Skip to content

Latest commit

 

History

History
70 lines (50 loc) · 3.47 KB

SECURITY.md

File metadata and controls

70 lines (50 loc) · 3.47 KB

Security Policy

ISC treats the security of its software products very seriously. ISC's Security Vulnerability Disclosure Policy is documented in the relevant ISC KnowledgeBase article.

For official ISC security policy, see this KB article. As a convenience to the reader, below are the major points from the policy.

Reporting possible security issues

To report a security vulnerability, please follow this instruction.

Briefly, we prefer that you open a confidential GitLab issue (not Github). The GitLab issue creates a record, is visible to all ISC engineers, and provides a shared communication channel with the reporter.

If it is not possible to create a GitLab issue, then send e-mail (encrypted if possible) to [email protected].

Please do not discuss undisclosed security vulnerabilities on any public mailing list. ISC has a long history of handling reported vulnerabilities promptly and effectively and we respect and acknowledge responsible reporters.

If you have a crash, you may want to consult the KnowledgeBase article entitled "What to do if your Stork has crashed".

Supported Versions

The first stable version is 2.0.0. Stable versions, denoted with even minor numbers, will be supported for at least 6 months plus 3 months of transition when we can provide critical updates. Development versions will reach EOL as soon as the next development or stable version is released.

Version Kind Period End-Of-Life
2.2.0 stable ~6 months (+ ~3 months) on release of 2.4.0 + 3 months
2.1.x development ~2 months on release of 2.1.(x+1) or 2.2.0
2.0.0 stable ~6 months (+ ~3 months) on release of 2.2.0 + 3 months
earlier development on release of 2.0.0

Limited past EOL support may be available to higher tier customers. Please contact ISC sales, using the contact form.

The Stork team may release a security release when a severe vulnerability is found. The vulnerability must have a high CVSS score and affect any Stork component directly or allow an attack Kea or BIND 9 through Stork. We don't make a security release if the vulnerability affects a third-party dependency in part Stork does not use.

If the Stork team recognizes a serious security issue, we will immediately notify higher-tier customers via internal security channels. When the fix is ready, we will preannounce the release date (without technical details) on our mailing list.

Further reading

The Past advisories for Stork can be found on the KnowledgeBase. On the left hand panel, see the Security Advisories in the Stork section.