Hi Matt,

I don't think this fuzz project should be making any of these issues
> public unless they plan to donate some developers to fix the issues,
> too. This is an ASF project, not some Google-sponsored OSS project
> staffed with Google employees.
>

I agree. This was the reason for the apache-commons project with a
different policy.

In my opinion, the issue here is a company that profits from security
testing services/software-as-service setting up oss-fuzz to send
notifications to their internal team. Even though they say they tried to
communicate with us, a delay in having a response should not mean they must
make it public anyway.

It would be fine (again, IMO) to bring those Commons components under the
apache-commons oss-fuzz project, and remove the existing projects that do
not notify anyone from the ASF. That way we would receive notifications and
could take some action to fix it.

Bruno

On Tue, 11 Oct 2022 at 10:57, Matt Sicker <boa...@gmail.com> wrote:

> I don't think this fuzz project should be making any of these issues
> public unless they plan to donate some developers to fix the issues,
> too. This is an ASF project, not some Google-sponsored OSS project
> staffed with Google employees.
>
> On Mon, Oct 10, 2022 at 4:41 PM Bruno Kinoshita <ki...@apache.org> wrote:
> >
> > The JIRA issue linked appears to be one of those reported based on the
> > existing CVE's that were generated for jxpath.
> >
> > I opened the CVE, and the link is to an oss-fuzz bug indeed:
> > https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=47133
> >
> > If you look at the left side bar, there is a list of people notified of
> > this issue. It should match what's in the project.yaml file I linked
> above
> > in GitHub oss-fuzz repository. As far as I know, that OSS Fuzz fuzzing
> > issue was reported to those parties, but unfortunately didn't reach a
> > developer in commons able to work following our security process to
> tackle
> > the issue and release a new version.
> >
> > -Bruno
> >
> > On Tue, 11 Oct 2022 at 10:36, Bruno Kinoshita <ki...@apache.org> wrote:
> >
> > > Hi Eric,
> > >
> > > As far as I know, there is no integration between issues found in OSS
> Fuzz
> > > and our JIRA. Issues reported in OSS Fuzz exist only there. And
> security
> > > issues shouldn't go to JIRA if possible (according to ASF's security
> > > policies, I believe?).
> > >
> > > Here's the workflow I have been using for Commons Imaging:
> > >
> > >
> > >    1. View issues
> > >       1. Log in to oss-fuzz.com with my GitHub log in (there's a
> Google
> > >       one too). It recognizes that my email is authorized to view
> oss-fuzz issues
> > >       for the apache-commons project, so it shows the “Testcases” with
> crashes
> > >       for the fuzzer. OR
> > >       2. Get the direct link to a Testcase from an email from
> > >       2. Expand a Testcase
> > >    3. Read the Stacktrace
> > >    4. Download the Unminimized Testcase - this is the payload used for
> > >    testing, in the case of Imaging this is normally a PNG, GIF, etc.
> image
> > >    file that was automatically generated by the fuzzer
> > >    5. Test with Commons Imaging and other tools to validate the issue
> > >    (e.g. GIMP, exiftool, etc)
> > >       1. If I reproduce it locally, and identify as something that
> > >       doesn't need to be fixed (e.g. a file with a thumbnail that
> wants to
> > >       allocate 10GB of memory in a 2GB JVM/server) then I can mark the
> testcase
> > >       as not security or fixed
> > >       2. If I reproduce it locally and the issue is indeed a security
> > >       issue, then I prepare a fix and work following the Apache
> Commons Security
> > >       guidelines: https://commons.apache.org/security.html
> > >
> > > This way OSS Fuzz issues contribute positively to the project,
> identifying
> > > issues I or other maintainers wouldn't have picked otherwise. We
> follow the
