The JIRA issue linked appears to be one of those reported based on the
existing CVE's that were generated for jxpath.

I opened the CVE, and the link is to an oss-fuzz bug indeed:
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=47133

If you look at the left side bar, there is a list of people notified of
this issue. It should match what's in the project.yaml file I linked above
in GitHub oss-fuzz repository. As far as I know, that OSS Fuzz fuzzing
issue was reported to those parties, but unfortunately didn't reach a
developer in commons able to work following our security process to tackle
the issue and release a new version.

-Bruno

On Tue, 11 Oct 2022 at 10:36, Bruno Kinoshita <ki...@apache.org> wrote:

> Hi Eric,
>
> As far as I know, there is no integration between issues found in OSS Fuzz
> and our JIRA. Issues reported in OSS Fuzz exist only there. And security
> issues shouldn't go to JIRA if possible (according to ASF's security
> policies, I believe?).
>
> Here's the workflow I have been using for Commons Imaging:
>
>
>    1. View issues
>       1. Log in to oss-fuzz.com with my GitHub log in (there's a Google
>       one too). It recognizes that my email is authorized to view oss-fuzz 
> issues
>       for the apache-commons project, so it shows the “Testcases” with crashes
>       for the fuzzer. OR
>       2. Get the direct link to a Testcase from an email from
>       2. Expand a Testcase
>    3. Read the Stacktrace
>    4. Download the Unminimized Testcase - this is the payload used for
>    testing, in the case of Imaging this is normally a PNG, GIF, etc. image
>    file that was automatically generated by the fuzzer
>    5. Test with Commons Imaging and other tools to validate the issue
>    (e.g. GIMP, exiftool, etc)
>       1. If I reproduce it locally, and identify as something that
>       doesn't need to be fixed (e.g. a file with a thumbnail that wants to
>       allocate 10GB of memory in a 2GB JVM/server) then I can mark the 
> testcase
>       as not security or fixed
>       2. If I reproduce it locally and the issue is indeed a security
>       issue, then I prepare a fix and work following the Apache Commons 
> Security
>       guidelines: https://commons.apache.org/security.html
>
> This way OSS Fuzz issues contribute positively to the project, identifying
> issues I or other maintainers wouldn't have picked otherwise. We follow the
> Commons and ASF security process as best as we can as volunteers (i.e.
> within a time frame we can allocate to work on this issue) to fix the issue
> and prepare a CVE if needed, cutting a new release.
>
> This is the complete process that I've used in Imaging. Not sure if jxpath
> must follow the same process, but I guess it would be something similar, or
> at least according to Commons & ASF security guidelines and processes.
>
> -Bruno
>
>
> On Tue, 11 Oct 2022 at 10:25, Eric Bresie <ebre...@gmail.com> wrote:
>
>> Or is that this
>> https://issues.apache.org/jira/projects/JXPATH/issues/JXPATH-200?filter=allopenissues
>>
>> Get Outlook for iOS<https://aka.ms/o0ukef>
>> ________________________________
>> From: Eric Bresie <ebre...@gmail.com>
>> Sent: Monday, October 10, 2022 4:22:42 PM
>> To: Commons Developers List <dev@commons.apache.org>
>> Subject: Re: [jxpath] reported CVE and path forward
>>
>> So then discussed here (1) (which assume is what’s being done here) and
>> bugs raised here (2)?  Has (2) been done yet?
>>
>>   1.  https://commons.apache.org/proper/commons-jxpath/mail-lists.html
>>   2.
>> https://commons.apache.org/proper/commons-jxpath/issue-tracking.html
>>
>>
>> Get Outlook for iOS<https://aka.ms/o0ukef>
>> ________________________________
>> From: Bruno Kinoshita <ki...@apache.org>
>> Sent: Monday, October 10, 2022 4:15:03 PM
>> To: Commons Developers List <dev@commons.apache.org>
>> Subject: Re: [jxpath] reported CVE and path forward
>>
>> Hi Eric,
>>
>> For my understanding, is oss-fuzz an open source project that is
>> maintained
>> > and managed by Google (and is not an Apache project) but is for “fuzz
>> > testing” with portion focused on Apache common products?
>> >
>>
>> That's my understanding too, although I am not sure if it is maintained
>> and
>> managed solely by Google. But you are correct in that oss-fuzz is not an
>> Apache project. It is an external service similar to GitHub Actions,
>> Dependabot, Codecov, etc.
>>
>> So am I correct in saying run oss-fuzz against Apache-common, which may
>> > find problems in commons.  So any findings would be identified as a bug
>> and
>> > fix as applicable?
>> >
>>
>> That sounds correct to me.
>>
>> There is an apache-commons oss-fuzz project created in the oss-fuzz GitHub
