On Mon, 22 Sep 2008, Jo Rhett wrote:
I assumed not. I was curious to what extent outside people could help
support the process, while leaving commits to the internal people. For
example, for everything except the jail vulnerability in the last 4 years
the security problems were related to third party utilities, and were widely
published in security mailing lists. Someone without a commit bit could
certainly build the patch, test the patch on relevant versions, etc.
I'm not sure I agree with this analysis. From a FreeBSD-centric perspective,
vulnerabilities fall into four classes:
- FreeBSD-generated code
- Third party code blended with out code (arguably ours also)
- "contrib" code that is in our revision control
- Ports
We dropped ports from our advisory scope because the number of vulnerabilities
skyrocketted due to ports growing and the number of vulnerabilities discovered
in them growing. We do provide a database of known-vulnerable ports and
versions, but that's not generally the responsibility of the base security
team, rather a separate ports security team. I think this is the right
trade-off -- among our fears is that we over-release advisories, which would
devalue the usefulness of advisories over time as referring specifically to
critical issues.
Extracted from the list of advisories on security.FreeBSD.org going back to
the beginning of last year:
AdvisoryClass
FreeBSD-SA-08:09.icmp6 Blended
FreeBSD-SA-08:08.nmount FreeBSD
FreeBSD-SA-08:07.amd64 FreeBSD
FreeBSD-SA-08:06.bind Contrib
FreeBSD-SA-08:05.opensshContrib
FreeBSD-SA-08:03.sendfile FreeBSD
FreeBSD-SA-08:02.libc Blended
FreeBSD-SA-08:04.ipsec Blended
FreeBSD-SA-08:01.ptyFreeBSD
FreeBSD-SA-07:10.gtar Contrib
FreeBSD-SA-07:09.random FreeBSD
FreeBSD-SA-07:08.opensslContrib
FreeBSD-SA-07:07.bind Contrib
FreeBSD-SA-07:06.tcpdumpContrib
FreeBSD-SA-07:05.libarchive FreeBSD
FreeBSD-SA-07:04.file Contrib
FreeBSD-SA-07:03.ipv6 Blended
FreeBSD-SA-07:02.bind Contrib
FreeBSD-SA-07:01.jail FreeBSD
Counting on my fingers, that's 7 FreeBSD-specific, 4 that lie in code we
basically maintain, and 8 that are in externally maintained software. Seems
like a pretty even split. In the case of most third party code
vulnerabilities, I believe we received non-trivial advanced warning of the
impending vulnerability announcement.
As noted above, very few of the security releases were based on information
not available to the general public (who read security-related mailing
lists, anyway)
I'm not sure I agree with this assertion either. While there are exceptions,
most vulnerabilities are known to the security team in advance of public
discussion. Depends a bit on which security lists you read, of course...
Robert N M Watson
Computer Laboratory
University of Cambridge
___
freebsd-stable@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-stable
To unsubscribe, send any mail to "[EMAIL PROTECTED]"