|
| 1 | +The SELinux Userspace Security Vulnerability Handling Process |
| 2 | +=============================================================================== |
| 3 | +https://github.com/SELinuxProject/selinux |
| 4 | + |
| 5 | +This document attempts to describe the processes through which sensitive |
| 6 | +security relevant bugs can be responsibly disclosed to the SELinux userspace |
| 7 | +project and how the project maintainers should handle these reports. Just like |
| 8 | +the other SELinux userspace process documents, this document should be treated |
| 9 | +as a guiding document and not a hard, unyielding set of regulations; the bug |
| 10 | +reporters and project maintainers are encouraged to work together to address |
| 11 | +the issues as best they can, in a manner which works best for all parties |
| 12 | +involved. |
| 13 | + |
| 14 | +### Reporting Problems |
| 15 | + |
| 16 | +For serious problems or security vulnerabilities in the SELinux kernel code |
| 17 | +please refer to the SELinux Kernel Subsystem Security Policy in the link below: |
| 18 | + |
| 19 | +* https://github.com/SELinuxProject/selinux-kernel/blob/main/SECURITY.md |
| 20 | + |
| 21 | +Problems with the SELinux userspace that are not suitable for immediate public |
| 22 | +disclosure should be emailed to the current SELinux userspace maintainers, the |
| 23 | +list is below. We typically request at most a 90 day time period to address |
| 24 | +the issue before it is made public, but we will make every effort to address |
| 25 | +the issue as quickly as possible and shorten the disclosure window. |
| 26 | + |
| 27 | +* Petr Lautrbach, [email protected] |
| 28 | +* Nicolas Iooss, [email protected] |
| 29 | +* Jeffrey Vander Stoep, [email protected] |
| 30 | +* Joshua Brindle, [email protected] |
| 31 | + |
| 32 | + |
| 33 | + |
| 34 | +* Steve Lawrence, [email protected] |
| 35 | +* William Roberts, [email protected] |
| 36 | +* Ondrej Mosnacek, [email protected] |
| 37 | + |
| 38 | +### Resolving Sensitive Security Issues |
| 39 | + |
| 40 | +Upon disclosure of a bug, the maintainers should work together to investigate |
| 41 | +the problem and decide on a solution. In order to prevent an early disclosure |
| 42 | +of the problem, those working on the solution should do so privately and |
| 43 | +outside of the traditional SELinux userspace development practices. One |
| 44 | +possible solution to this is to leverage the GitHub "Security" functionality to |
| 45 | +create a private development fork that can be shared among the maintainers, and |
| 46 | +optionally the reporter. A placeholder GitHub issue may be created, but details |
| 47 | +should remain extremely limited until such time as the problem has been fixed |
| 48 | +and responsibly disclosed. If a CVE, or other tag, has been assigned to the |
| 49 | +problem, the GitHub issue title should include the vulnerability tag once the |
| 50 | +problem has been disclosed. |
| 51 | + |
| 52 | +### Public Disclosure |
| 53 | + |
| 54 | +Whenever possible, responsible reporting and patching practices should be |
| 55 | +followed, including notification to the linux-distros and oss-security mailing |
| 56 | +lists. |
| 57 | + |
| 58 | +* https://oss-security.openwall.org/wiki/mailing-lists/distros |
| 59 | +* https://oss-security.openwall.org/wiki/mailing-lists/oss-security |
0 commit comments