Avoiding Future Security Bug Regressions

Max Kanat-Alexander mkanat at bugzilla.org
Wed Feb 4 22:23:37 UTC 2009


	We've seen several regressions from the security bugs that were
fixed in 3.2.1, 3.0.7, 2.22.7, and 3.3.2.

	I see two causes for this:

	1) Many invasive security security bugs were checked in at
	   once immediately before a release.

	2) We did not release our point releases quickly enough after
	   each individual security bug was fixed, so many bugs were
	   fixed in a single release.

	In order to avoid future regressions of a similar nature, I am
proposing the following re-organization of the release process:

	1) Once any security bug is fixed, we should try to release
	   within the month. We should generally not put a security
	   release on hold for other security patches or other bug
	   fixes.

	And the following policies:

	1) No matter what, no more than one *invasive* security patch
	   per release.

	2) All invasive security patches should be tested on
	   bugzilla.mozilla.org for at least 24 hours before a release.

	An example of an invasive security patch would be the
attachment patch we just did, or the fixing of the process_bug CSRF
that we just did. 

	If there is no objection, I will write these up on the
Wiki and they will become the official policy of the Bugzilla
Project by Wednesday of next week.

	Sound good?

	-Max
-- 
http://www.everythingsolved.com/
Competent, Friendly Bugzilla and Perl Services. Everything Else, too.



More information about the developers mailing list