On 18/12/2021 22:52, Hen wrote:
I was looking at Andrew's excellent clarifications to the CVE process
language ( https://github.com/apache/www-site/pull/109 ), and one out of
scope thought I had was to add a couple of steps/substeps.

Currently it says:

     "The project team commits the fix. Do not make any reference that the
commit relates to a security vulnerability."

I was wondering on stretching that out into the larger text of:

     "The project creates a plan for committing the fix and reviews this
with the Security Team. Once approved, the project team commits the fix.
This commit will not make any reference that the commit relates to a
security vulnerability."

I think this has hit the nail on the head regarding a key problem: How to educate project teams about the difficulties of navigating that fine line between having to to commit the fix to a public repository without giving away the fact that the commit is addressing a security vulnerability.

I don't think there is a one size fits all solution to this. Some projects have been doing this successfully for years (decades even for some) and we don't want to add overhead to those projects.

At the other end of the spectrum there are projects that have never received a vulnerability report before. When a project's processes are set up to do things in public, it is all too easy for information to accidentally leak via a public bug report, PR or similar created in response to a security issue.

I don't have a good solution for this.

In outline, the solution is almost certainly more input from those with experience of handling security issues. It is the detail of how to do that I don't have. Whether those with the necessary experience are willing and able to volunteer the time required is a separate question/problem.

Mark

---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]

Reply via email to