>> repository. That becomes a project in the oss-fuzz web system which I and
>> other ASF members have access to - anyone from ASF can request access:
>> https://oss-fuzz.com
>>
>> It was created some time ago, and Commons Imaging was one of the first
>> included. We (ASF Commons) were involved in setting up that project, so
>> that someone from ASF would receive notifications (by being CC'ed in
>> oss-fuzz notifications). We decided against using the dev-list, so only
>> those that volunteered at the time receive emails.
>>
>> I checked the GitHub repository today, and found other Commons Components,
>> that are not part of the apache-commons project, and that have the
>> notifications configured to emails of a security company. So in this case
>> the findings in Commons repositories would be identified as a bug and
>> report to that company, without - as far as I can tell - involvement of
>> ASF
>> Commons devs.
>>
>> Hope that clarifies,
>>
>> Bruno
>>
>>
>> On Tue, 11 Oct 2022 at 10:06, Eric Bresie <ebre...@gmail.com> wrote:
>>
>> > For my understanding, is oss-fuzz an open source project that is
>> > maintained and managed by Google (and is not an Apache project) but is
>> for
>> > “fuzz testing” with portion focused on Apache common products?
>> >
>> > So am I correct in saying run oss-fuzz against Apache-common, which may
>> > find problems in commons.  So any findings would be identified as a bug
>> and
>> > fix as applicable?
>> >
>> >
>> > Get Outlook for iOS<https://aka.ms/o0ukef>
>> > ________________________________
>> > From: Bruno Kinoshita <ki...@apache.org>
>> > Sent: Monday, October 10, 2022 3:51:30 PM
>> > To: Commons Developers List <dev@commons.apache.org>
>> > Subject: Re: Re: [jxpath] reported CVE and path forward
>> >
>> > Hi Matt,
>> >
>> > I am also subscribed to oss-fuzz for Imaging.
>> >
>> > Looks like someone added jxpath to oss-fuzz here:
>> > https://github.com/google/oss-fuzz/pull/7582
>> >
>> > The initial oss-fuzz for ASF was, if I recall correctly, all put under a
>> > single project:
>> > https://github.com/google/oss-fuzz/tree/master/projects/apache-commons
>> >
>> > If you go one level higher in that repository link, you will see there
>> are
>> > now other projects in oss-fuzz for other Commons components.
>> >
>> > The apache-commons project (that contains Imaging, Compress, and
>> Geometry)
>> > had a custom policy, agreed in the mailing list and later with someone
>> that
>> > maintained oss-fuzz, where ASF issues were not disclosed in 90 days, but
>> > instead gave us more time to align the issues with our ASF process.
>> >
>> > I am not sure if these other projects follow similar policy, nor if the
>> ASF
>> > developers are aware of the integration (I only keep an eye on
>> > compress/imaging/geometry notifications from the apache-commons
>> project).
>> > Also not sure whether it's better to have everything in a single
>> project in
>> > oss-fuzz or in separate projects. I'm happy with Imaging being a single
>> > oss-fuzz project if needed, but I prefer to keep the policy of giving a
>> > longer time to review the issues. I try to review important issues
>> quickly,
>> > but the ones that I know are very low priority or won't be fixed (e.g.
>> OOM)
>> > I leave for later.
>> >
>> > Cheers
>> > Bruno
>> >
>> > On Tue, 11 Oct 2022 at 09:01, Matt Sicker <boa...@gmail.com> wrote:
>> >
>> > > I get emails about some of the Commons fuzzing things, but I was only
>> > > aware of it being enabled for compress and imaging.
>> > >
>> > > On Mon, Oct 10, 2022 at 1:37 PM Roman Wagner
>> > > <wag...@code-intelligence.com> wrote:
>> > > >
>> > > > Hi all,
>> > > >
>> > > > I am working for Code Intelligence we did our best to find a
>> maintainer
>> > > for
>> > > > the oss-fuzz project. Unfortunately we've got no feedback until now,
>> > but
>> > > It
>> > > > seems to be an unmaintained project except for some typo fixes since
>> > some
>> > > > years. I am not sure yet to which mailing list the bug report was
>> send
>> > > to,
>> > > > but I will check that information with the team.
>> > > >
>> > > > However, I am really happy that there is some interest in fixing the
>> > > RCE. I
>> > > > have verified the vulnerability and for me it seems to be a valid
>> > > > RCE. @Mark Thomas should we continue to discuss further details via
>> > > > secur...@apache.org?
>> > > >
>> > > > Best regards
>> > > > Roman
>> > >
>> > > ---------------------------------------------------------------------
>> > > To unsubscribe, e-mail: dev-unsubscr...@commons.apache.org
>> > > For additional commands, e-mail: dev-h...@commons.apache.org
>> > >
>> > >
>> >
>>
>

Reply via email to