Merge branch 'js/security-md'
SECURITY.md that is facing individual contributors and end users has been introduced. Also a procedure to follow when preparing embargoed releases has been spelled out. * js/security-md: Document how we do embargoed releases SECURITY: describe how to report vulnerabilities
This commit is contained in:
commit
3cf14f88de
@ -76,6 +76,7 @@ SP_ARTICLES += howto/rebuild-from-update-hook
|
|||||||
SP_ARTICLES += howto/rebase-from-internal-branch
|
SP_ARTICLES += howto/rebase-from-internal-branch
|
||||||
SP_ARTICLES += howto/keep-canonical-history-correct
|
SP_ARTICLES += howto/keep-canonical-history-correct
|
||||||
SP_ARTICLES += howto/maintain-git
|
SP_ARTICLES += howto/maintain-git
|
||||||
|
SP_ARTICLES += howto/coordinate-embargoed-releases
|
||||||
API_DOCS = $(patsubst %.txt,%,$(filter-out technical/api-index-skel.txt technical/api-index.txt, $(wildcard technical/api-*.txt)))
|
API_DOCS = $(patsubst %.txt,%,$(filter-out technical/api-index-skel.txt technical/api-index.txt, $(wildcard technical/api-*.txt)))
|
||||||
SP_ARTICLES += $(API_DOCS)
|
SP_ARTICLES += $(API_DOCS)
|
||||||
|
|
||||||
|
131
Documentation/howto/coordinate-embargoed-releases.txt
Normal file
131
Documentation/howto/coordinate-embargoed-releases.txt
Normal file
@ -0,0 +1,131 @@
|
|||||||
|
Content-type: text/asciidoc
|
||||||
|
Abstract: When a critical vulnerability is discovered and fixed, we follow this
|
||||||
|
script to coordinate a public release.
|
||||||
|
|
||||||
|
How we coordinate embargoed releases
|
||||||
|
====================================
|
||||||
|
|
||||||
|
To protect Git users from critical vulnerabilities, we do not just release
|
||||||
|
fixed versions like regular maintenance releases. Instead, we coordinate
|
||||||
|
releases with packagers, keeping the fixes under an embargo until the release
|
||||||
|
date. That way, users will have a chance to upgrade on that date, no matter
|
||||||
|
what Operating System or distribution they run.
|
||||||
|
|
||||||
|
Open a Security Advisory draft
|
||||||
|
------------------------------
|
||||||
|
|
||||||
|
The first step is to https://github.com/git/git/security/advisories/new[open an
|
||||||
|
advisory]. Technically, it is not necessary, but it is convenient and saves a
|
||||||
|
bit of hassle. This advisory can also be used to obtain the CVE number and it
|
||||||
|
will give us a private fork associated with it that can be used to collaborate
|
||||||
|
on a fix.
|
||||||
|
|
||||||
|
Release date of the embargoed version
|
||||||
|
-------------------------------------
|
||||||
|
|
||||||
|
If the vulnerability affects Windows users, we want to have our friends over at
|
||||||
|
Visual Studio on board. This means we need to target a "Patch Tuesday" (i.e. a
|
||||||
|
second Tuesday of the month), at the minimum three weeks from heads-up to
|
||||||
|
coordinated release.
|
||||||
|
|
||||||
|
If the vulnerability affects the server side, or can benefit from scans on the
|
||||||
|
server side (i.e. if `git fsck` can detect an attack), it is important to give
|
||||||
|
all involved Git repository hosting sites enough time to scan all of those
|
||||||
|
repositories.
|
||||||
|
|
||||||
|
Notifying the Linux distributions
|
||||||
|
---------------------------------
|
||||||
|
|
||||||
|
At most two weeks before release date, we need to send a notification to
|
||||||
|
distros@vs.openwall.org, preferably less than 7 days before the release date.
|
||||||
|
This will reach most (all?) Linux distributions. See an example below, and the
|
||||||
|
guidelines for this mailing list at
|
||||||
|
https://oss-security.openwall.org/wiki/mailing-lists/distros#how-to-use-the-lists[here].
|
||||||
|
|
||||||
|
Once the version has been published, we send a note about that to oss-security.
|
||||||
|
As an example, see https://www.openwall.com/lists/oss-security/2019/12/13/1[the
|
||||||
|
v2.24.1 mail];
|
||||||
|
https://oss-security.openwall.org/wiki/mailing-lists/oss-security[Here] are
|
||||||
|
their guidelines.
|
||||||
|
|
||||||
|
The mail to oss-security should also describe the exploit, and give credit to
|
||||||
|
the reporter(s): security researchers still receive too little respect for the
|
||||||
|
invaluable service they provide, and public credit goes a long way to keep them
|
||||||
|
paid by their respective organizations.
|
||||||
|
|
||||||
|
Technically, describing any exploit can be delayed up to 7 days, but we usually
|
||||||
|
refrain from doing that, including it right away.
|
||||||
|
|
||||||
|
As a courtesy we typically attach a Git bundle (as `.tar.xz` because the list
|
||||||
|
will drop `.bundle` attachments) in the mail to distros@ so that the involved
|
||||||
|
parties can take care of integrating/backporting them. This bundle is typically
|
||||||
|
created using a command like this:
|
||||||
|
|
||||||
|
git bundle create cve-xxx.bundle ^origin/master vA.B.C vD.E.F
|
||||||
|
tar cJvf cve-xxx.bundle.tar.xz cve-xxx.bundle
|
||||||
|
|
||||||
|
Example mail to distros@vs.openwall.org
|
||||||
|
---------------------------------------
|
||||||
|
|
||||||
|
....
