Merge ~alexmurray/ubuntu-cve-tracker:add-boilerplates-readme into ubuntu-cve-tracker:master

Proposed by Alex Murray
Status: Merged
Merged at revision: 23dc34f5dfc483ade7e4ebdb7ece50441165e71f
Proposed branch: ~alexmurray/ubuntu-cve-tracker:add-boilerplates-readme
Merge into: ubuntu-cve-tracker:master
Diff against target: 38 lines (+32/-0)
1 file modified
README.boilerplates (+32/-0)
Reviewer Review Type Date Requested Status
Steve Beattie Approve
Review via email: mp+448671@code.launchpad.net

Description of the change

To post a comment you must log in.
Revision history for this message
Steve Beattie (sbeattie) wrote :

On Tue, Aug 08, 2023 at 06:09:16AM -0000, Alex Murray wrote:
> Alex Murray has proposed merging ~alexmurray/ubuntu-cve-tracker:add-boilerplates-readme into ubuntu-cve-tracker:master.
>
> Requested reviews:
> Ubuntu Security Team (ubuntu-security)

LGTM, approved.

> For more details, see:
> https://code.launchpad.net/~alexmurray/ubuntu-cve-tracker/+git/ubuntu-cve-tracker-1/+merge/448671
>
> Prompted by Steve's comment in https://chat.canonical.com/canonical/pl/y4egffismiri7xch81quwczwko
> --
> Your team Ubuntu Security Team is requested to review the proposed merge of ~alexmurray/ubuntu-cve-tracker:add-boilerplates-readme into ubuntu-cve-tracker:master.

> diff --git a/README.boilerplates b/README.boilerplates
> new file mode 100644
> index 0000000..dbb03b0
> --- /dev/null
> +++ b/README.boilerplates
> @@ -0,0 +1,32 @@
> +# Boilerplate CVE files
> +
> +The files contained within the boilerplate directory are used to pre-populate various information within a CVE when it is created via active_edit. Each file specifies the name of a package (or an alias for that package) and when a new CVE file is created with that name, all the contents of the boilerplate file is used as the template for the CVE.
> +
> +ie. assuming a new CVE affects all versions of gcc, instead of having to manually add each to the new CVE file, the gcc boilerplate file can be used instead by simply specifying the package name as gcc:
> +
> +```
> +./scripts/active-edit -p gcc -c CVE-YYYY-NNNN
> +```
> +
> +Symlinks are used to add an alias for a particular package, which allows more convenient / standard naming of packages to be specified as well.
> +
> +
> +## Use cases
> +
> +### Vendored code copies
> +
> +A common use-case is to represent the fact that one package is contained within another (ie. vendored into that package). This is useful, since if say package foo is contained within package bar, then every time a new CVE is raised against foo we also want to add bar to the CVE file so it can be appropriately triaged.
> +
> +This is done by creating a boilerplate file named foo with details for package foo but then also adding a Packages entry for bar, along with a Notes: entry describing the relationship between the two packages.
> +
> +A good example of this is the expat boilerplate.
> +
> +### Transitioned versioned packages
> +
> +Another common use-case is when an upstream package transitions to a new major release / edition and the associated source package in Ubuntu gets bumped to a new revision. In this case, both the original version of the package and the new version refer to the same upstream project and so CVEs for that project need to be created against all editions of the package.
> +
> +A good example of this is the gcc boilerplate which captures all the different editions of the gcc compiler across all the various Ubuntu releases.
> +
> +# Local Variables:
> +# mode: markdown
> +# End:

--
Steve Beattie
<email address hidden>

Revision history for this message
Steve Beattie (sbeattie) :
review: Approve

Preview Diff

[H/L] Next/Prev Comment, [J/K] Next/Prev File, [N/P] Next/Prev Hunk
1diff --git a/README.boilerplates b/README.boilerplates
2new file mode 100644
3index 0000000..dbb03b0
4--- /dev/null
5+++ b/README.boilerplates
6@@ -0,0 +1,32 @@
7+# Boilerplate CVE files
8+
9+The files contained within the boilerplate directory are used to pre-populate various information within a CVE when it is created via active_edit. Each file specifies the name of a package (or an alias for that package) and when a new CVE file is created with that name, all the contents of the boilerplate file is used as the template for the CVE.
10+
11+ie. assuming a new CVE affects all versions of gcc, instead of having to manually add each to the new CVE file, the gcc boilerplate file can be used instead by simply specifying the package name as gcc:
12+
13+```
14+./scripts/active-edit -p gcc -c CVE-YYYY-NNNN
15+```
16+
17+Symlinks are used to add an alias for a particular package, which allows more convenient / standard naming of packages to be specified as well.
18+
19+
20+## Use cases
21+
22+### Vendored code copies
23+
24+A common use-case is to represent the fact that one package is contained within another (ie. vendored into that package). This is useful, since if say package foo is contained within package bar, then every time a new CVE is raised against foo we also want to add bar to the CVE file so it can be appropriately triaged.
25+
26+This is done by creating a boilerplate file named foo with details for package foo but then also adding a Packages entry for bar, along with a Notes: entry describing the relationship between the two packages.
27+
28+A good example of this is the expat boilerplate.
29+
30+### Transitioned versioned packages
31+
32+Another common use-case is when an upstream package transitions to a new major release / edition and the associated source package in Ubuntu gets bumped to a new revision. In this case, both the original version of the package and the new version refer to the same upstream project and so CVEs for that project need to be created against all editions of the package.
33+
34+A good example of this is the gcc boilerplate which captures all the different editions of the gcc compiler across all the various Ubuntu releases.
35+
36+# Local Variables:
37+# mode: markdown
38+# End:

Subscribers

People subscribed via source and target branches