summaryrefslogtreecommitdiff
path: root/binutils
diff options
context:
space:
mode:
authorNick Clifton <nickc@redhat.com>2023-04-20 16:52:11 +0100
committerNick Clifton <nickc@redhat.com>2023-04-20 16:52:11 +0100
commit8e7785b4bd4fccaafad5c64a30342345e8cc6801 (patch)
tree0cadb103ceb4f21d5fce6f8a5f2799a4c3291d4f /binutils
parentb6b746e6b81c69588d7ca07708b307bd7728b0ac (diff)
downloadbinutils-gdb-8e7785b4bd4fccaafad5c64a30342345e8cc6801.tar.gz
Add a SECURITY.txt file describing the GNU Binutils' project's stance on security related bugs.
Diffstat (limited to 'binutils')
-rw-r--r--binutils/ChangeLog4
-rw-r--r--binutils/SECURITY.txt68
2 files changed, 72 insertions, 0 deletions
diff --git a/binutils/ChangeLog b/binutils/ChangeLog
index 22ca79cfb96..d2b862aedef 100644
--- a/binutils/ChangeLog
+++ b/binutils/ChangeLog
@@ -1,3 +1,7 @@
+2023-04-20 Nick Clifton <nickc@redhat.com>
+
+ * SECURITY.txt: New file.
+
2023-04-19 Nick Clifton <nickc@redhat.com>
PR 30355
diff --git a/binutils/SECURITY.txt b/binutils/SECURITY.txt
new file mode 100644
index 00000000000..d9542342b38
--- /dev/null
+++ b/binutils/SECURITY.txt
@@ -0,0 +1,68 @@
+Binutils Security Process
+=========================
+
+What is a binutils security bug?
+================================
+
+ A security bug is one that threatens the security of a system or
+ network, or might compromise the security of data stored on it.
+ In the context of GNU Binutils there are two ways in which such
+ bugs might occur. In the first, the programs themselves might be
+ tricked into a direct compromise of security. In the second, the
+ tools might introduce a vulnerability in the generated output that
+ was not already present in the files used as input.
+
+ Other than that, all other bugs will be treated as non-security
+ issues. This does not mean that they will be ignored, just that
+ they will not be given the priority that is given to security bugs.
+
+ This stance applies to the creation tools in the GNU Binutils (eg
+ as, ld, gold, objcopy) and the libraries that they use. Bugs in
+ inspection tools (eg readelf, nm objdump) will not be considered
+ to be security bugs, since they do not create executable output
+ files.
+
+Notes:
+======
+
+ None of the programs in the GNU Binutils suite need elevated
+ privileges to operate and it is recommended that users do not use
+ them from accounts where such privileges are automatically
+ available.
+
+ The inspection tools are intended to be robust but nevertheless
+ they should be appropriately sandboxed if they are used to examine
+ malicious or potentially malicious input files.
+
+Reporting private security bugs
+===============================
+
+ *All bugs reported in the Binutils Bugzilla are public.*
+
+ In order to report a private security bug that is not immediately
+ public, please contact one of the downstream distributions with
+ security teams. The following teams have volunteered to handle
+ such bugs:
+
+ Debian: security@debian.org
+ Red Hat: secalert@redhat.com
+ SUSE: security@suse.de
+
+ Please report the bug to just one of these teams. It will be shared
+ with other teams as necessary.
+
+ The team contacted will take care of details such as vulnerability
+ rating and CVE assignment (http://cve.mitre.org/about/). It is likely
+ that the team will ask to file a public bug because the issue is
+ sufficiently minor and does not warrant an embargo. An embargo is not
+ a requirement for being credited with the discovery of a security
+ vulnerability.
+
+Reporting public security bugs
+==============================
+
+ It is expected that critical security bugs will be rare, and that most
+ security bugs can be reported in Binutils Bugzilla system, thus making
+ them public immediately. The system can be found here:
+
+ https://sourceware.org/bugzilla/