Tuesday, 2022-07-19

d34dh0r53fungi: I can try to drive, can you point me to the documentation/notes on how to put out an advisory?12:48
fungid34dh0r53: yep, have a read through https://security.openstack.org/vmt-process.html and keep in mind that it refers to both private and public workflows (in this case we're following our public workflow)12:50
fungiper the the process diagram on that page, i already handled the reception step, so the next thing to work on is an impact description (which i've also partly written in my comment, but should be wordsmithed into our standard impact description template)12:51
d34dh0r53fungi: ok12:55
fungionce everyone's happy with the accuracy of the impact description, we can use that to request a cve assignment, and then we're basically waiting for the master branch fix that's already in review to merge and for someone to propose stable backports, at which point we can propose a change to the ossa repo to add the advisory metadata and hold there until all maintained stable branches12:55
fungiget fixes merged12:55
d34dh0r53fungi: so I'll use what you've written in the bug to craft the impact description, where do I put that for review?12:56
fungifor the draft impact description step, see the impact description template at the end of that document, and propose your adaptation of it in a bug comment12:56
fungithat's the easiest place for the vulnerability coordinators and the devs working on the fix to coordinate such information12:57
fungithe impact description, once okayed, will form the core wording for the information we include in our cve request and in any eventual advisory publication12:58
d34dh0r53ack12:59
fungid34dh0r53: you can look at the bug corresponding to our most recent ossa for an example, if it helps: https://launchpad.net/bugs/1942179 (my impact description draft is in comment #24, and it didn't end up needing revision)13:07
fungiin that particular case i didn't write the impact description until after the backports had merged, but usually we like to get started on that sooner13:08
fungiin the example, that's the wording which eventually ended up as the basis for https://security.openstack.org/ossa/OSSA-2021-006.html13:10
d34dh0r53got it, do we know the affected versions of this this one?13:13
fungid34dh0r53: if it can't be easily inferred from the description, ask the folks involved on the bug (in this case gibi or sean-k-mooney), but you can also start from an assumption that all existing versions are affected and branches listed as being in "maintained" state will have fixes backported and new point releases made: https://releases.openstack.org/13:17
fungiso that would be all historical nova versions prior to the next wallaby point release, all xena versions prior to the next xena point release, and all yoga versions prior to the next yoga point release13:19
fungiif someone manages to work out when the vulnerability was originally introduced into the codebase, we can put a lower bound at the start of the affected versions list and/or drop some ranges13:19
d34dh0r53ack13:20
fungibut to be conservative we typically assume all versions are affected unless someone confirms otherwise13:21
fungibetter to tell people to upgrade unnecessarily than mistakenly tell them they're safe13:21
fungiit's also easy enough to revise the affected versions once the backports are proposed, since that can give us a better idea (e.g. we can't backport this fix to wallaby because we discovered that the flaw merged after that time)13:24
fungiand we usually do a last-minute check of the affected versions list when reviewing the ossa prior to publication anyway, just in case we raced a point release on some branch and need to bump the version for it in the advisory13:25
d34dh0r53ok, understood13:26
funginone of the impact info is carved in stone, it's just a starting point. if we later discover we were wrong about something we can let mitre know to update the cve text, or even add an errata block in an already distributed advisory13:28
fungiand in the past we've sent out announcements about revisions to advisories if significant enough13:29
d34dh0r53ok, cool13:35
d34dh0r53I just posted the impact statement13:36
fungithanks! i'll read through it in a bit and leave feedback on the bug13:41
d34dh0r53fungi: ack, thanks13:42
fungid34dh0r53: i left a couple of suggestions in a followup comment, but looks great overall. thanks for putting that together!14:49
fungionce we have some loose consensus, the next step will be filling in the cve request form on mitre's website14:49
fungigagehugo: prometheanfire: dmendiza[m]: please take a look at the proposed impact description in comment #6 of https://launchpad.net/bugs/1981813 when you have a free moment. thanks!14:51
fungiin unrelated news, a fix has been proposed to swift for https://launchpad.net/bugs/1980954 so it's probably time to start thinking about whether that one will warrant an advisory too14:58

Generated by irclog2html.py 2.17.3 by Marius Gedminas - find it at https://mg.pov.lt/irclog2html/!