Following on from a discussion at Code & Compliance...

There is currently an expectation in the CRA that a product will not be released if there are known (by the maintainer) security vulnerabilities in that product. However, there are some scenarios where OSS releases may be made without disclosing a known security vulnerability.

Dirk asked me to document these so he can raise them with the EU. Feel free to add additional scenarios and/or comment on these ones.

There is a general expectation behind all of these that the projects are following open development as well as producing open source. If development is not open, a parts (but not all) of the issues described below can be avoided.


1. Embargoed issue

Consider the case where the following are all true:
- the project is affected by a reported issue and that issue has an embargo for 3 months time
- the project has a regular monthly release cycle
- the nature of the issue and/or fix is such that project can't silently fix the issue with essentially disclosing the issue and breaking the embargo

If the project stops releases until after the embargo it is effectively declaring there is a security issue under embargo.

If the project continues monthly releases, it has to release without fixing the issue.

In most cases I would expect continuing releases (which may provide fixes for other issues) is the better option.

Not having long embargoes would also address this but there are some manufacturers for whom that would be difficult.

Real world example:
CVE-2025-48989 HTTP/2 Made You Rest and Apache Tomcat


2. Reports during release process

The release process is not instantaneous. In some OSS projects it can extend over a period of days as community members are given an opportunity to validate and/or review the release.

If a vulnerability report is received during the release process then the project team may make the decision to continue with the release even if the reported issue is determined to be valid.

Factors that may be taken into consideration include:
- is it possible to cancel the release without signalling that the release is being cancelled for a security issue (since that would focus attention on subsequent commits and significantly increase the risk of the vulnerability leaking before the fixed release was available) - what fixes (bugs and vulnerabilities) would be delayed if the release was cancelled
- how severe is the reported vulnerability
- are workarounds available for the reported vulnerability

Essentially, this is a risk assessment with the project making the decision which is the lowest risk option for the community as a whole.


3. Waiting on fix in dependency

Similar to 1 but rather than an embargo, the project is aware of an issue in a dependency but the fixed version of the dependency will not be available for several months.


4. Complicated fix.

Similar to 2 but in this case, due to the complexity of the issue and/or the fix, the project expects that the time taken to produce the fix will be longer than the typical release period (e.g. monthly) for the project.


Mark



---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]

Reply via email to