aboutsummaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorWill Deacon <will.deacon@arm.com>2018-10-22 11:39:01 -0400
committerGreg Kroah-Hartman <gregkh@linuxfoundation.org>2018-10-23 09:15:58 -0400
commit14fdc2c5318ae420e68496975f48dc1dbef52649 (patch)
tree9fc359b5e6efa9ed6bf69125049aa32fa893d174
parent93048c0944150b316a15f92c41a4d626c8df37fd (diff)
Documentation/security-bugs: Clarify treatment of embargoed information
The Linux kernel security team has been accused of rejecting the idea of security embargoes. This is incorrect, and could dissuade people from reporting security issues to us under the false assumption that the issue would leak prematurely. Clarify the handling of embargoed information in our process documentation. Co-developed-by: Ingo Molnar <mingo@kernel.org> Acked-by: Kees Cook <keescook@chromium.org> Acked-by: Peter Zijlstra <peterz@infradead.org> Acked-by: Laura Abbott <labbott@redhat.com> Signed-off-by: Will Deacon <will.deacon@arm.com> Signed-off-by: Ingo Molnar <mingo@kernel.org> Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
-rw-r--r--Documentation/admin-guide/security-bugs.rst47
1 files changed, 29 insertions, 18 deletions
diff --git a/Documentation/admin-guide/security-bugs.rst b/Documentation/admin-guide/security-bugs.rst
index 30491d91e93d..164bf71149fd 100644
--- a/Documentation/admin-guide/security-bugs.rst
+++ b/Documentation/admin-guide/security-bugs.rst
@@ -26,23 +26,34 @@ information is helpful. Any exploit code is very helpful and will not
26be released without consent from the reporter unless it has already been 26be released without consent from the reporter unless it has already been
27made public. 27made public.
28 28
29Disclosure 29Disclosure and embargoed information
30---------- 30------------------------------------
31 31
32The goal of the Linux kernel security team is to work with the bug 32The security list is not a disclosure channel. For that, see Coordination
33submitter to understand and fix the bug. We prefer to publish the fix as 33below.
34soon as possible, but try to avoid public discussion of the bug itself 34
35and leave that to others. 35Once a robust fix has been developed, our preference is to release the
36 36fix in a timely fashion, treating it no differently than any of the other
37Publishing the fix may be delayed when the bug or the fix is not yet 37thousands of changes and fixes the Linux kernel project releases every
38fully understood, the solution is not well-tested or for vendor 38month.
39coordination. However, we expect these delays to be short, measurable in 39
40days, not weeks or months. A release date is negotiated by the security 40However, at the request of the reporter, we will postpone releasing the
41team working with the bug submitter as well as vendors. However, the 41fix for up to 5 business days after the date of the report or after the
42kernel security team holds the final say when setting a timeframe. The 42embargo has lifted; whichever comes first. The only exception to that
43timeframe varies from immediate (esp. if it's already publicly known bug) 43rule is if the bug is publicly known, in which case the preference is to
44to a few weeks. As a basic default policy, we expect report date to 44release the fix as soon as it's available.
45release date to be on the order of 7 days. 45
46Whilst embargoed information may be shared with trusted individuals in
47order to develop a fix, such information will not be published alongside
48the fix or on any other disclosure channel without the permission of the
49reporter. This includes but is not limited to the original bug report
50and followup discussions (if any), exploits, CVE information or the
51identity of the reporter.
52
53In other words our only interest is in getting bugs fixed. All other
54information submitted to the security list and any followup discussions
55of the report are treated confidentially even after the embargo has been
56lifted, in perpetuity.
46 57
47Coordination 58Coordination
48------------ 59------------
@@ -68,7 +79,7 @@ may delay the bug handling. If a reporter wishes to have a CVE identifier
68assigned ahead of public disclosure, they will need to contact the private 79assigned ahead of public disclosure, they will need to contact the private
69linux-distros list, described above. When such a CVE identifier is known 80linux-distros list, described above. When such a CVE identifier is known
70before a patch is provided, it is desirable to mention it in the commit 81before a patch is provided, it is desirable to mention it in the commit
71message, though. 82message if the reporter agrees.
72 83
73Non-disclosure agreements 84Non-disclosure agreements
74------------------------- 85-------------------------