Annotation of embedaddon/curl/docs/SECURITY-PROCESS.md, revision 1.1
1.1 ! misho 1: curl security process
! 2: =====================
! 3:
! 4: This document describes how security vulnerabilities should be handled in the
! 5: curl project.
! 6:
! 7: Publishing Information
! 8: ----------------------
! 9:
! 10: All known and public curl or libcurl related vulnerabilities are listed on
! 11: [the curl web site security page](https://curl.haxx.se/docs/security.html).
! 12:
! 13: Security vulnerabilities **should not** be entered in the project's public bug
! 14: tracker.
! 15:
! 16: Vulnerability Handling
! 17: ----------------------
! 18:
! 19: The typical process for handling a new security vulnerability is as follows.
! 20:
! 21: No information should be made public about a vulnerability until it is
! 22: formally announced at the end of this process. That means, for example that a
! 23: bug tracker entry must NOT be created to track the issue since that will make
! 24: the issue public and it should not be discussed on any of the project's public
! 25: mailing lists. Also messages associated with any commits should not make any
! 26: reference to the security nature of the commit if done prior to the public
! 27: announcement.
! 28:
! 29: - The person discovering the issue, the reporter, reports the vulnerability on
! 30: [https://hackerone.com/curl](https://hackerone.com/curl). Issues filed there
! 31: reach a handful of selected and trusted people.
! 32:
! 33: - Messages that do not relate to the reporting or managing of an undisclosed
! 34: security vulnerability in curl or libcurl are ignored and no further action
! 35: is required.
! 36:
! 37: - A person in the security team responds to the original report to acknowledge
! 38: that a human has seen the report.
! 39:
! 40: - The security team investigates the report and either rejects it or accepts
! 41: it.
! 42:
! 43: - If the report is rejected, the team writes to the reporter to explain why.
! 44:
! 45: - If the report is accepted, the team writes to the reporter to let him/her
! 46: know it is accepted and that they are working on a fix.
! 47:
! 48: - The security team discusses the problem, works out a fix, considers the
! 49: impact of the problem and suggests a release schedule. This discussion
! 50: should involve the reporter as much as possible.
! 51:
! 52: - The release of the information should be "as soon as possible" and is most
! 53: often synchronized with an upcoming release that contains the fix. If the
! 54: reporter, or anyone else involved, thinks the next planned release is too
! 55: far away, then a separate earlier release should be considered.
! 56:
! 57: - Write a security advisory draft about the problem that explains what the
! 58: problem is, its impact, which versions it affects, solutions or workarounds,
! 59: when the release is out and make sure to credit all contributors properly.
! 60: Figure out the CWE (Common Weakness Enumeration) number for the flaw.
! 61:
! 62: - Request a CVE number from
! 63: [HackerOne](https://docs.hackerone.com/programs/cve-requests.html)
! 64:
! 65: - Consider informing
! 66: [distros@openwall](https://oss-security.openwall.org/wiki/mailing-lists/distros)
! 67: to prepare them about the upcoming public security vulnerability
! 68: announcement - attach the advisory draft for information. Note that
! 69: 'distros' won't accept an embargo longer than 14 days and they do not care
! 70: for Windows-specific flaws.
! 71:
! 72: - Update the "security advisory" with the CVE number.
! 73:
! 74: - The security team commits the fix in a private branch. The commit message
! 75: should ideally contain the CVE number. This fix is usually also distributed
! 76: to the 'distros' mailing list to allow them to use the fix prior to the
! 77: public announcement.
! 78:
! 79: - No more than 48 hours before the release, the private branch is merged into
! 80: the master branch and pushed. Once pushed, the information is accessible to
! 81: the public and the actual release should follow suit immediately afterwards.
! 82: The time between the push and the release is used for final tests and
! 83: reviews.
! 84:
! 85: - The project team creates a release that includes the fix.
! 86:
! 87: - The project team announces the release and the vulnerability to the world in
! 88: the same manner we always announce releases. It gets sent to the
! 89: curl-announce, curl-library and curl-users mailing lists.
! 90:
! 91: - The security web page on the web site should get the new vulnerability
! 92: mentioned.
! 93:
! 94: curl-security (at haxx dot se)
! 95: ------------------------------
! 96:
! 97: This is a private mailing list for discussions on and about curl security
! 98: issues.
! 99:
! 100: Who is on this list? There are a couple of criteria you must meet, and then we
! 101: might ask you to join the list or you can ask to join it. It really isn't very
! 102: formal. We basically only require that you have a long-term presence in the
! 103: curl project and you have shown an understanding for the project and its way
! 104: of working. You must've been around for a good while and you should have no
! 105: plans in vanishing in the near future.
! 106:
! 107: We do not make the list of participants public mostly because it tends to vary
! 108: somewhat over time and a list somewhere will only risk getting outdated.
! 109:
! 110: Publishing Security Advisories
! 111: ------------------------------
! 112:
! 113: 1. Write up the security advisory, using markdown syntax. Use the same
! 114: subtitles as last time to maintain consistency.
! 115:
! 116: 2. Name the advisory file after the allocated CVE id.
! 117:
! 118: 3. Add a line on the top of the array in `curl-www/docs/vuln.pm'.
! 119:
! 120: 4. Put the new advisory markdown file in the curl-www/docs/ directory. Add it
! 121: to the git repo.
! 122:
! 123: 5. Run `make` in your local web checkout and verify that things look fine.
! 124:
! 125: 6. On security advisory release day, push the changes on the curl-www
! 126: repository's remote master branch.
! 127:
! 128: Bug Bounty
! 129: ----------
! 130:
! 131: See [BUG-BOUNTY](https://curl.haxx.se/docs/bugbounty.html) for details on the
! 132: bug bounty program.
FreeBSD-CVSweb <freebsd-cvsweb@FreeBSD.org>