]> sourceware.org Git - libabigail.git/commitdiff
SECURITY: New security policy text
authorDodji Seketeli <dodji@redhat.com>
Tue, 12 Nov 2024 15:33:39 +0000 (16:33 +0100)
committerDodji Seketeli <dodji@redhat.com>
Wed, 13 Nov 2024 14:35:16 +0000 (15:35 +0100)
Let's have a policy to handle security issues reported against
libabigail.

This security policy text is derived from the elfutils project one at
https://sourceware.org/cgit/elfutils/tree/SECURITY.

* SECURITY: New security policy text file.
* Makefile.am: Add the new SECURITY file to the distribution.

Signed-off-by: Dodji Seketeli <dodji@redhat.com>
Reviewed-by: Frank Ch. Eigler <fche@redhat.com>
Makefile.am
SECURITY [new file with mode: 0644]

index c55f237471bbaca66828f0a82b721661ab82fef4..f540ccddb16a55cdb82ad125379b10f96ec7d211 100644 (file)
@@ -21,7 +21,7 @@ autoconf-archive/ax_check_python_modules.m4 \
 autoconf-archive/ax_prog_python_version.m4 \
 autoconf-archive/ax_compare_version.m4 \
 NEWS README LICENSE.txt license-change-2020.txt \
-COMPILING COMMIT-LOG-GUIDELINES VISIBILITY \
+COMPILING COMMIT-LOG-GUIDELINES VISIBILITY SECURITY \
 ChangeLog gen-changelog.py     \
 $(headers) $(m4data_DATA)      \
 libabigail.pc.in
diff --git a/SECURITY b/SECURITY
new file mode 100644 (file)
index 0000000..124edfe
--- /dev/null
+++ b/SECURITY
@@ -0,0 +1,34 @@
+The libabigail library and utilities aim to be generally robust and
+reliable.  However, libabigail routinely processes complex binary
+structured data.  This makes the code intricate and sometimes brittle.
+While libabigail developers use a variety of static and dynamic checker
+software (valgrind, sanitizers) in testing, bugs may remain.  Some of
+these bugs may have security-related implications.
+
+
+While many errors are cleanly detected at runtime, it is possible that
+vulnerabilities exist that could be exploitable.  These may arise from
+crafted / fuzzed / erroneous inputs, or perhaps even from valid inputs
+with unforseen characteristics.  Therefore, to minimize risks, users
+of libabigail tools and libraries should consider measures such as:
+
+- avoiding running complex libabigail analysis on untrustworthy inputs
+- avoiding running libabigail tools as privileged processes
+- applying common platform level protection mechanisms such as
+  selinux, syscall filtering, hardened compilation, etc.
+
+Since libabigail tools are usually run in short-lived, local,
+interactive, development context rather than remotely "in production",
+we generally treat malfunctions as ordinary bugs rather than security
+vulnerabilities.
+
+Please report bugs via any of:
+- email to <libabigail@sourceware.org>
+- https://sourceware.org/bugzilla/enter_bug.cgi?product=libabigail
+
+After considering the above exclusions, please report suspected
+security vulnerabilities confidentially via any of:
+
+- email to <dodji@seketeli.org>
+- email to <fche@elastic.org>
+- email to <secalert@redhat.com>
This page took 0.034929 seconds and 5 git commands to generate.