> > > Commons and ASF security process as best as we can as volunteers (i.e.
> > > within a time frame we can allocate to work on this issue) to fix the
> issue
> > > and prepare a CVE if needed, cutting a new release.
> > >
> > > This is the complete process that I've used in Imaging. Not sure if
> jxpath
> > > must follow the same process, but I guess it would be something
> similar, or
> > > at least according to Commons & ASF security guidelines and processes.
> > >
> > > -Bruno
> > >
> > >
> > > On Tue, 11 Oct 2022 at 10:25, Eric Bresie <ebre...@gmail.com> wrote:
> > >
> > >> Or is that this
> > >>
> https://issues.apache.org/jira/projects/JXPATH/issues/JXPATH-200?filter=allopenissues
> > >>
> > >> Get Outlook for iOS<https://aka.ms/o0ukef>
> > >> ________________________________
> > >> From: Eric Bresie <ebre...@gmail.com>
> > >> Sent: Monday, October 10, 2022 4:22:42 PM
> > >> To: Commons Developers List <dev@commons.apache.org>
> > >> Subject: Re: [jxpath] reported CVE and path forward
> > >>
> > >> So then discussed here (1) (which assume is what’s being done here)
> and
> > >> bugs raised here (2)?  Has (2) been done yet?
> > >>
> > >>   1.
> https://commons.apache.org/proper/commons-jxpath/mail-lists.html
> > >>   2.
> > >> https://commons.apache.org/proper/commons-jxpath/issue-tracking.html
> > >>
> > >>
> > >> Get Outlook for iOS<https://aka.ms/o0ukef>
> > >> ________________________________
> > >> From: Bruno Kinoshita <ki...@apache.org>
> > >> Sent: Monday, October 10, 2022 4:15:03 PM
> > >> To: Commons Developers List <dev@commons.apache.org>
> > >> Subject: Re: [jxpath] reported CVE and path forward
> > >>
> > >> Hi Eric,
> > >>
> > >> For my understanding, is oss-fuzz an open source project that is
> > >> maintained
> > >> > and managed by Google (and is not an Apache project) but is for
> “fuzz
> > >> > testing” with portion focused on Apache common products?
> > >> >
> > >>
> > >> That's my understanding too, although I am not sure if it is
> maintained
> > >> and
> > >> managed solely by Google. But you are correct in that oss-fuzz is not
> an
> > >> Apache project. It is an external service similar to GitHub Actions,
> > >> Dependabot, Codecov, etc.
> > >>
> > >> So am I correct in saying run oss-fuzz against Apache-common, which
> may
> > >> > find problems in commons.  So any findings would be identified as a
> bug
> > >> and
> > >> > fix as applicable?
> > >> >
> > >>
> > >> That sounds correct to me.
> > >>
> > >> There is an apache-commons oss-fuzz project created in the oss-fuzz
> GitHub
> > >> repository. That becomes a project in the oss-fuzz web system which I
> and
> > >> other ASF members have access to - anyone from ASF can request access:
> > >> https://oss-fuzz.com
> > >>
> > >> It was created some time ago, and Commons Imaging was one of the first
> > >> included. We (ASF Commons) were involved in setting up that project,
> so
> > >> that someone from ASF would receive notifications (by being CC'ed in
> > >> oss-fuzz notifications). We decided against using the dev-list, so
> only
> > >> those that volunteered at the time receive emails.
> > >>
> > >> I checked the GitHub repository today, and found other Commons
> Components,
> > >> that are not part of the apache-commons project, and that have the
> > >> notifications configured to emails of a security company. So in this
> case
> > >> the findings in Commons repositories would be identified as a bug and
> > >> report to that company, without - as far as I can tell - involvement
> of
> > >> ASF
> > >> Commons devs.
> > >>
> > >> Hope that clarifies,
> > >>
> > >> Bruno
> > >>
> > >>
> > >> On Tue, 11 Oct 2022 at 10:06, Eric Bresie <ebre...@gmail.com> wrote:
> > >>
> > >> > For my understanding, is oss-fuzz an open source project that is
> > >> > maintained and managed by Google (and is not an Apache project) but
> is
> > >> for
> > >> > “fuzz testing” with portion focused on Apache common products?
> > >> >
> > >> > So am I correct in saying run oss-fuzz against Apache-common, which
