Many thanks Fabian

and sorry for the delay - unfortunately I'm not really able to free up
as much time as necessary for any OSS stuff right now

On 2021-05-03, Fabian Meumertzheim wrote:

> The behavior you are observing has only become the standard somewhat
> recently [1], which is also why I had decided to point it out before we
> performed the integration [2].

> [1] https://github.com/google/oss-fuzz/issues/5255

I must have overlooked that back then - or just didn't understand what
it meant. One key is the phrase "after a patch is released" which also
is used in [1] which means a completely different thing to ASF
communities than to the person opening the issue above. Nobody around
here would argue against disclosing details of a vulnerability after a
new release containing the fix is available.

The best we can do probably is pointing out that the new policy is
incompatible with the ASF security policy - point 14 in

https://www.apache.org/security/committers.html#vulnerability-handling

without trying to argue who is right. Going from there we will see
whether there is an option for ASF projects to continue using OSS Fuzz
or not. Unfortunately I believe this discussion must be driven by
somebody with a predictable and sufficiently large slice of time for
this, which I will not be for at least the next week, likely longer.

Unless anybody else jumps in I'll take it on myself once I believe to be
available. Fortunately so far no issues have shown up that would force
ou hand - and even if something came up I'm sure we could figure out
some sort of singular exemption.

Stefan

---------------------------------------------------------------------
To unsubscribe, e-mail: dev-unsubscr...@commons.apache.org
For additional commands, e-mail: dev-h...@commons.apache.org

Reply via email to