Joe Bohn wrote:
Is the omission of any discussion of a JIRA intentional? In other words, is it expected that a JIRA will *not* be created to document or track the code change and that CVE will be the only documentation of the issue (and then only after a server image has already been released by changing the commit log)?

Good point.  I believe we should create the JIRA as part of step #9.


If we are not creating a JIRA, then this brings up a documentation issue. Not announcing the issue until after a server release also causes some doc issues.
- We typically use JIRAs to identify all changes within a release.
- We include the list of JIRAs fixed and outstanding within the RELEASE_NOTES for each server release. - The RELEASE_NOTES are included in the server images so that anyone downloading a server image can easily understand what issues are resolved or still outstanding with that release. - So typically JIRAs must be resolved before we create a release candidate. The entire release (including the release notes) is then validated during the vote for the release candidate.

Security fixes are important, so it seems that they should be mentioned in the release notes. I also understand the sensitive nature of these issues and the possibility of exploitation. However, it seems that the code check-in itself already has the potential to make the exposure public for those watching carefully.

One possible solution would be to announce the vulnerability once we have a work-around available and/or a fix available in a SNAPSHOT image.

Agree that we need to be as open as possible. As part of step #9, I'd like to see us add a reference to the fix (but not the complete details) on our Security pages for each release. Step #12 would also be updated, to go back and add the CVE number and more details to the Security pages as each branch is released.

This will substantially shorten the time between the code changes and announce, thereby limiting possible exposure from those noticing or discussing the purpose of code changes. I image that even innocent questions about changes which are being inserted to resolve security issues could result in an exposure becoming public in an ad hoc manner. Waiting to validate a full release after code check-in might increase the possibility that the exposure could be exploited. And what happens if there are other issues with the release that cause it to drag on longer than expected?

However, a user can make an informed decision on how to proceed if we announce the resolution in a SNAPSHOT and they will get the information much more quickly. It will also allow the project to document the issue correctly in a formal release and address any other issues that arise in the release process.

Joe

Donald Woods wrote:
There was a long discussion around mid-December on the private and security Geronimo mailing lists about how to handle security vulnerabilities. The outcome of that discussion (which is mainly a boilerplate suggested by Mark Thomas for all projects to use) can be found on our Project Policies wiki page at -
  http://cwiki.apache.org/GMOxPMGT/geronimo-project-policies.html

If you see anything that needs changing or information that needs to be added, then please discuss on this thread.


Thanks,
Apache Geronimo PMC



Reply via email to