Provide a SECURITY.md for glibc.

Message ID 20230222171920.113859-1-carlos@redhat.com
State Superseded
Headers
Series Provide a SECURITY.md for glibc. |

Checks

Context Check Description
dj/TryBot-apply_patch success Patch applied to master at the time it was sent
dj/TryBot-32bit success Build for i686

Commit Message

Carlos O'Donell Feb. 22, 2023, 5:19 p.m. UTC
  Upstrem scanners will look for a SECURITY.md to determine if the
project has a security process. In 2014 glibc adopted a public
security process that we document on the wiki here:
https://sourceware.org/glibc/wiki/Security%20Process

This creates a SECURITY.md file that points directly at the security
process in the wiki and indicates that glibc has a policy.
---
 SECURITY.md | 4 ++++
 1 file changed, 4 insertions(+)
 create mode 100644 SECURITY.md
  

Comments

Florian Weimer Feb. 23, 2023, 11:44 a.m. UTC | #1
* Carlos O'Donell:

> Upstrem scanners will look for a SECURITY.md to determine if the

What's an “upstream scanner”?  How do these scanners discover Sourceware
Git repositories?

Thanks,
Florian
  
Carlos O'Donell Feb. 23, 2023, 7:15 p.m. UTC | #2
On 2/23/23 06:44, Florian Weimer wrote:
> * Carlos O'Donell:
> 
>> Upstrem scanners will look for a SECURITY.md to determine if the
> 
> What's an “upstream scanner”?  How do these scanners discover Sourceware
> Git repositories?

(1) What is an upstream scanner?

Typo s/Upstrem/Upstream/g.

When I wrote "Upstream scanners" I meant tooling being used by projects to scan the
set of dependencies on the project to see if they met a given security policy.

Such a security policy might be: "All projects included in a product must have a
security reporting policy."

(2) How do these scanners discover Sourceware Git repositories?

They don't.

Either the scanners scan a tarball or...

Either glibc forks in gitlab and github are used by other projects and those
respositories are scanned by scanners that look at github sources.

There are 1000+ repositories in github with glibc in the name, mostly forks for
specific projects.

Github itself can be configured with a security policy around this topic:
https://docs.github.com/en/code-security/getting-started/adding-a-security-policy-to-your-repository

It would therefore be useful to make sure that for projects including glibc to
be able to determine, easily, how to submit security issues.

Does that answer your questions?
  
Siddhesh Poyarekar March 27, 2023, 1:18 p.m. UTC | #3
On 2023-02-23 14:15, Carlos O'Donell via Libc-alpha wrote:
> Github itself can be configured with a security policy around this topic:
> https://docs.github.com/en/code-security/getting-started/adding-a-security-policy-to-your-repository

Maybe this should be noted in the git commit log for posterity.

Thanks,
Sid
  
Siddhesh Poyarekar April 5, 2023, 7:24 p.m. UTC | #4
On 2023-03-27 09:18, Siddhesh Poyarekar wrote:
> On 2023-02-23 14:15, Carlos O'Donell via Libc-alpha wrote:
>> Github itself can be configured with a security policy around this topic:
>> https://docs.github.com/en/code-security/getting-started/adding-a-security-policy-to-your-repository
> 
> Maybe this should be noted in the git commit log for posterity.

Also, I wonder if it makes sense to move all of that content off the 
wiki and into the SECURITY.md.

Thanks,
Sid
  

Patch

diff --git a/SECURITY.md b/SECURITY.md
new file mode 100644
index 0000000000..579df63a7b
--- /dev/null
+++ b/SECURITY.md
@@ -0,0 +1,4 @@ 
+# Security Process
+
+For the GNU C Library please use the following documented security process:
+[Security Process](https://sourceware.org/glibc/wiki/Security%20Process).