]> git.proxmox.com Git - mirror_libseccomp.git/blame - SECURITY.md
build: ship seccomp-syscalls.h
[mirror_libseccomp.git] / SECURITY.md
CommitLineData
4bec773f
PM
1The libseccomp Security Vulnerability Handling Process
2===============================================================================
3https://github.com/seccomp/libseccomp
4
5This document document attempts to describe the processes through which
6sensitive security relevant bugs can be responsibly disclosed to the libseccomp
7project and how the project maintainers should handle these reports. Just like
8the other libseccomp process documents, this document should be treated as a
9guiding document and not a hard, unyielding set of regulations; the bug
10reporters and project maintainers are encouraged to work together to address
11the issues as best they can, in a manner which works best for all parties
12involved.
13
14### Reporting Problems
15
16Problems with the libseccomp library that are not suitable for immediate public
17disclosure should be emailed to the current libseccomp maintainers, the list is
18below. We typically request at most a 90 day time period to address the issue
19before it is made public, but we will make every effort to address the issue as
20quickly as possible and shorten the disclosure window.
21
22* Paul Moore, paul@paul-moore.com
23* Tom Hromatka, tom.hromatka@oracle.com
24
25### Resolving Sensitive Security Issues
26
27Upon disclosure of a bug, the maintainers should work together to investigate
28the problem and decide on a solution. In order to prevent an early disclosure
29of the problem, those working on the solution should do so privately and
30outside of the traditional libseccomp development practices. One possible
31solution to this is to leverage the GitHub "Security" functionality to create a
32private development fork that can be shared among the maintainers, and
33optionally the reporter. A placeholder GitHub issue may be created, but
34details should remain extremely limited until such time as the problem has been
35fixed and responsibly disclosed. If a CVE, or other tag, has been assigned to
36the problem, the GitHub issue title should include the vulnerability tag once
37the problem has been disclosed.
38
39### Public Disclosure
40
41Whenever possible, responsible reporting and patching practices should be
42followed, including notification to the linux-distros and oss-security mailing
43lists.
44
45* https://oss-security.openwall.org/wiki/mailing-lists/distros