Handle vulnerabilities detected by dependency scanning
A scheduled pipeline runs dependency_scanning job every night. This job adds new
vulnerabilities to the
Vulnerability Report.
Slack notifications tell #g_distribution on Slack when new
vulnerabilities are detected. Complete the following steps when you receive this notification.
- Visit the - omnibus-gitlabVulnerability Report and locate the appropriate vulnerability. If the vulnerability is legitimate:- Select Create Issueto open a confidential issue in theomnibus-gitlabissue tracker.
- Change the vulnerability status to Confirmed. If the vulnerability turns out to be a false positive, duplicate, or otherwise not actionable, change the status toDismiss.
 
- Select 
- Label the issue with the - securityand- For Schedulinglabels. The GitLab Security team is then made aware of this issue due to the automation by escalator:- https://gitlab.com/gitlab-com/gl-security/automation/escalator.
- The Security team triages and schedules the issue with the help of Distribution. 
- If the issue is actionable for us, the Security team: - Schedules the issue based on its severity and priority.
- Creates the needed merge requests (MRs) to target all relevant branches.
 
- After the MR that fixes the vulnerability has been merged, and the corresponding issue is closed: - Visit the omnibus-gitlabVulnerability Report.
- Locate the appropriate vulnerability and set the status to Resolvedif not already done automatically.
 
- Visit the 
- If the issue is a no-op for our use case, set its status to - Dismissedin the Vulnerability Report page and close the corresponding issue.