summaryrefslogtreecommitdiff
blob: 20bdf0f9d52d8478ba328ad353df09c0e969a96f (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
<?xml version='1.0' encoding="UTF-8"?>
<!DOCTYPE guide SYSTEM "/dtd/guide.dtd">
<guide link="/security/en/bug-searching.xml">
<title>Tips for searching and filtering Security bugs</title>
<author title="Author">
  <mail link="klieber@gentoo.org">Kurt Lieber</mail>
</author>
<author title="Author">
  <mail link="rbu@gentoo.org">Robert Buchholz</mail>
</author>

<abstract>
This document gives tips and hints for helping filter security-related bugzilla bugs.
</abstract>

<license/>

<version>1.2</version>
<date>2009-04-14</date>

<chapter>
<title>Bug Searching</title>
<section>
<title>All Security Bugs</title>
<body>
<p>
For identifying all security-related bugs, use the Bugzilla <uri link="https://bugs.gentoo.org/query.cgi">query</uri> page and set the following fields:
</p>
<ul>
<li><b>Product:</b> select "Gentoo Security"</li>
<li><b>Status:</b> set this to the type of bug you want to search for (i.e. closed bugs, open bugs, etc.)</li>
</ul>
<p>
This will give you a list of all security bugs in our system (or at least the ones that are properly assigned). You can set the query to only display Vulnerabilities, Kernel issues, or other subsets of Security bugs by setting the <b>Component</b> 
</p>
</body>
</section>
<section>
<title>"Mark stable" Arch Bugs</title>
<body>
<p>
When a package has had a security patch applied, it typically needs to be tested before being marked stable on affected architectures.  To identify all bugs where a particular arch needs to mark a package stable, use the <uri link="https://bugs.gentoo.org/query.cgi">query</uri> page and set the following fields:
</p>
<ul>
<li><b>Product:</b> select "Gentoo Security"</li>
<li><b>Status:</b> set this to "New", "Assigned" and "Reopened"  (i.e. don't search for bugs that are closed)</li>
<li><b>Email and Numbering:</b> Any of: "CC list member" should be set to "contains &lt;arch&gt;@gentoo.org"</li>
</ul>
<p>
When a package gets patched and requires testing, the security team will CC all relevant arches on that particular bug and request that they test and mark the package as stable on their architecture.  Thus, by using the search criteria described above, you'll be able to easily see what bugs require attention for a particular arch.
</p>
<impo>To make this report effective, it's very important that arch teams remember to remove themselves from the CC list once they have stabilized a package.</impo>
<note>For unsupported arches, bugs may be closed without the package being marked stable on that particular architecture.  Thus, developers for these architectures may wish to include closed bugs in their queries.  (For an explanation of "supported" vs. "unsupported" architectures, please see the <uri link="/security/en/vulnerability-policy.xml">Vulnerability Treatment Policy</uri>.)</note> 
<p>
Architecture Security Liaisons will need additional queries to catch bugs that require their participation. Those bugs could be for instance <c>SEMI-PUBLIC</c> ranked bugs that need to be marked stable in the tree, or <c>CONFIDENTIAL</c> bugs that have prestable testing in Bugzilla only. To get a list of these bugs, use the <uri link="https://bugs.gentoo.org/query.cgi">query</uri> page and set the following fields:
</p>
<ul>
<li><b>Product:</b> select "Gentoo Security"</li>
<li><b>Status:</b> set this to "New", "Assigned" and "Reopened"  (i.e. don't search for bugs that are closed)</li>
<li><b>Email and Numbering:</b> Any of: "CC list member" should be set to "contains &lt;login&gt;@gentoo.org" where &lt;login&gt; is the Gentoo username of the Liaison</li>
<li><b>Advanced Searching Using Boolean Charts:</b> "Group" should be set to "is equal to" and the input field should read "Security".</li>
</ul>
</body>
</section>
<section>
<title>Bugzilla queries that might be helpful</title>
<body>
<p>
Gentoo Security Team members and Padawans might find these queries helpful. Except from false positives, bugs listed in these queries need attention from the Security Team.
</p>
<ul>
