Skip to content

Commit a6c1152

Browse files
authored
[docs] Document move from chromium to github to report security issues. (#95262)
I'm not aware of any other documentation changes that are needed to complete the migration from chromium to github to report security issues. The top-level security.md file refers to https://llvm.org/docs/Security.html#how-to-report-a-security-issue for documentation on reporting a security issue, which is being updated as part of this PR.
1 parent 9d7299f commit a6c1152

File tree

1 file changed

+7
-16
lines changed

1 file changed

+7
-16
lines changed

llvm/docs/Security.rst

Lines changed: 7 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,7 @@ The LLVM Security Group is private. It is composed of trusted LLVM contributors.
2020
How to report a security issue?
2121
===============================
2222

23-
To report a security issue in the LLVM Project, please `open a new issue`_ in the LLVM project page, on the chromium issue tracker. Be sure to use the "Security bug report" template.
23+
To report a security issue in any of the LLVM projects, please use the `report a vulnerability`_ feature in the `llvm/llvm-security-repo`_ repository on github, under the "Security" tab.
2424

2525
We aim to acknowledge your report within two business days since you first reach out. If you do not receive any response by then, you can escalate by posting on the `Discourse forums`_ asking to get in touch with someone from the LLVM Security Group. **The escalation mailing list is public**: avoid discussing or mentioning the specific issue when posting on it.
2626

@@ -94,9 +94,7 @@ Nomination process
9494

9595
Anyone who feels they meet these criteria can nominate themselves, or may be nominated by a third party such as an existing LLVM Security Group member. The nomination should state whether the nominee is nominated as an individual, researcher, or as a vendor contact. It should clearly describe the grounds for nomination.
9696

97-
For the moment, nominations are generally proposed, discussed, and voted on using a github pull request. An `example nomination is available here`_. The use of pull requests helps keep membership discussions open, transparent, and easily accessible to LLVM developers in many ways. If, for any reason, a fully-world-readable nomination seems inappropriate, you may `open a new issue`_, and a discussion can be had about the best way to approach nomination, given the constraints that individuals are under.
98-
99-
Our recommended method of nomination may change as our `Discussion Medium`_ story evolves over time.
97+
For the moment, nominations are generally proposed, discussed, and voted on using a github pull request. An `example nomination is available here`_. The use of pull requests helps keep membership discussions open, transparent, and easily accessible to LLVM developers in many ways. If, for any reason, a fully-world-readable nomination seems inappropriate, you may reach out to the security group via the `report a vulnerability`_ route, and a discussion can be had about the best way to approach nomination, given the constraints that individuals are under.
10098

10199
Choosing new members
102100
--------------------
@@ -131,7 +129,7 @@ Privileges and Responsibilities of LLVM Security Group Members
131129
Access
132130
------
133131

134-
LLVM Security Group members will be subscribed to a private `Discussion Medium`_ (*FUTURE*: see section below). It will be used for technical discussions of security issues, as well as process discussions about matters such as disclosure timelines and group membership. Members have access to all security issues.
132+
LLVM Security Group members will be subscribed to a private `Discussion Medium`_. It will be used for technical discussions of security issues, as well as process discussions about matters such as disclosure timelines and group membership. Members have access to all security issues.
135133

136134
Confidentiality
137135
---------------
@@ -162,21 +160,13 @@ Members of the LLVM Security Group are expected to:
162160
Discussion Medium
163161
=================
164162

165-
*FUTURE*: this section needs more work! Where discussions occur is influenced by other factors that are still open in this document. We can finalize it later.
166-
It seems like bugzilla and email don't meet security requirements.
167-
168163
The medium used to host LLVM Security Group discussions is security-sensitive. It should therefore run on infrastructure which can meet our security expectations.
169164

170-
We are currently using the `chromium issue tracker`_ (as the `llvm` project) to have security discussions:
165+
We use `GitHub's mechanism to privately report security vulnerabilities`_ to have security discussions:
171166

172167
* File security issues.
173168
* Discuss security improvements to LLVM.
174169

175-
When a new issue is filed, a template is provided to help issue reporters provide all relevant information.
176-
177-
*FUTURE*: The `Github security`_ workflow allows publicly disclosing resolved security issues on the github project page, and we would be interested in adopting it for that purpose. However, it does not easily allow confidential reporting of security issues, as creating Github Security Advisories is currently restricted to Github project admins. That is why we have started with the `chromium issue tracker`_ instead.
178-
179-
180170
We also occasionally need to discuss logistics of the LLVM Security Group itself:
181171

182172
* Nominate new members.
@@ -253,8 +243,9 @@ sensitive are the following. Note that this list can change over time.
253243

254244

255245
.. _CVE process: https://cve.mitre.org
256-
.. _open a new issue: https://bugs.chromium.org/p/llvm/issues/entry
257-
.. _chromium issue tracker: https://crbug.com
246+
.. _report a vulnerability: https://github.com/llvm/llvm-security-repo/security/advisories/new
247+
.. _llvm/llvm-security-repo: https://github.com/llvm/llvm-security-repo/security
248+
.. _GitHub's mechanism to privately report security vulnerabilities: https://docs.github.com/en/code-security/security-advisories/guidance-on-reporting-and-writing-information-about-vulnerabilities/privately-reporting-a-security-vulnerability
258249
.. _GitHub security: https://help.github.com/en/articles/about-maintainer-security-advisories
259250
.. _Discourse forums: https://discourse.llvm.org
260251
.. _MITRE: https://cve.mitre.org

0 commit comments

Comments
 (0)