Re: Security release criterion proposal

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Wed, 2011-05-18 at 08:57 -0700, Adam Williamson wrote: 
> Hey, all. The topic of whether and which security issues should block
> releases has come up several times before. While we haven't actually had
> many really serious security issues to worry about since the
> introduction of the current release criteria system, I think it's
> certainly something we should take into account. At the same time, it's
> fairly established in practice that we don't just consider anything
> worth issuing a CVE for as a release-blocking bug. So, to capture what I
> believe would be the intent of the project, I propose this as an Alpha
> release criterion for F16 onwards. (For those on devel and security
> lists who may not be completely familiar with the release criteria /
> blocker system, this would mean that any bug for an issue which breached
> the criterion should be considered a release blocker for any Alpha, Beta
> or Final release).
> 
> # There must be no known remote code execution vulnerability which could
> be exploited during installation or during use of a live image shipped
> with the release

I mostly agree with this criterion with one exception below.

> Points to consider:
> 
> * Possible variants to the type of vulnerability covered...do we also
> want to make local privesc vulns blocking? Conversely, do we want to
> make only remote *root* execution vulns blocking? I don't know if anyone
> would want to go as far as making DoS vulns release blocking, but speak
> up if you would! (Of course there is again the local/remote distinction
> to consider there: 'all DoS vulns' would be a much tighter standard than
> 'remote DoS vulns').
> 
> * The caveat about where the issue is exploitable is important because
> if you can't exploit it from the installer or a live image, it becomes
> less relevant whether we ship with it or not, because you would be safe
> with the first post-install update assuming we submitted an update for
> the issue promptly. But it may be the case that we want to broaden it
> out to also cover issues that can be exploited from a default DVD
> install, if we consider the window between install and first update (if
> updates repos aren't used during installation) to be unacceptable.

I would vote for this slight broadening - that is to make also remotely
exploitable issue in the default DVD install a release blocker.

-- 
Tomas Mraz
No matter how far down the wrong road you've gone, turn back.
                                              Turkish proverb

--
security mailing list
security@xxxxxxxxxxxxxxxxxxxxxxx
https://admin.fedoraproject.org/mailman/listinfo/security


[Index of Archives]     [Fedora Users]     [Fedora Desktop]     [Fedora SELinux]     [Big List of Linux Books]     [Yosemite News]     [KDE Users]     [Coolkey]

  Powered by Linux