Skip to content

Commit 2b6b5bd

Browse files
committed
Add a file describing the security vulnerability handling process
Add the file SECURITY.md which describes the SELinux userspace security vulnerability handling process including who to contact. Signed-off-by: James Carter <[email protected]>
1 parent c3f0124 commit 2b6b5bd

File tree

1 file changed

+59
-0
lines changed

1 file changed

+59
-0
lines changed

SECURITY.md

Lines changed: 59 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,59 @@
1+
The SELinux Userspace Security Vulnerability Handling Process
2+
===============================================================================
3+
https://github.com/SELinuxProject/selinux
4+
5+
This document attempts to describe the processes through which sensitive
6+
security relevant bugs can be responsibly disclosed to the SELinux userspace
7+
project and how the project maintainers should handle these reports. Just like
8+
the other SELinux userspace process documents, this document should be treated
9+
as a guiding document and not a hard, unyielding set of regulations; the bug
10+
reporters and project maintainers are encouraged to work together to address
11+
the issues as best they can, in a manner which works best for all parties
12+
involved.
13+
14+
### Reporting Problems
15+
16+
For serious problems or security vulnerabilities in the SELinux kernel code
17+
please refer to the SELinux Kernel Subsystem Security Policy in the link below:
18+
19+
* https://github.com/SELinuxProject/selinux-kernel/blob/main/SECURITY.md
20+
21+
Problems with the SELinux userspace that are not suitable for immediate public
22+
disclosure should be emailed to the current SELinux userspace maintainers, the
23+
list is below. We typically request at most a 90 day time period to address
24+
the issue before it is made public, but we will make every effort to address
25+
the issue as quickly as possible and shorten the disclosure window.
26+
27+
* Petr Lautrbach, [email protected]
28+
* Nicolas Iooss, [email protected]
29+
* Jeffrey Vander Stoep, [email protected]
30+
* Joshua Brindle, [email protected]
31+
* James Carter, [email protected]
32+
* Paul Moore, [email protected]
33+
* Jason Zaman, [email protected]
34+
* Steve Lawrence, [email protected]
35+
* William Roberts, [email protected]
36+
* Ondrej Mosnacek, [email protected]
37+
38+
### Resolving Sensitive Security Issues
39+
40+
Upon disclosure of a bug, the maintainers should work together to investigate
41+
the problem and decide on a solution. In order to prevent an early disclosure
42+
of the problem, those working on the solution should do so privately and
43+
outside of the traditional SELinux userspace development practices. One
44+
possible solution to this is to leverage the GitHub "Security" functionality to
45+
create a private development fork that can be shared among the maintainers, and
46+
optionally the reporter. A placeholder GitHub issue may be created, but details
47+
should remain extremely limited until such time as the problem has been fixed
48+
and responsibly disclosed. If a CVE, or other tag, has been assigned to the
49+
problem, the GitHub issue title should include the vulnerability tag once the
50+
problem has been disclosed.
51+
52+
### Public Disclosure
53+
54+
Whenever possible, responsible reporting and patching practices should be
55+
followed, including notification to the linux-distros and oss-security mailing
56+
lists.
57+
58+
* https://oss-security.openwall.org/wiki/mailing-lists/distros
59+
* https://oss-security.openwall.org/wiki/mailing-lists/oss-security

0 commit comments

Comments
 (0)