1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
|
Binutils Security Process
=========================
What is a binutils security bug?
================================
A security bug is one that threatens the security of a system or
network, or might compromise the security of data stored on it.
In the context of GNU Binutils there are two ways in which such
bugs might occur. In the first, the programs themselves might be
tricked into a direct compromise of security. In the second, the
tools might introduce a vulnerability in the generated output that
was not already present in the files used as input.
Other than that, all other bugs will be treated as non-security
issues. This does not mean that they will be ignored, just that
they will not be given the priority that is given to security bugs.
This stance applies to the creation tools in the GNU Binutils (eg
as, ld, gold, objcopy) and the libraries that they use. Bugs in
inspection tools (eg readelf, nm objdump) will not be considered
to be security bugs, since they do not create executable output
files.
Notes:
======
None of the programs in the GNU Binutils suite need elevated
privileges to operate and it is recommended that users do not use
them from accounts where such privileges are automatically
available.
The inspection tools are intended to be robust but nevertheless
they should be appropriately sandboxed if they are used to examine
malicious or potentially malicious input files.
Reporting private security bugs
===============================
*All bugs reported in the Binutils Bugzilla are public.*
In order to report a private security bug that is not immediately
public, please contact one of the downstream distributions with
security teams. The following teams have volunteered to handle
such bugs:
Debian: security@debian.org
Red Hat: secalert@redhat.com
SUSE: security@suse.de
Please report the bug to just one of these teams. It will be shared
with other teams as necessary.
The team contacted will take care of details such as vulnerability
rating and CVE assignment (https://cve.mitre.org/about/). It is likely
that the team will ask to file a public bug because the issue is
sufficiently minor and does not warrant an embargo. An embargo is not
a requirement for being credited with the discovery of a security
vulnerability.
Reporting public security bugs
==============================
It is expected that critical security bugs will be rare, and that most
security bugs can be reported in Binutils Bugzilla system, thus making
them public immediately. The system can be found here:
https://sourceware.org/bugzilla/
|