Blame SECURITY.md

Packit Service 8eee21
The libseccomp Security Vulnerability Handling Process
Packit Service 8eee21
===============================================================================
Packit Service 8eee21
https://github.com/seccomp/libseccomp
Packit Service 8eee21
Packit Service 8eee21
This document document attempts to describe the processes through which
Packit Service 8eee21
sensitive security relevant bugs can be responsibly disclosed to the libseccomp
Packit Service 8eee21
project and how the project maintainers should handle these reports.  Just like
Packit Service 8eee21
the other libseccomp process documents, this document should be treated as a
Packit Service 8eee21
guiding document and not a hard, unyielding set of regulations; the bug
Packit Service 8eee21
reporters and project maintainers are encouraged to work together to address
Packit Service 8eee21
the issues as best they can, in a manner which works best for all parties
Packit Service 8eee21
involved.
Packit Service 8eee21
Packit Service 8eee21
### Reporting Problems
Packit Service 8eee21
Packit Service 8eee21
Problems with the libseccomp library that are not suitable for immediate public
Packit Service 8eee21
disclosure should be emailed to the current libseccomp maintainers, the list is
Packit Service 8eee21
below.  We typically request at most a 90 day time period to address the issue
Packit Service 8eee21
before it is made public, but we will make every effort to address the issue as
Packit Service 8eee21
quickly as possible and shorten the disclosure window.
Packit Service 8eee21
Packit Service 8eee21
* Paul Moore, paul@paul-moore.com
Packit Service 8eee21
* Tom Hromatka, tom.hromatka@oracle.com
Packit Service 8eee21
Packit Service 8eee21
### Resolving Sensitive Security Issues
Packit Service 8eee21
Packit Service 8eee21
Upon disclosure of a bug, the maintainers should work together to investigate
Packit Service 8eee21
the problem and decide on a solution.  In order to prevent an early disclosure
Packit Service 8eee21
of the problem, those working on the solution should do so privately and
Packit Service 8eee21
outside of the traditional libseccomp development practices.  One possible
Packit Service 8eee21
solution to this is to leverage the GitHub "Security" functionality to create a
Packit Service 8eee21
private development fork that can be shared among the maintainers, and
Packit Service 8eee21
optionally the reporter.  A placeholder GitHub issue may be created, but
Packit Service 8eee21
details should remain extremely limited until such time as the problem has been
Packit Service 8eee21
fixed and responsibly disclosed.  If a CVE, or other tag, has been assigned to
Packit Service 8eee21
the problem, the GitHub issue title should include the vulnerability tag once
Packit Service 8eee21
the problem has been disclosed.
Packit Service 8eee21
Packit Service 8eee21
### Public Disclosure
Packit Service 8eee21
Packit Service 8eee21
Whenever possible, responsible reporting and patching practices should be
Packit Service 8eee21
followed, including notification to the linux-distros and oss-security mailing
Packit Service 8eee21
lists.
Packit Service 8eee21
Packit Service 8eee21
* https://oss-security.openwall.org/wiki/mailing-lists/distros