[Git][security-tracker-team/security-tracker][updatedocs] Update for review comments
Neil Williams (@codehelp)
codehelp at debian.org
Wed Feb 16 07:44:12 GMT 2022
Neil Williams pushed to branch updatedocs at Debian Security Tracker / security-tracker
Commits:
d188babe by Neil Williams at 2022-02-16T07:44:02+00:00
Update for review comments
- - - - -
1 changed file:
- doc/security-team.d.o/security_tracker
Changes:
=====================================
doc/security-team.d.o/security_tracker
=====================================
@@ -25,10 +25,6 @@ For example, systems with some additional or modified packages compared to Debia
a separate triage process for every NFU to find ones which are relevant to what has
been added as well as a triage on packages which differ from Debian.
-When a vulnerability relates to a package, the triage will need to include an
-assessment of the severity of the vulnerability as it affects Debian. See [Severity
-levels](#security-levels).
-
Entries in the Debian Security Tracker do not imply anything about how a vulnerability
may affect systems other than Debian.
@@ -437,12 +433,10 @@ assess these levels.
Certain packages may get higher or lower rating than usual, based on
their importance.
-Assessments of severity are made against the binaries as provided by Debian. A
-vulnerability where an exploit would rely on changing configuration in a non-standard
-way or rebuilding the binary from source to enable|disable some feature is not
-considered to be of high severity. For each vulnerability, the severity assigned within
-the Debian Security Tracker only relates to how Debian views that vulnerability and how
-quickly the fix may need to be applied to the specified package(s) within Debian.
+Assessments of severity are made against the binaries as provided by Debian. For each
+vulnerability, the severity assigned within the Debian Security Tracker only relates to
+how Debian views that vulnerability and how quickly the fix may need to be applied to
+the specified package(s) within Debian.
### Vulnerabilities without an assigned CVE id
@@ -569,8 +563,8 @@ Summary of tracker syntax
For a vulnerability in a package in Debian or proposed for introduction into Debian,
the syntax should contain at least the `PKG_NAME` tabbed line and a `NOTE:` providing a
-URL to the fixing commit. Other lines are added, where relevant, within the general
-syntax.
+URL to useful references, like commit references, bug tracker entries and advisories.
+Other lines are added, where relevant, within the general syntax.
CVE-YYYY-NNNNNN [(description)]
\t RESERVED
@@ -588,7 +582,10 @@ syntax.
- The pre-commit hook will check the syntax of each entry.
The description of the CVE is not edited in the security tracker but it will be
-shortened in the tracker page for the vulnerability.
+shortened in the tracker page for the vulnerability. A temporary description can be
+added with the `[description]` syntax, for example for clarification. This will not be
+overridden by an automatic update unless there is a change in the description of the
+CVE in the MITRE feed
For `<itp>`, the comment needs to include the bug number as `(bug #NNNNNNNNNN)`.
@@ -604,8 +601,9 @@ mailing list and IRC notifications (see [Automatic issue updates](#automatic-iss
However, changes to the tracker website itself (e.g., the files in `lib/*`
and `bin/tracker_service.py`) should be vetted and approved before being
committed. The preferred way to do this is to send a patch to the
-`debian-security-tracker at lists.debian.org` mailing list.
+`debian-security-tracker at lists.debian.org` mailing list or a merge request in Salsa.
+- [Salsa](https://salsa.debian.org/security-tracker-team/security-tracker/)
- [https://lists.debian.org/debian-security-tracker/](https://lists.debian.org/debian-security-tracker/)
Commits are checked for syntax errors before they are actually committed,
@@ -733,7 +731,7 @@ project.
* `./bin/report-vuln` - generate the correct email body to report a bug against a source package
relating to an unfixed CVE(s).
-### Useful search support for checking new CVES
+### Useful search support for checking new CVEs
- [https://www.debian.org/distrib/packages#search_packages](https://www.debian.org/distrib/packages#search_packages)
- [https://wnpp.debian.net/](https://wnpp.debian.net/) (Be aware, forwarded ITPs might
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/d188babe55290bc94a7f28c6ba2e031816ceacf7
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/d188babe55290bc94a7f28c6ba2e031816ceacf7
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20220216/62ae77b7/attachment-0001.htm>
More information about the debian-security-tracker-commits
mailing list