Thanks, applied to master.

On Tue, Mar 29, 2016 at 12:27:24PM -0600, Ryan Moats wrote:
> Yep, looks sensible...
> 
> Acked-by: Ryan Moats <rmo...@us.ibm.com>
> 
> "dev" <dev-boun...@openvswitch.org> wrote on 03/29/2016 01:07:53 PM:
> 
> > From: Ben Pfaff <b...@ovn.org>
> > To: dev@openvswitch.org
> > Cc: Ben Pfaff <b...@ovn.org>
> > Date: 03/29/2016 01:09 PM
> > Subject: [ovs-dev] [PATCH] SECURITY.md: Add advisory document details.
> > Sent by: "dev" <dev-boun...@openvswitch.org>
> >
> > Signed-off-by: Ben Pfaff <b...@ovn.org>
> > ---
> >  SECURITY.md | 104 +++++++++++++++++++++++++++++++++++++++++++++++++
> > ++++++++---
> >  1 file changed, 100 insertions(+), 4 deletions(-)
> >
> > diff --git a/SECURITY.md b/SECURITY.md
> > index 08a6ed8..33b85b5 100644
> > --- a/SECURITY.md
> > +++ b/SECURITY.md
> > @@ -101,16 +101,112 @@ determines that it is not a realistic
> vulnerability.
> >  Step 3a: Document
> >  ----------------
> >
> > -The security team develops a security advisory document.  The document
> > -credits the reporter and describes the vulnerability, including all of
> > -the relevant information from the assessment in step 2.  The security
> > +The security team develops a security advisory document.  The security
> >  team may, at its discretion, include the reporter (via "CC") in
> >  developing the security advisory document, but in any case should
> >  accept feedback from the reporter before finalizing the document.
> > -
> >  When the document is final, the security team should obtain a CVE for
> >  the vulnerability from a CNA (https://cve.mitre.org/cve/cna.html).
> >
> > +The document credits the reporter and describes the vulnerability,
> > +including all of the relevant information from the assessment in step
> > +2.  Suitable sections for the document include:
> > +
> > +    * Title: The CVE identifier, a short description of the
> > +      vulnerability.  The title should mention Open vSwitch.
> > +
> > +      In email, the title becomes the subject.  Pre-release advisories
> > +      are often passed around in encrypted email, which have plaintext
> > +      subjects, so the title should not be too specific.
> > +
> > +    * Description: A few paragraphs describing the general
> > +      characteristics of the vulnerability, including the versions of
> > +      Open vSwitch that are vulnerable, the kind of attack that
> > +      exposes the vulnerability, and potential consequences of the
> > +      attack.
> > +
> > +      The description should re-state the CVE identifier, in case the
> > +      subject is lost when an advisory is sent over email.
> > +
> > +    * Mitigation: How an Open vSwitch administrator can minimize the
> > +      potential for exploitation of the vulnerability, before applying
> > +      a fix.  If no mitigation is possible or recommended, explain
> > +      why, to reduce the chance that at-risk users believe they are
> > +      not at risk.
> > +
> > +    * Fix: Describe how to fix the vulnerability, perhaps in terms of
> > +      applying a source patch.  The patch or patches themselves, if
> > +      included in the email, should be at the very end of the advisory
> > +      to reduce the risk that a reader would stop reading at this
> > +      point.
> > +
> > +    * Recommendation: A concise description of the security team's
> > +      recommendation to users.
> > +
> > +    * Acknowledgments: Thank the reporters.
> > +
> > +    * Vulnerability Check: A step-by-step procedure by which a user
> > +      can determine whether an installed copy of Open vSwitch is
> > +      vulnerable.
> > +
> > +      The procedure should clearly describe how to interpret the
> > +      results, including expected results in vulnerable and
> > +      not-vulnerable cases.  Thus, procedures that produce clear and
> > +      easily distinguished results are preferred.
> > +
> > +      The procedure should assume as little understanding of Open
> > +      vSwitch as possible, to make it more likely that a competent
> > +      administrator who does not specialize in Open vSwitch can
> > +      perform it successfully.
> > +
> > +      The procedure should have minimal dependencies on tools that are
> > +      not widely installed.
> > +
> > +      Given a choice, the procedure should be one that takes at least
> > +      some work to turn into a useful exploit.  For example, a
> > +      procedure based on "ovs-appctl" commands, which require local
> > +      administrator access, is preferred to one that sends test
> > +      packets to a machine, which only requires network connectivity.
> > +
> > +      The section should say which operating systems it is designed
> > +      for.  If the procedure is likely to be specific to particular
> > +      architectures (e.g. x86-64, i386), it should state on which ones
> > +      it has been tested.
> > +
> > +      This section should state the risks of the procedure. For
> > +      example. if it can crash Open vSwitch or disrupt packet
> > +      forwarding, say so.
> > +
> > +      It is more useful to explain how to check an installed and
> > +      running Open vSwitch than one built locally from source, but if
> > +      it is easy to use the procedure from a sandbox environment, it
> > +      can be helpful to explain how to do so.
> > +
> > +    * Patch: If a patch or patches are available, and it is practical
> > +      to include them in the email, put them at the end.  Format them
> > +      as described in CONTRIBUTING.md, that is, as output by "git
> > +      format-patch".
> > +
> > +      The patch subjects should include the version for which they are
> > +      suited, e.g. "[PATCH branch-2.3]" for a patch against Open
> > +      vSwitch 2.3.x.  If there are multiple patches for multiple
> > +      versions of Open vSwitch, put them in separate sections with
> > +      clear titles.
> > +
> > +      Multiple patches for a single version of Open vSwitch, that must
> > +      be stacked on top of each other to fix a single vulnerability,
> > +      are undesirable because users are less likely to apply all of
> > +      them correctly and in the correct order.
> > +
> > +      Each patch should include a Vulnerability tag with the CVE
> > +      identifier, a Reported-by tag or tags to credit the reporters,
> > +      and a Signed-off-by tag to acknowledge the Developer's
> > +      Certificate of Origin.  It should also include other appropriate
> > +      tags, such as Acked-by tags obtained during review.
> > +
> > +CVE-2016-2074 is an example advisory document, available at:
> > +   http://openvswitch.org/pipermail/announce/2016-March/000082.html
> > +
> >
> >  Step 3b: Fix
> >  ------------
> > --
> > 2.1.3
> >
> > _______________________________________________
> > dev mailing list
> > dev@openvswitch.org
> > http://openvswitch.org/mailman/listinfo/dev
_______________________________________________
dev mailing list
dev@openvswitch.org
http://openvswitch.org/mailman/listinfo/dev

Reply via email to