1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
|
# Security Policy
Being a security tool itself, the security of Suricata itself is naturally of
great importance. This document describes the policy around security issues as
well as how to report them.
If you believe you found a vulnerability, please report it to us as described
in this document.
## Severity Levels
We will determine the severity of each issue, taking into account our
experience dealing with past issues, versions affected, common defaults,
our estimate of exploitation complexity, part of the code affected,
and use cases. We use the following severity categories:
* **CRITICAL** Severity. This affects Tier 1 features that are enabled by default
where the issue disrupts availability of the service, leading to severe
loss of visibility and/or availability. Remotely triggerable traffic
based code execution, crashes, or evasions with a wide scope are considered to be
in-scope for this severity. These issues will be kept private and will trigger a
new release of all supported versions. We will attempt to address these as soon
as possible.
* **HIGH** Severity. This includes issues that are of a lower risk than critical,
perhaps due to being disabled by default Tier 1 or affecting Tier 2 and
Community features, or which are less likely to be exploitable. These issues
will be kept private and will trigger a new release of all supported versions.
We will attempt to keep the time these issues are private to a minimum; our
aim would be no longer than a month where this is something under our control.
* **MODERATE** Severity. This includes issues like crashes or evasion in Tier 2 and
Community features that are not enabled by default. These will in general be
kept private until the next release, and that release will be scheduled so
that it can roll up several such flaws at one time.
* **LOW** Severity. This includes issues such as those that only affect the
Suricata command line utilities, or unlikely configurations. These will in
general be fixed as soon as possible in latest development versions, and may be
backported to older versions that are still getting updates. These will be
part of the Changelog as a security ticket, but they may not trigger new
releases.
Note that we'll be refining the levels based on our experiences with applying them
to actual issues.
## Support Status of affected code
4 levels are defined: Tier 1, Tier 2, Community and Unmaintained.
These are documented in https://docs.suricata.io/en/latest/support-status.html
## Reporting Issues
For reporting security issues, please use `security@oisf.net`.
If you report a security issue to us, please share as much detail about the issue
as possible: pcaps, attack scripts, potential fixes, etc. If you share pcaps or
other data, please clearly state if these can (eventually) enter our public CI/QA.
We will assign a severity and will share our assessment with you.
We will create a security ticket, which will be private until a few weeks after
a public release addressing the issue.
We will acknowledge you in the release notes and the release announcement. If you
do not want this, please clearly state this.
We will not request a CVE, but if you do please let us know the CVE ID.
OISF does not participate in bug bounty programs, or offer any other rewards
for reporting issues.
|