You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
-[x] Search and Identify closed issues that have a CVE ID e.g. CVE-1001-12345 in the issue description or summary (This search [filter](https://github.com/kubernetes/kubernetes/issues?q=is%3Aissue+in%3Abody+%22CVSS%3A3.%22+label%3Acommittee%2Fsecurity-response+is%3Aclosed+) is giving the most accurate data so far)
180
-
-[x] Label those issues with `official-cve-feed` using https://docs.github.com/en/rest/reference/issues REST API
- Generate a JSON document using the results from the filtered label on `k/k` repo.
187
-
- Create a Prow job to periodically generate this JSON document.
188
-
- Update the JSON doc when needed (e.g. when a new CVE is announced) in `k/website`
189
-
- Using Hugo, publish the list from this JSON document on official k8s website
190
-
191
174
### Non-Goals
192
175
193
176
- Triage and vulnerability disclosure: This will continue to be done by SRC
@@ -210,6 +193,22 @@ As a K8s end user, I want a list of CVEs with relevant information that I can fe
210
193
211
194
As a K8s maintainer, I want to create a process that auto-updates CVE feed, when SRC announces new CVEs such that I do not have to do extra work to maintain this feed manually
-[x] Search and Identify closed issues that have a CVE ID e.g. CVE-1001-12345 in the issue description or summary (This search [filter](https://github.com/kubernetes/kubernetes/issues?q=is%3Aissue+in%3Abody+%22CVSS%3A3.%22+label%3Acommittee%2Fsecurity-response+is%3Aclosed+) is giving the most accurate data so far)
201
+
-[x] Label those issues with `official-cve-feed` using https://docs.github.com/en/rest/reference/issues REST API
- Generate a JSON document using the results from the filtered label on `k/k` repo.
208
+
- Create a Prow job to periodically generate this JSON document.
209
+
- Update the JSON doc when needed (e.g. when a new CVE is announced) in `k/website`
210
+
- Using Hugo, publish the list from this JSON document on official k8s website
211
+
213
212
### Risks and Mitigations
214
213
215
214
#### JSON blob construction will fail
@@ -220,6 +219,15 @@ If this happens, we expect the job too fail. If blob construction fails, the fai
220
219
221
220
In some extenuating circumstances, we may need to update the CVE feed within minutes of the official CVE announcement, instead of waiting for the merge based or periodical website rebuild. In those situations, manual updates to JSON blob using usual PR reviews and approval process can be implemented.
222
221
222
+
### Misuse of Auto-Refresh feature
223
+
224
+
Without proper filtering and control over who can label GitHub issues, the list of CVEs can become a list with poor signal to noise ratio making the list unusable.
225
+
226
+
For this purpose, the filtering is applied such that only issues that are marked as `closed`
227
+
will be part of the list. Also, additionally, the `official-cve-feed` label is a
0 commit comments