencies in the future.
>> >> In the end it at the simplest, it could just be a feature with p2.inf
>> >> with negative requirements for bundles that have been determined to
>> >> be unsafe.
>> >>> What do you think does this sounds reasonable?
>> >> It's a creative idea.  I like it.
>> >>> Am 12.12.21 um 14:07 schrieb Ed Merks:
>> >>>> Alexander,
>> >>>>
>> >>>> Will you set the lower bound to force the fixed version and to
>> >>>> disallow the older version?
>> >>>>
>> >>>> If only the installer and its product catalogs were involved, I
>> >>>> could fix the problem easily by adding an update site and forcing
>> >>>> the version range to install the fixed version.  I wouldn't even
>> >>>> need a new version of Passage to force/fix that...
>> >>>>
>> >>>> But we're also talking about the release train repository, which
>> >>>> would need a respin.  Unfortunately there are updates in the SimRel
>> >>>> repo after the 2021-12 tag:
>> >>>>
>> >>>> Some of those will be needed because the
>> >>>> https://download.eclipse.org/eclipse/updates/4.22-I-builds
>> >>>> repository is gone.  Hopefully other projects contributed stable
>> >>>> repositories with unchanging released content rather than pointing
>> >>>> at "moving target" that has changed its content since the release.
>> >>>>
>> >>>> If we decide we need to do a respin and we accomplish that, then
>> >>>> EPP needs to respin as well.   This will be something the Planning
>> >>>> Council will need to discuss and to decide which actions to take.
>> >>>>
>> >>>> Only you know how Passage uses the logging facility to know if
>> >>>> there is in actual fact a risk.  I.e., is Passage actually logging
>> >>>> information obtained from an internet connection and is that
>> >>>> actually enabled/activated in the RCP/RAP package itself? I.e.,
>> >>>> does what Jens Lideström outlined apply?  (Thanks Jens!)  If not,
>> >>>> then perhaps we're unduly alarmed.  I could see nothing that
>> >>>> appears to be related to Passage in an IDE into which I installed
>> >>>> Passage, i.e., no preferences, no wizards, no views, nothing
>> >>>> obvious.   Is it perhaps the case that the security problems would
>> >>>> only manifest themselves in applications where Passage is deployed
>> >>>> at runtime for licensing control of that application?
>> >>>>
>> >>>> Please try to outline the risk factors of Passage's development
>> >>>> tools being installed in a IDE application to help inform the
>> >>>> Planning Council in making a decision.
>> >>>>
>> >>>> P.S., Passage in the only component on the 2021-12 train that is
>> >>>> affected; I cannot comment on all Eclipse-distributed content in
>> >>>> general...
>> >>>>
>> >>>> Regards,
>> >>>> Ed
>> >>>>
>> >>>> On 12.12.2021 11:04, Alexander Fedorov wrote:
>> >>>>> Passage Team is working to provide Eclipse Passage 2.2.1 that will
>> >>>>> consume fixed logger from
>> >>>>>
>> https://download.eclipse.org/tools/orbit/downloads/drops2/I20211211225428/repository
>> >>>>>
>> >>>>>
>> >>>>> Ed, how could we then provide an update for released SimRel 2021-12?
>> >>>>>
>> >>>>> Regards,
>> >>>>> AF
>> >>>>>
>> >>>>> P.S. I'm really surprised to have the only component affected
>> >>>>> after having org.apache.*logging**.log4j 2.8.2 *published in
>> >>>>> Eclipse Orbit starting from 2020-09 (6 releases).
>> >>>>>
>> >>>>>
>> >>>>>
>> >>>>> 12/12/2021 12:41 PM, Ed Merks пишет:
>> >>>>>>
>> >>>>>> Just to avoid any confusion such as that which Ed Willink
>> >>>>>> mentioned, the
>> >>>>>> https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44228
>> >>>>>> issue is specifically about the class
>> >>>>>> org.apache.logging.log4j.core/lookup.JndiLookup.which is not in a
>> >>>>>> package provided by org.apache.*log4j *but rather in a package
>> >>>>>> provided by org.apache.*logging**.log4j *as illustrated here in a
>> >>>>>> CBI p2 aggregator repo view:
>> >>>>>>
>> >>>>>> Based on the analysis tool I've been developing for better
>> >>>>>> managing SimRel, e.g., to provide traceability and dependency
>> >>>>>> analysis, it's definitely the case that only Passage depends on
>> >>>>>> this bundle:
>> >>>>>>
>> >>>>>>
>> >>>>>> Specifically via bundle requirements (as opposed to package
>> >>>>>> requirements):
>> >>>>>>
>> >>>>>>
>> >>>>>> Those requirements have no upper bound, only an inclusive lower
>> >>>>>> bound, such that they will resolve and use any higher version of
>> >>>>>> org.apache.logging.log4j.  As such, installing Passage with
>> >>>>>>
>> https://download.eclipse.org/tools/orbit/downloads/drops2/I20211211225428/repository
>> >>>>>> in the available sites and enabling to use those, does install
>> >>>>>> the newer version:
>> >>>>>>
>> >>>>>>
>> >>>>>> The bad news is that the RCP/RAP package contains Passage and
>> >>>>>> hence the bad version of the org.apache.logging.log4j bundle.