|
||||||
|
To: distros@vs.openwall.org
|
||||||
|
Cc: git-security@googlegroups.com, <other people involved in the report/fix>
|
||||||
|
Subject: [vs] Upcoming Git security fix release
|
||||||
|
|
||||||
|
Team,
|
||||||
|
|
||||||
|
The Git project will release new versions on <date> at 10am Pacific Time or
|
||||||
|
soon thereafter. I have attached a Git bundle (embedded in a `.tar.xz` to avoid
|
||||||
|
it being dropped) which you can fetch into a clone of
|
||||||
|
https://github.com/git/git via `git fetch --tags /path/to/cve-xxx.bundle`,
|
||||||
|
containing the tags for versions <versions>.
|
||||||
|
|
||||||
|
You can verify with `git tag -v <tag>` that the versions were signed by
|
||||||
|
the Git maintainer, using the same GPG key as e.g. v2.24.0.
|
||||||
|
|
||||||
|
Please use these tags to prepare `git` packages for your various
|
||||||
|
distributions, using the appropriate tagged versions. The added test cases
|
||||||
|
help verify the correctness.
|
||||||
|
|
||||||
|
The addressed issues are:
|
||||||
|
|
||||||
|
<list of CVEs with a short description, typically copy/pasted from Git's
|
||||||
|
release notes, usually demo exploit(s), too>
|
||||||
|
|
||||||
|
Credit for finding the vulnerability goes to <reporter>, credit for fixing
|
||||||
|
it goes to <developer>.
|
||||||
|
|
||||||
|
Thanks,
|
||||||
|
<name>
|
||||||
|
|
||||||
|
....
|
||||||
|
|
||||||
|
Example mail to oss-security@lists.openwall.com
|
||||||
|
-----------------------------------------------
|
||||||
|
|
||||||
|
....
|
||||||
|
To: oss-security@lists.openwall.com
|
||||||
|
Cc: git-security@googlegroups.com, <other people involved in the report/fix>
|
||||||
|
Subject: git: <copy from security advisory>
|
||||||
|
|
||||||
|
Team,
|
||||||
|
|
||||||
|
The Git project released new versions on <date>, addressing <CVE>.
|
||||||
|
|
||||||
|
All supported platforms are affected in one way or another, and all Git
|
||||||
|
versions all the way back to <version> are affected. The fixed versions are:
|
||||||
|
<versions>.
|
||||||
|
|
||||||
|
Link to the announcement: <link to lore.kernel.org/git>
|
||||||
|
|
||||||
|
We highly recommend to upgrade.
|
||||||
|
|
||||||
|
The addressed issues are:
|
||||||
|
* <list of CVEs and their explanations, along with demo exploits>
|
||||||
|
|
||||||
|
Credit for finding the vulnerability goes to <reporter>, credit for fixing
|
||||||
|
it goes to <developer>.
|
||||||
|
|
||||||
|
Thanks,
|
||||||
|
<name>
|
||||||
|
....
|
51
SECURITY.md
Normal file
51
SECURITY.md
Normal file
@ -0,0 +1,51 @@
|
|||||||
|
# Security Policy
|
||||||
|
|
||||||
|
## Reporting a vulnerability
|
||||||
|
|
||||||
|
Please send a detailed mail to git-security@googlegroups.com to
|
||||||
|
report vulnerabilities in Git.
|
||||||
|
|
||||||
|
Even when unsure whether the bug in question is an exploitable
|
||||||
|
vulnerability, it is recommended to send the report to
|
||||||
|
git-security@googlegroups.com (and obviously not to discuss the
|
||||||
|
issue anywhere else).
|
||||||
|
|
||||||
|
Vulnerabilities are expected to be discussed _only_ on that
|
||||||
|
list, and not in public, until the official announcement on the
|
||||||
|
Git mailing list on the release date.
|
||||||
|
|
||||||
|
Examples for details to include:
|
||||||
|
|
||||||
|
- Ideally a short description (or a script) to demonstrate an
|
||||||
|
exploit.
|
||||||
|
- The affected platforms and scenarios (the vulnerability might
|
||||||
|
only affect setups with case-sensitive file systems, for
|
||||||
|
example).
|
||||||
|
- The name and affiliation of the security researchers who are
|
||||||
|
involved in the discovery, if any.
|
||||||
|
- Whether the vulnerability has already been disclosed.
|
||||||
|
- How long an embargo would be required to be safe.
|
||||||
|
|
||||||
|
## Supported Versions
|
||||||
|
|
||||||
|
There are no official "Long Term Support" versions in Git.
|
||||||
|
Instead, the maintenance track (i.e. the versions based on the
|
||||||
|
most recently published feature release, also known as ".0"
|
||||||
|
version) sees occasional updates with bug fixes.
|
||||||
|
|
||||||
|
Fixes to vulnerabilities are made for the maintenance track for
|
||||||
|
the latest feature release and merged up to the in-development
|
||||||
|
branches. The Git project makes no formal guarantee for any
|
||||||
|
older maintenance tracks to receive updates. In practice,
|
||||||
|
though, critical vulnerability fixes are applied not only to the
|
||||||
|
most recent track, but to at least a couple more maintenance
|
||||||
|
tracks.
|
||||||
|
|
||||||
|
This is typically done by making the fix on the oldest and still
|
||||||
|
relevant maintenance track, and merging it upwards to newer and
|
||||||
|
newer maintenance tracks.
|
||||||
|
|
||||||
|
For example, v2.24.1 was released to address a couple of
|
||||||
|
[CVEs](https://cve.mitre.org/), and at the same time v2.14.6,
|
||||||
|
v2.15.4, v2.16.6, v2.17.3, v2.18.2, v2.19.3, v2.20.2, v2.21.1,
|
||||||
|
v2.22.2 and v2.23.1 were released.
|
Loading…
Reference in New Issue
Block a user