- Introduction
- Vulnerabilities
2.1 Supported Versions
2.2 Private Vulnerability Reporting
2.3 Public Vulnerability Reporting
2.4 Security Disclosure - Security requirements
- Security Software life cycle processes
This document outlines the procedures for addressing vulnerabilities, the supported versions of LPVS, security requirements, and the recommended practices for developing secure code.
We provide patches to address vulnerabilities for the following versions of LPVS:
Version | Supported by | LPVS | 3-rd party component |
---|---|---|---|
1.0.0 | N/A | ||
1.4.1 | CVE-2021-3803, CVE-2023-44270 |
We take the security of LPVS seriously, and we welcome responsible disclosure of security vulnerabilities. To report security vulnerabilities, please follow these steps:
-
Visit the GitHub guidance on privately reporting a security vulnerability.
-
Follow the instructions provided in the guide to submit your security vulnerability report privately.
-
GitHub will notify us about your report, and we will work to address the issue promptly.
If you believe that a vulnerability can be publicly disclosed or is not critical, you can still report it using our email contact [email protected] with the subject line "SECURITY".
Our LPVS Security Issue Review (SIR) team will acknowledge your report and aim to provide recommendations for mitigation within 1 week. Throughout the process, we will keep you informed of the progress toward the fix and may request additional information or guidance.
However, for highly sensitive or critical vulnerabilities, we encourage you to use the private reporting method described in section 3.1.
We appreciate your cooperation in helping us maintain the security of LPVS.
Once a security vulnerability is reported to the LPVS team, it is treated with the highest priority. The assigned person will coordinate the patch and release process, which includes the following steps:
- Confirm the problem and identify the affected versions.
- Conduct a thorough code review to identify any similar issues.
- Prepare fixes for all supported versions. The fixes will be released as soon as possible.
When disclosing vulnerabilities, we recommend following this format:
- Provide your name and email address.
- Clearly define the scope of the vulnerability and identify potential exploiters.
- Document the steps to reproduce the vulnerability to help us validate and address it effectively.
- Describe the exploitation scenario to understand the impact and severity.
We appreciate your collaboration in making LPVS more secure.
If you have any further questions or concerns, please reach out to us.
Note: This security policy is subject to change and may be updated without notice.
graph LR
A[Security requirements] --> B[Confidentiality]
A --> C[Integrity]
A --> D[Availability]
A --> E[Access control]
E --> F[Identification]
E --> G[Authentication]
E --> H[Authorization]
B --> I[User privacy maintained]
B --> J[Non-public data is kept confidential]
B --> K[All data is confidential]
B --> L[HTTPS: data in motion]
C --> L
C --> M[Authorization via GITHUB]
C --> N[Data modification requires authorization]
D --> O[Multiple backups]
D --> P[Restore after DDoS]
graph LR
A[Security Software Life Cycle Processes] --> B[Certification & Controls]
A --> C[Security in Maintenance]
A --> D[Key Developers Know How to Develop Secure Software]
A --> E[Security in Integration & Verification]
A --> F[Infrastructure Management]
A --> G[Security in Design]
B --> H[CII Best Practices Badge]
B --> I[OpenSSF Score Card]
C --> J[Auto-detect Public Vulnerabilities]
C --> K[Rapid Update]
F --> L[Development & Test Environments Protected from Attack]
F --> M[CI Automated Test Environment Does Not Have Protected Data]
E --> N[Style Checking Tools]
E --> O[Source Code Weakness Analyzer]
E --> P[Free/Libre/Open Source Software]
E --> Q[Negative Testing]
E --> R[Unit Test Coverage >75%]
G --> S[Simple Design]
G --> T[Memory-Safe Languages]
G --> U[Secure Design Includes S&S]