You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: sig-security/sig-security-tooling/vulnerability-mgmt/policy-for-vulnerability-resolution.md
+20-8Lines changed: 20 additions & 8 deletions
Original file line number
Diff line number
Diff line change
@@ -1,7 +1,7 @@
1
1
# Policy for Vulnerability resolution
2
2
3
3
Depending on the impact of the vulnerability identified, appropriate resolution
4
-
is triggered to apply the fix to kubernetes or document the cause for not fixing
4
+
is triggered to apply the fix to Kubernetes or document the cause for not fixing
5
5
6
6
## Assumptions
7
7
@@ -13,13 +13,25 @@ is triggered to apply the fix to kubernetes or document the cause for not fixing
13
13
14
14
## Triage process
15
15
16
-
|No. | Category | Definition | Resolution |
17
-
|---|---|---|---|
18
-
| 1 | False positive | k/k and vulnerable package is not impacted by this CVE | Open a Github issue and log the resolution |
19
-
| 2 | True positive but no impact | Package version used in k/k is vulnerable, but k/k is not using the vulnerable code | Open a Github issue and a PR to bump the dependency to the version with a fix. This fix will go in subsequent release of k/k |
20
-
| 3 | True positive with negligible impact | Package version used in k/k is vulnerable, but k/k is using the vulnerable code, but the vulnerability does not apply as per k/k threat model | Open a Github issue that describes why this will have negligible impact with relevant compensatory controls. Also, open a PR to bump the dependency to the version with a fix. This fix will go in subsequent release of k/k |
21
-
| 4 | True positive with impact | Package version used in k/k is vulnerable, and k/k is using the vulnerable code | Open a Github issue, that assesses impact, modifies CVSS rating for k8s, if needed and suggest compensatory controls. Also, open a PR to bump the dependency and backport the fix up to n-2 k/k version |
22
-
| 5 | Embargoed vulnerability | No CVE ID is assigned so scanners do not detect it | Product Security Committee / Security Response Committee triages and follows existing process for embargoed CVEs |
16
+
- The vulnerabilities are triaged in private, by members of
- Membership to this group is restricted due to the confidential nature of the
19
+
responsibilities
20
+
- Once a vulnerability is found through automation, the group members get
21
+
notified via an email about it
22
+
- One of the group members then triages this vulnerability and classifies it
23
+
into one of the following categories:
24
+
25
+
|No. | Category | Definition | Resolution |
26
+
|---|---|---|---|
27
+
| 1 | False positive | k/k and vulnerable package is not impacted by this CVE | Open a Github issue and log the resolution |
28
+
| 2 | True positive but no impact | Package version used in k/k is vulnerable, but k/k is not using the vulnerable code | Open a Github issue and a PR to bump the dependency to the version with a fix. This fix will go in subsequent release of k/k |
29
+
| 3 | True positive with negligible impact | Package version used in k/k is vulnerable, but k/k is using the vulnerable code, but the vulnerability does not apply as per k/k threat model | Open a Github issue that describes why this will have negligible impact with relevant compensatory controls. Also, open a PR to bump the dependency to the version with a fix. This fix will go in subsequent release of k/k |
30
+
| 4 | True positive with impact | Package version used in k/k is vulnerable, and k/k is using the vulnerable code | Open a Github issue, that assesses impact, modifies CVSS rating for k8s, if needed and suggest compensatory controls. Also, open a PR to bump the dependency and backport the fix up to n-2 k/k version |
31
+
| 5 | Embargoed vulnerability | No CVE ID is assigned so scanners do not detect it | Product Security Committee / Security Response Committee triages and follows existing process for embargoed CVEs |
32
+
33
+
- Once the category is identified, the resolution is triggered manually by the
0 commit comments