| |
@@ -0,0 +1,53 @@
|
| |
+ include::partial$attributes.adoc[]
|
| |
+ = EPEL Vulnerability Management Policy
|
| |
+ :toc:
|
| |
+
|
| |
+ [[epel_vuln_mgmt_policy]]
|
| |
+
|
| |
+ This document describes the policy for security updates to packages in the EPEL
|
| |
+ package collection. For general EPEL package guidelines, refer to the
|
| |
+ xref:epel-policy.adoc[EPEL Guidelines and Policy] page.
|
| |
+
|
| |
+ [[cve_review]]
|
| |
+ == Regular reviews
|
| |
+ Open CVEs of severity high and above are reviewed by the EPEL
|
| |
+ Steering Committee on a monthly basis.
|
| |
+
|
| |
+ [[triaging_cves]]
|
| |
+ == Triaging CVEs
|
| |
+
|
| |
+ CVEs might not be actionable, for various reasons. This section provides some
|
| |
+ guidelines for what to do in some of these scenarios.
|
| |
+
|
| |
+ * Waiting on upstream
|
| |
+ either set the bug to `ASSIGNED`, or `CLOSE` the bug as `DEFERRED`
|
| |
+ * Tracking bug covers multiple CVEs, and only some are fixed
|
| |
+ * if you think the remaining CVEs will be addressed soon, push a security
|
| |
+ update without closing the bug
|
| |
+ * if the ETA for the remaining CVEs is unclear, `CLOSE` as `DEFERRED`
|
| |
+
|
| |
+
|
| |
+ [[stalled_cves]]
|
| |
+ == Stalled CVEs
|
| |
+
|
| |
+ There are times that an EPEL package maintainer is not responding to a CVE bug. During the regular CVE reviews, the EPEL Steering Committee has the following options, ordered by intrusiveness:
|
| |
+
|
| |
+ * if the CVE is actually addressed in the latest update, note the fixed version
|
| |
+ and close the bug
|
| |
+ * if the package should not be in EPEL - see
|
| |
+ xref:epel-policy.adoc#policy_for_conflicting_packages[Policy for Confligting
|
| |
+ Packages] - retire it and close the bugs (either with `provenpackager` access
|
| |
+ or by `NEEDINFO`-ing the bug assignee)
|
| |
+ * if the bug seems critical enough, and is actionable, use `provenpackager`
|
| |
+ access to put up an update. The EPEL Packagers SIG or any Steering Committe
|
| |
+ member could also follow the
|
| |
+ xref:epel-policy.adoc#stalled_epel_requests[Stalled EPEL Requests] policy to
|
| |
+ get access to the package
|
| |
+ * if the bug is critical bug not actionable, same as the above but retire the package - but provide heads up to the maintainer first using `NEEDINFO`
|
| |
+
|
| |
+ [[related_policies]]
|
| |
+ == Related Policies
|
| |
+
|
| |
+ * xref:epel-policy-updates[EPEL Updates Policy]
|
| |
+ Note that the policy for xref:epel-policy-updates#stable_releases[stable releases] already allows short-circuiting the notice period for incompatible upgrades, for security issues
|
| |
+ * xref:epel-policy-incompatible-upgrades[Incompatible upgrades policy]
|
| |
What does this mean "should not be in EPEL"?
If a package shouldn't be in EPEL, that has nothing to do with CVE checking.