-
-
Notifications
You must be signed in to change notification settings - Fork 125
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
security: Improve our posture to announce critical CVEs #672
base: master
Are you sure you want to change the base?
Conversation
kallisti5
commented
Mar 30, 2024
- I think we should only commit to critical severity disclosures given the size of our team.
Isn't it more a Haikuports problem, than a Haiku problem anyway? |
xz_utils is generally a build-package, so will always be pre-installed in stable versions of Haiku. As pkgman updates update installed packages, all users without installing additional software can have the problematic xz_utils installed. With that said, pretty much every operating system distribution documents CVE's.
However, all of those operating systems can be servers, host sensitive data, etc. I think the bare minimum we can do as a desktop operating system where "everyone is root" is get in the habit of documenting critical severity CVE's (especially in build-packages) |
+1 for the content, though I wonder if this happens/will happen often enough to get its own segment, or whether (for now) this particular announcement should just be a news article. I am not saying that we should not try to implement better security practices, but elevating this to a special process might be perceived as making promises that we cannot keep. |
Yes, I'm not sure about this either. Are we actually monitoring new CVEs to decide if and how we are affected, or is it just "this is frontpage news on every website, so we should probably check on our side?"
And I also agree that this would be largely a haikuports problem, but still, Haiku users end up pretty directly affected (even more so because there isn't any kind of stable release, so the problems get directly into user's installs).
I guess at least the page should be clear about this: these are the big issues we know about, but we are not currently set up to actively watch for new problems (as far as I know, at least?). And so the list is likely to be incomplete.
|
Yup. This was actually a concern I had moving into it. One big reason for this is we might want to issue additional updates / guidance on steps users should take. Today, our only route seems to be sending additional emails to the haiku-security mailing list.
I agree with this. It's why i used "critical" severity in a lot of places. I don't think our team is big enough to document every CVE that comes along in the thousands of HaikuPorts, however we should at minimum document the "big scary ones" that are critical or above (especially in build-packages which everyone has pre-installed) In addition to all of this, maybe we want someone to assume a titled security officer role within the project? We could generate a new email ([email protected]) and have it forwarded to the "on-call" security person. Hobby or not, we are an operating system. Providing tracking and notification of severe security events is likely the bare minimum we should be doing. |
Fun side note going off topic. There's a filter on the US NVD that allows you to search based on a CPE (identifier for a piece of software) As an example, the CPE for tar is: An example for the CPE for tar 1.11.8 is: Theoretically, we could add a NVD_CPE="cpe:2.3:a:gnu:tar:${packageVersion}::::::" to the tar recipe, and show known CVE's at build via haikuporter...
Of course though, I can't find a CPE for xz 🥴 Or, store the CPE within the hpkg as a field, then action off of it later from installed hosts 🤔 |
* I think we should only commit to critical severity disclosures given the size of our team.
At repology potential vulnarable packages are listed, I've tackled quite a few in the past, but there are still quit a lot listed there (not all should/can be solved). |
Maybe we start even smaller and only publicly report on security issues discovered in Haiku-only code (not imported or Haikuports)? |