> may
> > >> > find problems in commons.  So any findings would be identified as a
> bug
> > >> and
> > >> > fix as applicable?
> > >> >
> > >> >
> > >> > Get Outlook for iOS<https://aka.ms/o0ukef>
> > >> > ________________________________
> > >> > From: Bruno Kinoshita <ki...@apache.org>
> > >> > Sent: Monday, October 10, 2022 3:51:30 PM
> > >> > To: Commons Developers List <dev@commons.apache.org>
> > >> > Subject: Re: Re: [jxpath] reported CVE and path forward
> > >> >
> > >> > Hi Matt,
> > >> >
> > >> > I am also subscribed to oss-fuzz for Imaging.
> > >> >
> > >> > Looks like someone added jxpath to oss-fuzz here:
> > >> > https://github.com/google/oss-fuzz/pull/7582
> > >> >
> > >> > The initial oss-fuzz for ASF was, if I recall correctly, all put
> under a
> > >> > single project:
> > >> >
> https://github.com/google/oss-fuzz/tree/master/projects/apache-commons
> > >> >
> > >> > If you go one level higher in that repository link, you will see
> there
> > >> are
> > >> > now other projects in oss-fuzz for other Commons components.
> > >> >
> > >> > The apache-commons project (that contains Imaging, Compress, and
> > >> Geometry)
> > >> > had a custom policy, agreed in the mailing list and later with
> someone
> > >> that
> > >> > maintained oss-fuzz, where ASF issues were not disclosed in 90
> days, but
> > >> > instead gave us more time to align the issues with our ASF process.
> > >> >
> > >> > I am not sure if these other projects follow similar policy, nor if
> the
> > >> ASF
> > >> > developers are aware of the integration (I only keep an eye on
> > >> > compress/imaging/geometry notifications from the apache-commons
> > >> project).
> > >> > Also not sure whether it's better to have everything in a single
> > >> project in
> > >> > oss-fuzz or in separate projects. I'm happy with Imaging being a
> single
> > >> > oss-fuzz project if needed, but I prefer to keep the policy of
> giving a
> > >> > longer time to review the issues. I try to review important issues
> > >> quickly,
> > >> > but the ones that I know are very low priority or won't be fixed
> (e.g.
> > >> OOM)
> > >> > I leave for later.
> > >> >
> > >> > Cheers
> > >> > Bruno
> > >> >
> > >> > On Tue, 11 Oct 2022 at 09:01, Matt Sicker <boa...@gmail.com> wrote:
> > >> >
> > >> > > I get emails about some of the Commons fuzzing things, but I was
> only
> > >> > > aware of it being enabled for compress and imaging.
> > >> > >
> > >> > > On Mon, Oct 10, 2022 at 1:37 PM Roman Wagner
> > >> > > <wag...@code-intelligence.com> wrote:
> > >> > > >
> > >> > > > Hi all,
> > >> > > >
> > >> > > > I am working for Code Intelligence we did our best to find a
> > >> maintainer
> > >> > > for
> > >> > > > the oss-fuzz project. Unfortunately we've got no feedback until
> now,
> > >> > but
> > >> > > It
> > >> > > > seems to be an unmaintained project except for some typo fixes
> since
> > >> > some
> > >> > > > years. I am not sure yet to which mailing list the bug report
> was
> > >> send
> > >> > > to,
> > >> > > > but I will check that information with the team.
> > >> > > >
> > >> > > > However, I am really happy that there is some interest in
> fixing the
> > >> > > RCE. I
> > >> > > > have verified the vulnerability and for me it seems to be a
> valid
> > >> > > > RCE. @Mark Thomas should we continue to discuss further details
> via
> > >> > > > secur...@apache.org?
> > >> > > >
> > >> > > > Best regards
> > >> > > > Roman
> > >> > >
> > >> > >
> ---------------------------------------------------------------------
> > >> > > To unsubscribe, e-mail: dev-unsubscr...@commons.apache.org
> > >> > > For additional commands, e-mail: dev-h...@commons.apache.org
> > >> > >
> > >> > >
> > >> >
> > >>
> > >
>
> ---------------------------------------------------------------------
> To unsubscribe, e-mail: dev-unsubscr...@commons.apache.org
> For additional commands, e-mail: dev-h...@commons.apache.org
>
>

Reply via email to