-
-
Notifications
You must be signed in to change notification settings - Fork 9
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add documentation for reporting vulnerabilities #7
Comments
+1. this would be very useful. i don't know anything about how this works, and I expect others in ruby don't as well. |
+1 |
Also how maintainers should notify users? Recommend all to sign up to a rubysec list on librelist? Subscribe an rss? Follow [ANN SEC] on ruby-talk? irc channel rubysec on freenode? Twitter? Would be great to subscribe to gems you use for notifications.. but that's a more complicated feature. However, it's sort of already implemented in the rubygems.org site where you can subscribe to gems. Now just need to notify of vulns. cc @drbrain |
I can update the rubygems security guide once this is up to date |
Maybe gems-status-web could be of help here. see: https://github.com/jordimassaguerpla/gems-status-web/blob/master/README.md You can get notifications on your gems (based on a Gemfile file) and the software gets alerts from different sources: mailing lists and commits on upstream. |
also bundler-audit may be of your interest |
@bf4 for general RubyGems security announcements, I believe [email protected] is the right place. |
@postmodern how does one accomplish:
Is there a template people can use? Ditto re: osvdb email. |
For requesting a CVE from MITRE: http://cve.mitre.org/cve/request_id.html |
Or publicly on oss-security: https://people.redhat.com/kseifrie/CVE-OpenSource-Request-HOWTO.html |
There's also http://guides.rubygems.org/security/#reporting-security-vulnerabilities as well, though it's a bit outdated (I'm working on fixing). |
I submitted rubygems/guides#134 to get the rubygems guide page updated. Basically, the steps I see that need to be followed are:
Could move step 4 up to after step 1... Really depends on whether blocking on MITRE / OSVDB is appropriate. |
Get the CVE as early as possible, otherwise everyone has to go back and On Sun, Aug 2, 2015 at 6:14 PM, Reed Loden [email protected] wrote:
Kurt Seifried -- Red Hat -- Product Security -- Cloud |
@kseifriedredhat, Sadly, MITRE is quite slow. Still waiting on CVE assignments for things I sent to oss-security@ / cve-assign@ quite a long time ago. |
Document the steps to report a vulnerability.
[email protected]
.The text was updated successfully, but these errors were encountered: