#167 Vulnerability Management policy
Opened 3 years ago by salimma. Modified 8 months ago
salimma/epel security  into  main

Vulnerability Management policy
Michel Alexandre Salim • 3 years ago  
file modified
+1
@@ -7,6 +7,7 @@ 

  ** xref:epel-policy-incompatible-upgrades.adoc[Incompatible Upgrades]

  ** xref:epel-policy-scl.adoc[Software Collections (SCL)]

  ** xref:epel-policy-missing-sub-packages.adoc[Missing RHEL Sub-Packages]

+ ** xref:epel-policy-vuln-mgmt.adoc[Vulnerability Management]

  * xref:epel-help.adoc[Helping EPEL]

  ** xref:epel-qa.adoc[EPEL QA]

  ** xref:epel-packaging.adoc[Packaging]

@@ -0,0 +1,53 @@ 

+ include::partial$attributes.adoc[]

+ = EPEL Vulnerability Management Policy

+ :toc:

+ 

+ [[epel_vuln_mgmt_policy]]

+ 

+ This document describes the policy for security updates to packages in the EPEL

+ package collection. For general EPEL package guidelines, refer to the

+ xref:epel-policy.adoc[EPEL Guidelines and Policy] page.

+ 

+ [[cve_review]]

+ == Regular reviews

+ Open CVEs of severity high and above are reviewed by the EPEL

+ Steering Committee on a monthly basis.

+ 

+ [[triaging_cves]]

+ == Triaging CVEs

+ 

+ CVEs might not be actionable, for various reasons. This section provides some

+ guidelines for what to do in some of these scenarios.

+ 

+ * Waiting on upstream

+   either set the bug to `ASSIGNED`, or `CLOSE` the bug as `DEFERRED`

+ * Tracking bug covers multiple CVEs, and only some are fixed

+   * if you think the remaining CVEs will be addressed soon, push a security

+     update without closing the bug

+   * if the ETA for the remaining CVEs is unclear, `CLOSE` as `DEFERRED`

+ 

+ 

+ [[stalled_cves]]

+ == Stalled CVEs

+ 

+ There are times that an EPEL package maintainer is not responding to a CVE bug. During the regular CVE reviews, the EPEL Steering Committee has the following options, ordered by intrusiveness:

+ 

+ * if the CVE is actually addressed in the latest update, note the fixed version

+   and close the bug

+ * if the package should not be in EPEL - see

What does this mean "should not be in EPEL"?
If a package shouldn't be in EPEL, that has nothing to do with CVE checking.

+   xref:epel-policy.adoc#policy_for_conflicting_packages[Policy for Confligting

s/Confligting/Conflicting/

+   Packages] - retire it and close the bugs (either with `provenpackager` access

+   or by `NEEDINFO`-ing the bug assignee)

+ * if the bug seems critical enough, and is actionable, use `provenpackager`

+   access to put up an update. The EPEL Packagers SIG or any Steering Committe

These bullet points seem to be using a mix of sentence fragments and complete sentences. We should stick with doing it one way or the other, with the appropriate capitalization and punctuation.

+   member could also follow the

+   xref:epel-policy.adoc#stalled_epel_requests[Stalled EPEL Requests] policy to

+   get access to the package

+ * if the bug is critical bug not actionable, same as the above but retire the package - but provide heads up to the maintainer first using `NEEDINFO`
sobek commented 3 years ago

I would change (I am not a native English speaker, hence might be wrong):
- "critical bug not" to "critical, but not" (or "critical and not")
- "above but retire" to "above, but retire" (or "above and retire")

+ 

+ [[related_policies]]

+ == Related Policies

+ 

+ * xref:epel-policy-updates[EPEL Updates Policy]

+   Note that the policy for xref:epel-policy-updates#stable_releases[stable releases] already allows short-circuiting the notice period for incompatible upgrades, for security issues

+ * xref:epel-policy-incompatible-upgrades[Incompatible upgrades policy]

@@ -197,6 +197,8 @@ 

  you must, the new version that provides only the fix. Try and avoid

  pushing other changes with a security update.

  

+ See also xref:epel-poilcy-vuln-mgmt.adoc[vulnerability management policy].

+ 

  [[add_more_examples_as_they_show_up]]

  == Add more examples as they show up

  

Vulnerability Management policy, as part of the discussions around https://pagure.io/epel/issue/159

Signed-off-by: Michel Alexandre Salim salimma@fedoraproject.org

What does this mean "should not be in EPEL"?
If a package shouldn't be in EPEL, that has nothing to do with CVE checking.

What does this mean "should not be in EPEL"?
If a package shouldn't be in EPEL, that has nothing to do with CVE checking.

true, but this actually happened - libvncserver had lots of CVEs, and we only found out and retire it as part of looking at CVEs

I would change (I am not a native English speaker, hence might be wrong):
- "critical bug not" to "critical, but not" (or "critical and not")
- "above but retire" to "above, but retire" (or "above and retire")

These bullet points seem to be using a mix of sentence fragments and complete sentences. We should stick with doing it one way or the other, with the appropriate capitalization and punctuation.

After the big restructuring, this PR got into a state that can't be fixed by just rebasing. The change is small, since it only involves the nav file, but if you want to continue working on this, I rebased it on this branch.

https://pagure.io/fork/dherrera/epel/tree/pr-307-rebase