<li><uri link="https://bugs.gentoo.org/buglist.cgi?query_format=advanced&amp;short_desc_type=allwordssubstr&amp;short_desc=&amp;product=Gentoo+Security&amp;component=Auditing&amp;component=Default+Configs&amp;component=GLSA+Errors&amp;component=Kernel&amp;component=Runpath+Issues&amp;component=Vulnerabilities&amp;long_desc_type=substring&amp;long_desc=&amp;bug_file_loc_type=allwordssubstr&amp;bug_file_loc=&amp;status_whiteboard_type=allwordssubstr&amp;status_whiteboard=stable&amp;keywords_type=allwords&amp;keywords=&amp;bug_status=NEW&amp;bug_status=ASSIGNED&amp;bug_status=REOPENED&amp;emailtype1=regexp&amp;email1=&amp;emailassigned_to2=1&amp;emailreporter2=1&amp;emailcc2=1&amp;emailtype2=substring&amp;email2=&amp;bugidtype=include&amp;bug_id=&amp;votes=&amp;chfieldfrom=&amp;chfieldto=Now&amp;chfieldvalue=&amp;cmdtype=doit&amp;order=Reuse+same+sort+as+last+time&amp;query_based_on=stale+stable&amp;negate0=1&amp;field0-0-0=cc&amp;type0-0-0=substring&amp;value0-0-0=amd64%40gentoo.org&amp;negate1=1&amp;field1-0-0=cc&amp;type1-0-0=substring&amp;value1-0-0=x86%40gentoo.org&amp;negate2=1&amp;field2-0-0=cc&amp;type2-0-0=substring&amp;value2-0-0=ppc%40gentoo.org&amp;negate3=1&amp;field3-0-0=cc&amp;type3-0-0=substring&amp;value3-0-0=sparc%40gentoo.org&amp;negate4=1&amp;field4-0-0=cc&amp;type4-0-0=substring&amp;value4-0-0=alpha%40gentoo.org&amp;negate5=1&amp;field5-0-0=cc&amp;type5-0-0=substring&amp;value5-0-0=hppa%40gentoo.org&amp;negate6=1&amp;field6-0-0=cc&amp;type6-0-0=substring&amp;value6-0-0=ppc64%40gentoo.org">Stale stable</uri>, display all open bugs that have "[stable]" in Whiteboard, but no arches in CC.</li>
<li><uri link="https://bugs.gentoo.org/buglist.cgi?query_format=advanced&amp;short_desc_type=allwordssubstr&amp;short_desc=&amp;product=Gentoo+Security&amp;long_desc_type=substring&amp;long_desc=&amp;bug_file_loc_type=allwordssubstr&amp;bug_file_loc=&amp;status_whiteboard_type=allwordssubstr&amp;status_whiteboard=glsa%3F&amp;keywords_type=allwords&amp;keywords=&amp;bug_status=NEW&amp;bug_status=ASSIGNED&amp;bug_status=REOPENED&amp;emailassigned_to1=1&amp;emailtype1=substring&amp;email1=&amp;emailassigned_to2=1&amp;emailreporter2=1&amp;emailcc2=1&amp;emailtype2=substring&amp;email2=&amp;bugidtype=include&amp;bug_id=&amp;votes=&amp;chfieldfrom=&amp;chfieldto=Now&amp;chfieldvalue=&amp;cmdtype=doit&amp;order=Reuse+same+sort+as+last+time&amp;query_based_on=glsa%3F&amp;field0-0-0=noop&amp;type0-0-0=noop&amp;value0-0-0=">GLSA vote</uri>, list of bugs that are fixed in the tree, bug have no GLSA decision yet.</li>
<li><uri link="https://bugs.gentoo.org/buglist.cgi?query_format=advanced&amp;short_desc_type=allwordssubstr&amp;short_desc=&amp;product=Gentoo+Security&amp;component=Auditing&amp;component=Vulnerabilities&amp;long_desc_type=substring&amp;long_desc=&amp;bug_file_loc_type=allwordssubstr&amp;bug_file_loc=&amp;status_whiteboard_type=notregexp&amp;status_whiteboard=ebuild|upstream|glsa|masked|stable&amp;keywords_type=nowords&amp;keywords=tracker&amp;bug_status=NEW&amp;bug_status=ASSIGNED&amp;bug_status=REOPENED&amp;emailassigned_to1=1&amp;emailtype1=substring&amp;email1=&amp;emailassigned_to2=1&amp;emailreporter2=1&amp;emailcc2=1&amp;emailtype2=substring&amp;email2=&amp;bugidtype=include&amp;bug_id=&amp;votes=&amp;chfieldfrom=&amp;chfieldto=Now&amp;chfieldvalue=&amp;cmdtype=doit&amp;order=Reuse+same+sort+as+last+time&amp;query_based_on=unhandled&amp;field0-0-0=noop&amp;type0-0-0=noop&amp;value0-0-0=">Unhandled bugs</uri>, bugs that are in no known Whiteboard state.</li>
<li><uri link="https://bugs.gentoo.org/buglist.cgi?query_format=advanced&amp;short_desc_type=notregexp&amp;short_desc=CVE&amp;product=Gentoo+Security&amp;component=Auditing&amp;component=Default+Configs&amp;component=GLSA+Errors&amp;component=Kernel&amp;component=Runpath+Issues&amp;component=Vulnerabilities&amp;long_desc_type=substring&amp;long_desc=&amp;bug_file_loc_type=allwordssubstr&amp;bug_file_loc=&amp;status_whiteboard_type=allwordssubstr&amp;status_whiteboard=&amp;keywords_type=nowords&amp;keywords=Tracker&amp;bug_status=NEW&amp;bug_status=ASSIGNED&amp;bug_status=REOPENED&amp;emailassigned_to1=1&amp;emailtype1=substring&amp;email1=&amp;emailassigned_to2=1&amp;emailreporter2=1&amp;emailcc2=1&amp;emailtype2=substring&amp;email2=&amp;bugidtype=include&amp;bug_id=&amp;votes=&amp;chfieldfrom=&amp;chfieldto=Now&amp;chfieldvalue=&amp;cmdtype=doit&amp;order=Reuse+same+sort+as+last+time&amp;query_based_on=no-cve&amp;field0-0-0=noop&amp;type0-0-0=noop&amp;value0-0-0=">No CVE</uri>, bugs that carry no CVE identifier in their title.</li>
</ul>
</body>
</section>
</chapter>
</guide>