Compare commits

...

2 Commits

Author SHA1 Message Date
Anastassios Nanos
809011da3b docs: Update security policy to address various nits
- Add alternative reporting method (email) for non-GitHub users
- Add section for downstream distributions and vendors with early notification details
- Clarify that timelines are independent objectives, not sequential steps
- Reorder disclosure process to emphasize patch releases are exceptions
- Update git tag command in version table (remove unnecessary pipe)
- Expand FAQ with downstream distribution and non-GitHub reporter questions
- Update timestamp to reflect current changes (2026-04-01)
- Update SECURITY_CONTACTS with email contact and downstream notification info
- Clarify CVE assignment process through GitHub

Signed-off-by: Anastassios Nanos <ananos@nubificus.co.uk>
2026-04-02 08:35:57 +03:00
Zvonko Kaiser
b9faafefb6 Create SECURITY.md, SECURITY_CONTACTS
Explicit SECURITY.md that reflects Kata’s rolling-release model (monthly cadence, no long-term branches) and sets clear expectations for reporters and downstream users.
With the SECURITY.md in place we need also the SECURITY_CONTACTS

Signed-off-by: Zvonko Kaiser <zkaiser@nvidia.com>
2025-08-13 14:24:58 +00:00
3 changed files with 117 additions and 1 deletions

View File

@@ -105,7 +105,7 @@ Please raise an issue
[in this repository](https://github.com/kata-containers/kata-containers/issues).
> **Note:**
> If you are reporting a security issue, please follow the [vulnerability reporting process](https://github.com/kata-containers/community#vulnerability-handling)
> If you are reporting a security issue, please follow the [vulnerability reporting process](SECURITY.md)
## Developers

95
SECURITY.md Normal file
View File

@@ -0,0 +1,95 @@
# Security Policy
Kata Containers is a **rolling-release** project: every monthly release replaces the previous one, and only the _current_ release series receives security fixes. There are **no long-term-support branches**.
---
## Reporting a Vulnerability
### How to report
- **Keep it private first.**
Please **do not** open a public GitHub issue or pull request for security problems.
- **Preferred: Use GitHubs security advisory workflow.**
Follow the official GitHub guide:
[Creating a repository security advisory](https://docs.github.com/en/code-security/security-advisories/working-with-repository-security-advisories/creating-a-repository-security-advisory#creating-a-security-advisory)
- **Alternative (if you dont have a GitHub account):**
Email security concerns to the Kata Containers security team at: **security@katacontainers.io**
### What happens after you submit
We follow the OpenSSF vulnerability-handling guidelines.
The table below shows the target timelines we hold ourselves to once we receive your report.
These are independent objectives, not sequential steps.
| Objective | Target time | Notes |
|-----------|-------------|-------|
| **Initial acknowledgement** | ≤ 14 calendar days | Maintainers confirm receipt and start triage. |
| **Triage & CVSS-v3.1 scoring** | ≤ 30 days | We assign severity and plan remediation. |
| **Fix availability** | Next scheduled monthly release<br />(or an out-of-band patch for Critical/High issues) | We may cut a `vX.Y.Z` patch if waiting a month poses undue risk. |
| **CVE assignment** | Before public disclosure | GitHub automatically requests a CVE ID when we publish the security advisory. |
---
## Supported Versions
| Release | First published | Security-fix window |
|---------|-----------------|---------------------|
| **Latest monthly release** | see `git tag --sort=-creatordate \| head -1` | Actively maintained |
| Any prior release | — | **Unsupported** please upgrade |
> **Why no backports?**
> Katas architecture evolves quickly; back-porting patches would re-introduce the very maintenance burden we avoid by using a rolling model.
### For Downstream Distributions & Vendors
If you maintain a downstream distribution or integration of Kata Containers:
- **Early notification**: Contact the Kata Containers security team to be added to our downstream stakeholders list. We provide advance notification of embargoed security fixes to allow time for rebasing, testing, and release planning.
- **Embargo process**: Before public disclosure, we coordinate appropriate embargo periods to allow your team to incorporate the fix.
- **Mailing list**: Subscribe to the Kata Containers security notifications list (to be announced) for advance security patch notification.
---
## Disclosure Process & Fix Delivery
1. We develop the fix on a private branch.
2. Once validated, we coordinate embargo dates with downstream consumers to allow time for rebasing and testing.
3. We publish a GitHub security advisory, which automatically triggers CVE ID assignment.
4. The fix ships **most commonly** in the next regular monthly release (e.g., `v3.19`) when impact is moderate and waiting does not materially increase risk.
5. **Exception**: For Critical or High-severity issues, we may cut a point release (e.g., `v3.18.1`) to provide an update path for users still on the current series.
6. Upon public release, security details and CVE information are published in the GitHub release notes.
---
## Security Advisories & Release Notes
* Each patch or monthly release includes a **Security Bulletin** section in its GitHub *Release Notes* summarizing:
* affected components & versions,
* CVE identifiers (if assigned),
* severity / CVSS score,
* mitigation steps,
* upgrade instructions.
* We do **not** publish separate “stable-branch” advisories because unsupported branches receive no fixes.
---
## Frequently Asked Questions
**Q: I run `v3.24` will you patch it?**
A: No. Upgrade to the latest monthly release. Only the current monthly release receives security fixes.
**Q: I maintain a downstream distribution. Can I get early access to security patches?**
A: Yes. Contact the security team (see [SECURITY_CONTACTS](SECURITY_CONTACTS)) to be added to our downstream stakeholders list. We provide embargo periods to allow time for rebasing and testing before public disclosure.
**Q: What if I don't have a GitHub account? How do I report a vulnerability?**
A: Email security@katacontainers.io with a description of the issue. Include steps to reproduce if possible.
**Q: Where can I discuss a vulnerability once it is public?**
A: Open/continue a GitHub issue **after** the advisory is published, or use the `#kata-containers` Slack channel with a link to the official security advisory.
---
*Last updated:* 2026-04-02

21
SECURITY_CONTACTS Normal file
View File

@@ -0,0 +1,21 @@
# Copyright (c) 2025 Kata Containers Authors
#
# SPDX-License-Identifier: Apache-2.0
#
# Defined below are the security contacts for this repo.
#
# They are the contact point for the Product Security Committee to reach out
# to for triaging and handling of incoming issues.
#
# DO NOT REPORT SECURITY VULNERABILITIES DIRECTLY TO THESE NAMES, FOLLOW THE
# INSTRUCTIONS AT [SECURITY.md](SECURITY.md)
# For vulnerability reports:
# - Preferred: Use GitHub's security advisory workflow (see SECURITY.md)
# - Alternative: Email security@katacontainers.io
# Security contacts for the architecture committee:
@kata-containers/architecture-committee
# For downstream distribution early notification of embargoed fixes,
# contact the security team at security@katacontainers.io