>> >>>>>>
>> >>>>>> What's not clear is whether Passage actually logs messages whose
>> >>>>>> content can be externally subverted/exploited via contact to the
>> >>>>>> web and whether such actions are activity is actually enabled by
>> >>>>>> default, e.g., in the RCP/RAP package...
>> >>>>>>
>> >>>>>> Regards,
>> >>>>>> Ed
>> >>>>>>
>> >>>>>>
>> >>>>>> On 11.12.2021 20:48, Gunnar Wagenknecht wrote:
>> >>>>>>> Thanks Matthias!
>> >>>>>>>
>> >>>>>>> According to Wayne, 2.15 has already been vetted and is good for
>> >>>>>>> use:
>> >>>>>>>
>> https://www.eclipse.org/lists/eclipse.org-committers/msg01333.html
>> >>>>>>>
>> >>>>>>> -Gunnar
>> >>>>>>>
>> >>>>>>> --
>> >>>>>>> Gunnar Wagenknecht
>> >>>>>>> gun...@wagenknecht.org, http://guw.io/
>> >>>>>>>
>> >>>>>>>
>> >>>>>>>
>> >>>>>>>> On Dec 11, 2021, at 20:36, Matthias Sohn
>> >>>>>>>> <matthias.s...@gmail.com> wrote:
>> >>>>>>>>
>> >>>>>>>> On Sat, Dec 11, 2021 at 11:35 AM Gunnar Wagenknecht
>> >>>>>>>> <gun...@wagenknecht.org> wrote:
>> >>>>>>>>
>> >>>>>>>>     Alexander,
>> >>>>>>>>
>> >>>>>>>>>     On Dec 11, 2021, at 10:16, Alexander Fedorov
>> >>>>>>>>>     <alexander.fedo...@arsysop.ru> wrote:
>> >>>>>>>>>     It would be great to learn vulnerability clean-up process
>> >>>>>>>>> with
>> >>>>>>>>>     Eclipse Orbit team to then apply it to Eclipse Passage.
>> >>>>>>>>
>> >>>>>>>>
>> >>>>>>>>     There is no Orbit team. Orbit is driven by project committers
>> >>>>>>>>     using/needing libraries in Orbit.
>> >>>>>>>>     I encourage the Eclipse Passage project to submit a Gerrit
>> >>>>>>>>     review for a newer version.
>> >>>>>>>>
>> >>>>>>>>
>> >>>>>>>> considering the buzz around this vulnerability I went ahead and
>> >>>>>>>> pushed an update to log4j 2.15 for orbit
>> >>>>>>>> https://git.eclipse.org/r/c/orbit/orbit-recipes/+/188768
>> >>>>>>>> note that the required clearlydefined score isn't reached yet,
>> >>>>>>>> if this doesn't change soon
>> >>>>>>>> maybe someone can contribute the missing information to
>> >>>>>>>> clearlydefined or
>> >>>>>>>> we file CQs to get the license approval for the new version
>> >>>>>>>>
>> >>>>>>>>     You can also try a new way as described by Mickael here:
>> >>>>>>>> https://www.eclipse.org/lists/orbit-dev/msg05509.html
>> >>>>>>>>
>
>
> _______________________________________________
> cross-project-issues-dev mailing list
> cross-project-issues-dev@eclipse.org
> To unsubscribe from this list, visit
> https://www.eclipse.org/mailman/listinfo/cross-project-issues-dev
>
_______________________________________________
cross-project-issues-dev mailing list
cross-project-issues-dev@eclipse.org
To unsubscribe from this list, visit 
https://www.eclipse.org/mailman/listinfo/cross-project-issues-dev

Reply via email to