Skip to content

Commit

Permalink
SECURITY.md: Update.
Browse files Browse the repository at this point in the history
Add bit about reporting vulns with GPG.
Add generalised rules for vulnerabilties.

Signed-off-by: Andrew Kampjes <a.kampjes@gmail.com>
[blp@nicira.com edited and removed text about not using public lists]
Signed-off-by: Ben Pfaff <blp@nicira.com>
  • Loading branch information
akampjes authored and blp committed Jan 13, 2015
1 parent a445a8d commit b13bfc3
Show file tree
Hide file tree
Showing 2 changed files with 22 additions and 10 deletions.
1 change: 1 addition & 0 deletions AUTHORS
Expand Up @@ -10,6 +10,7 @@ Alfredo Finelli alf@computationes.de
Alin Serdean aserdean@cloudbasesolutions.com
Amit Bose bose@noironetworks.com
Andrew Evans aevans@nicira.com
Andrew Kampjes a.kampjes@gmail.com
Andrew Lambeth wal@nicira.com
Andy Hill hillad@gmail.com
Andy Southgate andy.southgate@citrix.com
Expand Down
31 changes: 21 additions & 10 deletions SECURITY.md
Expand Up @@ -23,25 +23,33 @@ What is a vulnerability?
------------------------

All vulnerabilities are bugs, but not every bug is a vulnerability.
Vulnerabilities compromise one or more of:

* Confidentiality (personal or corporate confidential data).
* Integrity (trustworthiness and correctness).
* Availability (uptime and service).

Here are some examples of vulnerabilities to which one would expect to
apply this process:

* A crafted packet that causes a kernel or userspace crash.
* A crafted packet that causes a kernel or userspace crash
(Availability).

* A flow translation bug that misforwards traffic in a way likely
to hop over security boundaries.
to hop over security boundaries (Integrity).

* An OpenFlow protocol bug that allows a controller to read
arbitrary files from the file system.
arbitrary files from the file system (Confidentiality).

* Misuse of the OpenSSL library that allows bypassing certificate
checks.
checks (Integrity).

* A bug (memory corruption, overflow, ...) that allows one to
modify the behaviour of OVS through external configuration
interfaces such as OVSDB.
interfaces such as OVSDB (Integrity).

* Privileged information is exposed to unprivileged users.
* Privileged information is exposed to unprivileged users
(Confidentiality).

If in doubt, please do use the vulnerability management process. At
worst, the response will be to report the bug through the usual
Expand All @@ -59,6 +67,9 @@ the report has been received.
Please consider reporting the information mentioned in
REPORTING-BUGS.md, where relevant.

Reporters may ask for a GPG key while initiating contact with the
security team to deliver more sensitive reports.

The Linux kernel has its own vulnerability management process:
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/tree/Documentation/SecurityBugs
Handling of vulnerabilities that affect both the Open vSwitch tree and
Expand Down Expand Up @@ -132,11 +143,11 @@ vSwitch user who is interested and can be considered trustworthy
enough could be included. To become a downstream stakeholder, email
the ovs-security mailing list.

If the vulnerability is public, skip this step.
If the vulnerability is already public, skip this step.


Step 5: Full Disclosure
-----------------------
Step 5: Public Disclosure
-------------------------

When the embargo expires, push the (reviewed) patches to appropriate
branches, post the patches to the ovs-dev mailing list (noting that
Expand All @@ -151,7 +162,7 @@ The security advisory should be GPG-signed by a security team member
with a key that is in a public web of trust.


Contact
Contact
=======

Report security vulnerabilities to the ovs-security mailing list:
Expand Down

0 comments on commit b13bfc3

Please sign in to comment.