qemu-devel
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Qemu-devel] QEMU's CVE Procedures


From: Gonglei
Subject: Re: [Qemu-devel] QEMU's CVE Procedures
Date: Tue, 9 Jun 2015 09:30:11 +0800
User-agent: Mozilla/5.0 (Windows NT 6.1; rv:31.0) Gecko/20100101 Thunderbird/31.4.0

On 2015/6/8 21:07, Daniel P. Berrange wrote:
> On Mon, Jun 08, 2015 at 08:44:25PM +0800, Gonglei wrote:
>> On 2015/6/6 6:16, John Snow wrote:
>>> (6) What about qemu-stable?
>>>
>>> Our stable process is somewhat lacking with respect to the CVE
>>> process. It is good that we occasionally publish stable fix roundups
>>> that downstream maintainers can base their work off of, but it would
>>> be good to have a branch where we can have CVE fixes posted promptly.
>>>
>> Good point.
>>
>> In our team, when a CVE fix posted in upstream, we should fix all other Qemu
>> versions manually. Sometimes, the involved files are quite different between
>> different Qemu branches. It's too expensive when you have so many different
>> branches need to maintain. :(
>>
>>>
>>> (7) How long should we support a stable branch?
>>>
>>> We should figure out how many stable release trees we actually intend
>>> to support: The last two releases? The last three?
>>>
>>> My initial guess is "Any stable branch should be managed for at least
>>> a year after initial release."
>>>
>>> This would put our current supported releases as 2.1, 2.2 and 2.3, so
>>> about ~3 managed releases seems sane as an initial effort.
> 
> FWIW, even if QEMU doesn't backport the fix to all branches, I think
> the important this is to document which historical releases are going
> to be affected by the CVE. That gives maintainers a heads up a to
> whether they are going to have to do a backport themselves.
> 
> This is not generally as bad as it sounds, as part of triaging most
> CVEs is to look at GIT history to identify when a flaw was first
> introduced. Once you know that its usually pretty straightforward
> to identify the branches that will be affected. ie all that post
> date that commit, and sometimes earlier releases if the flaw was
> backported.
> 
> For libvirt, we'll generally backport the fix to all -maint branches
> that exist (no matter how old) as long as the patch cherry picks with
> reasonable ease.
> 
> 
> One of the things I could really recommend is to have a formal
> description for all QEMU flaws recording this kind of important
> metadata, along with other relevant metadata.
> 
> In libvirt we store all our records in a git repo, in a standardized
> XML format, eg
> 
>   
> http://libvirt.org/git/?p=libvirt-security-notice.git;a=blob;f=notices/2015/0002.xml;hb=HEAD
> 

Cool, it's very clear.

Regards,
-Gonglei

> This is then converted to HTML and plain text for publication on our
> website and via email
> 
>    http://security.libvirt.org/2014/0003.html
>    http://security.libvirt.org/2014/0003.txt
>    http://security.libvirt.org/2014/0003.xml
> 
> Notice in particular the list of GIT hashes and release tags identifying
> when the flaw was introduced, what releases are broken, when the flaw
> was fixed (if at all) and when the fix was released (if at all).
> 
> Regards,
> Daniel
> 





reply via email to

[Prev in Thread] Current Thread [Next in Thread]