]>
Commit | Line | Data |
---|---|---|
609d99a3 MCC |
1 | .. _securitybugs: |
2 | ||
1d7078d4 MCC |
3 | Security bugs |
4 | ============= | |
5 | ||
1da177e4 LT |
6 | Linux kernel developers take security very seriously. As such, we'd |
7 | like to know when a security bug is found so that it can be fixed and | |
8 | disclosed as quickly as possible. Please report security bugs to the | |
9 | Linux kernel security team. | |
10 | ||
9d85025b MCC |
11 | Contact |
12 | ------- | |
1da177e4 LT |
13 | |
14 | The Linux kernel security team can be contacted by email at | |
15 | <[email protected]>. This is a private list of security officers | |
16 | who will help verify the bug report and develop and release a fix. | |
49978be7 KC |
17 | If you already have a fix, please include it with your report, as |
18 | that can speed up the process considerably. It is possible that the | |
19 | security team will bring in extra help from area maintainers to | |
20 | understand and fix the security vulnerability. | |
1da177e4 LT |
21 | |
22 | As it is with any bug, the more information provided the easier it | |
23 | will be to diagnose and fix. Please review the procedure outlined in | |
49978be7 KC |
24 | admin-guide/reporting-bugs.rst if you are unclear about what |
25 | information is helpful. Any exploit code is very helpful and will not | |
26 | be released without consent from the reporter unless it has already been | |
27 | made public. | |
1da177e4 | 28 | |
14fdc2c5 WD |
29 | Disclosure and embargoed information |
30 | ------------------------------------ | |
31 | ||
32 | The security list is not a disclosure channel. For that, see Coordination | |
33 | below. | |
34 | ||
35 | Once a robust fix has been developed, our preference is to release the | |
36 | fix in a timely fashion, treating it no differently than any of the other | |
37 | thousands of changes and fixes the Linux kernel project releases every | |
38 | month. | |
39 | ||
40 | However, at the request of the reporter, we will postpone releasing the | |
41 | fix for up to 5 business days after the date of the report or after the | |
42 | embargo has lifted; whichever comes first. The only exception to that | |
43 | rule is if the bug is publicly known, in which case the preference is to | |
44 | release the fix as soon as it's available. | |
45 | ||
46 | Whilst embargoed information may be shared with trusted individuals in | |
47 | order to develop a fix, such information will not be published alongside | |
48 | the fix or on any other disclosure channel without the permission of the | |
49 | reporter. This includes but is not limited to the original bug report | |
50 | and followup discussions (if any), exploits, CVE information or the | |
51 | identity of the reporter. | |
52 | ||
53 | In other words our only interest is in getting bugs fixed. All other | |
54 | information submitted to the security list and any followup discussions | |
55 | of the report are treated confidentially even after the embargo has been | |
56 | lifted, in perpetuity. | |
1da177e4 | 57 | |
49978be7 KC |
58 | Coordination |
59 | ------------ | |
60 | ||
61 | Fixes for sensitive bugs, such as those that might lead to privilege | |
62 | escalations, may need to be coordinated with the private | |
63 | <[email protected]> mailing list so that distribution vendors | |
64 | are well prepared to issue a fixed kernel upon public disclosure of the | |
65 | upstream fix. Distros will need some time to test the proposed patch and | |
66 | will generally request at least a few days of embargo, and vendor update | |
67 | publication prefers to happen Tuesday through Thursday. When appropriate, | |
68 | the security team can assist with this coordination, or the reporter can | |
69 | include linux-distros from the start. In this case, remember to prefix | |
70 | the email Subject line with "[vs]" as described in the linux-distros wiki: | |
71 | <http://oss-security.openwall.org/wiki/mailing-lists/distros#how-to-use-the-lists> | |
72 | ||
73 | CVE assignment | |
74 | -------------- | |
75 | ||
76 | The security team does not normally assign CVEs, nor do we require them | |
77 | for reports or fixes, as this can needlessly complicate the process and | |
78 | may delay the bug handling. If a reporter wishes to have a CVE identifier | |
79 | assigned ahead of public disclosure, they will need to contact the private | |
80 | linux-distros list, described above. When such a CVE identifier is known | |
81 | before a patch is provided, it is desirable to mention it in the commit | |
14fdc2c5 | 82 | message if the reporter agrees. |
49978be7 | 83 | |
9d85025b MCC |
84 | Non-disclosure agreements |
85 | ------------------------- | |
1da177e4 LT |
86 | |
87 | The Linux kernel security team is not a formal body and therefore unable | |
88 | to enter any non-disclosure agreements. |