Security Severity Ratings
Security bugs are rated by specifying "sec-<rating>" in the "Keyword" field in bugzilla. For example, a bug with a Critical security rating would be marked as "sec-critical".
Severity Ratings
Severity Ratings & Examples |
---|
The following items are keywords for the severity of an issue.
Examples:
Examples:
Examples:
Examples:
Examples:
If there are mitigating circumstances that severely reduce the effectiveness of the exploit, then the exploit could be reduced by one level of severity. Examples of mitigating circumstances include difficulty in reproducing due to very specific timing or load order requirements, complex or unusual set of actions the user would have to take beyond normal browsing behaviors, or unusual software configuration. As a rough guide, to be considered for reduction in severity an exploit should execute successfully less than 10% of the time. If measures can be taken to improve the reliability of the exploit to over 10% (by combining it with other existing bugs or techniques), then it should not be considered to be mitigated.
|
Additional Security Status Codes
If a potential security issue has not yet been assigned a severity rating, or a rating is not appropriate, the whiteboard may instead contain one of the following security status codes.
Shared Keywords | ||
---|---|---|
Code | Description | Examples |
sec-audit | Bug requires a code audit to investigate potential security problems. | Look for pattern x in library y
Audit file z for string buffer abuse. |
sec-vector | Flaws not in Mozilla controlled software, but can cause security problems for Mozilla users. | Bugs in plugins
Bugs in system libraries used by Firefox |
sec-want | New features or improvement ideas related to security | User interface refinements
Support for new types of authentication Code refactoring / cleanup |
sec-incident | Issues resulting in an incident response or 'chemspill' actions by the security team. | Sever compromise
Code issues that would cause client code to be respun. |
sec-review-needed | A security review is needed for the bug, this could mean a variety of things. If there is no secr:<username> in the whiteboard the item has not been triaged and action is unknown. Once triaged a note will be placed in the bug as to the action to be taken | |
sec-review-complete | The security review / actions desired have been completed. This will result in either a link to the notes from security actions or a note from the assigned resource in the bug. |
Group Keywords | |||||||
---|---|---|---|---|---|---|---|
Code | Description | Examples | |||||
csec- | Client Security (ie. Firefox, Thunderbird, etc) |
| |||||
wsec- | Web Security (Web Sites, Web Services, etc) |
| |||||
opsec- | Operations Security (Mozilla owned & operated severs and services) |
|
Whiteboard Tags | ||
---|---|---|
Code | Description | Examples |
sec-assigned:UserAlias | This designates the assigned security resource that is accountable for actions to be taken on the designated item. When possible the bug will be assigned to the security contact for action. This will be used when that is not possible or practical. | [sg-assigned:curtisk] indicates that curtisk is the accountable party for action |
Feature Page Codes | ||
---|---|---|
Code | Description | Examples |
sec-review-needed | A security review is needed for the feature, this could mean a variety of things. If there is no <username> in the notes then a full review needs to be scheduled, if a <username> is present than that person will follow-up with the feature team on whatever task is needed. | |
sec-review-complete | The security review / actions desired have been completed. This will result in a link to the notes from security actions or a note from the assigned resource. | |
sec-review-active | There are active tasks associated with the review that are yet to be completed in order for the review to be seen as completed. These will be captured in the "Action Items" section of the review notes. | |
sec-review-sched | Security review tasks have been scheduled, if this is a full security review the date of the scheduled review will be present in the security notes. | |
sec-review-unnecessary | After triage it was felt the feature needed no review or security actions. | |
Security health: <blank> | There are no notes or status is unknown. | Color: <None> |
Security health: OK | The tasks are on schedule or completed and are considered non-blocking. | Color: Green |
Security health: Blocked | Some aspect of the security review has given cause to block the feature from further work or landing. The reasons will be listed in the security notes or linked to a larger review outcome for follow-up. | Color: Yellow |
Security health: At Risk | Some aspect of the security review may cause the feature to be blocked or put the feature at risk of being off schedule.The reasons will be listed in the security notes or linked to a larger review outcome for follow-up. | Color: Red |
Security health: Assigned | Security tasks have been assigned to a member of the team to followup. The name of this resource will be in the security notes. | Color: Teal |
Priority Matrix (primarily OpSec) |
---|
by this issue and it should be resolved immediatly. Examples:
Examples:
Examples:
|