From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from gnu.wildebeest.org (gnu.wildebeest.org [45.83.234.184]) by sourceware.org (Postfix) with ESMTPS id 924363858D33 for ; Fri, 7 Apr 2023 20:26:32 +0000 (GMT) DMARC-Filter: OpenDMARC Filter v1.4.2 sourceware.org 924363858D33 Authentication-Results: sourceware.org; dmarc=none (p=none dis=none) header.from=klomp.org Authentication-Results: sourceware.org; spf=pass smtp.mailfrom=klomp.org Received: by gnu.wildebeest.org (Postfix, from userid 1000) id 94118302BB02; Fri, 7 Apr 2023 22:26:31 +0200 (CEST) Date: Fri, 7 Apr 2023 22:26:31 +0200 From: Mark Wielaard To: "Frank Ch. Eigler" Cc: elfutils-devel@sourceware.org Subject: Re: Some ideas for process improvements/changes Message-ID: <20230407202631.GK18331@gnu.wildebeest.org> References: <11b1c515a2a0ed2af0c72ac6437aca81ba0806a7.camel@klomp.org> <20230406173420.GA10746@redhat.com> <20230406215749.GC18331@gnu.wildebeest.org> <20230407005600.GB10746@redhat.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20230407005600.GB10746@redhat.com> User-Agent: Mutt/1.5.21 (2010-09-15) X-Spam-Status: No, score=-3030.6 required=5.0 tests=BAYES_00,JMQ_SPF_NEUTRAL,KAM_DMARC_STATUS,SPF_HELO_NONE,SPF_PASS,TXREP autolearn=no autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on server2.sourceware.org List-Id: Hi Frank, On Thu, Apr 06, 2023 at 08:56:00PM -0400, Frank Ch. Eigler via Elfutils-devel wrote: > > > > - "Security" bug guidance > > > > [...] > > > > > > Yeah, a brief SECURITY file would be nice. > > > > Any suggestions about what to put in such a section or file. My main > > concern is that people are filing things we regard as simple bugs as > > "security" issues [...] > > > Yeah, that's a pain. How about: > > """ > > The elfutils library and utilities aim to be generally robust and > reliable. However, elfutils routinely processes complex binary > structured data. This makes the code intricate and sometimes brittle. > While elfutils developers use a variety of static and dynamic checker > software (valgrind, sanitizers) in testing, bugs may remain. Some of > these bugs may have security-related implications. > > > While many errors are cleanly detected at runtime, it is possible that > vulnerabilities exist that could be exploitable. These may arise from > crafted / fuzzed / erroneous inputs, or perhaps even from valid inputs > with unforseen characteristics. Therefore, to minimize risks, users > of elfutils tools and libraries should consider measures such as: > > - avoiding running complex elfutils analysis on untrustworthy inputs > - avoiding running elfutils tools as privileged processes > - applying common platform level protection mechanisms such as > selinux, syscall filtering, hardened compilation, etc. > > Since most elfutils tools are run in short-lived, local, interactive, > development context rather than remotely "in production", we generally > treat malfunctions as ordinary bugs rather than security vulnerabilities. > > > Elfutils includes one network client/server: debuginfod. The > debuginfod man page contains a SECURITY section outlining the general > risks. tl;dr: many classes of server problems are delegated to > front-end proxies and curated elf/dwarf archives of the operator; > others to careful configuration of the debuginfod client. These are > not generally reportable as security vulnerabilities. However, we are > likely to accept security vulnerability reports related to: > > - availability: e.g., remotely exploitable server crash, but not > routine resource exhaustion or overload; client crash due to > unexpected valid traffic from trusted server > > - confidentiality: e.g., allowing the server to expose one client's > traffic to another client > > - integrity: e.g., causing the server to send erroneous > elf/dwarf/source data across the webapi; causing the client to > corrupt its cache to lose file integrity > > We welcome reports that are tangential to any of these subjects. Very nice. I would not have been able to describe things so nicely. Thanks. > Please report bugs via any of: > - email to > - https://sourceware.org/bugzilla/enter_bug.cgi?product=elfutils > > After considering the above exclusions, please report suspected > security vulnerabilities confidentially via any of: > > - email to > - email to > - email to I am happy to receive such reports. And I trust the secalert team at Red Hat. But I would like to hear from other distro maintainers what they think of this policy. I would like to not give one distro or corporate entity preferred early notification of suspected security issues. Also I think we should explicitly add something like: We are happy to keep the security implication of a bug, or a proof of concept exploit private. But unless the bug is critical we'll resolve the underlying issue through the normal project development processes, without mentioning the security vulnerability itself. To make clear we aren't going to play security embargo theater. Cheers, Mark