forked from OISF/suricata
-
Notifications
You must be signed in to change notification settings - Fork 0
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
- Loading branch information
1 parent
f511b17
commit 6c7a209
Showing
2 changed files
with
76 additions
and
1 deletion.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,75 @@ | ||
# Security Policy | ||
|
||
Being a security tool itself, the security of Suricata itself is naturally of | ||
great importance. This document describes the policy around security issues as | ||
well as how to report them. | ||
|
||
If you believe you found a vulnerability, please report it to us as described | ||
in this document. | ||
|
||
|
||
## Severity Levels | ||
|
||
We will determine the severity of each issue, taking into account our | ||
experience dealing with past issues, versions affected, common defaults, | ||
our estimate of exploitation complexity, part of the code affected, | ||
and use cases. We use the following severity categories: | ||
|
||
* **CRITICAL** Severity. This affects Tier 1 features that are enabled by default | ||
where the issue disrupts availability of the service, leading to severe | ||
loss of visibility and/or availability. Remotely triggerable traffic | ||
based code execution, crashes, or evasions with a wide scope are considered to be | ||
in-scope for this severity. These issues will be kept private and will trigger a | ||
new release of all supported versions. We will attempt to address these as soon | ||
as possible. | ||
|
||
* **HIGH** Severity. This includes issues that are of a lower risk than critical, | ||
perhaps due to being disabled by default Tier 1 or affecting Tier 2 and | ||
Community features, or which are less likely to be exploitable. These issues | ||
will be kept private and will trigger a new release of all supported versions. | ||
We will attempt to keep the time these issues are private to a minimum; our | ||
aim would be no longer than a month where this is something under our control. | ||
|
||
* **MODERATE** Severity. This includes issues like crashes or evasion in Tier 2 and | ||
Community features that are not enabled by default. These will in general be | ||
kept private until the next release, and that release will be scheduled so | ||
that it can roll up several such flaws at one time. | ||
|
||
* **LOW** Severity. This includes issues such as those that only affect the | ||
Suricata command line utilities, or unlikely configurations. These will in | ||
general be fixed as soon as possible in latest development versions, and may be | ||
backported to older versions that are still getting updates. These will be | ||
part of the Changelog as a security ticket, but they may not trigger new | ||
releases. | ||
|
||
Note that we'll be refining the levels based on our experiences with applying them | ||
to actual issues. | ||
|
||
|
||
## Support Status of affected code | ||
|
||
4 levels are defined: Tier 1, Tier 2, Community and Unmaintained. | ||
|
||
These are documented in https://docs.suricata.io/en/latest/support-status.html | ||
|
||
|
||
## Reporting Issues | ||
|
||
For reporting security issues, please use `[email protected]`. | ||
|
||
If you report a security issue to us, please share as much detail about the issue | ||
as possible: pcaps, attack scripts, potential fixes, etc. If you share pcaps or | ||
other data, please clearly state if these can (eventually) enter our public CI/QA. | ||
|
||
We will assign a severity and will share our assessment with you. | ||
|
||
We will create a security ticket, which will be private until a few weeks after | ||
a public release addressing the issue. | ||
|
||
We will acknowledge you in the release notes and the release announcement. If you | ||
do not want this, please clearly state this. | ||
|
||
We will not request a CVE, but if you do please let us know the CVE ID. | ||
|
||
OISF does not participate in bug bounty programs, or offer any other rewards | ||
for reporting issues. |