Skip to content

Security: isc-projects/stork

SECURITY.md

Security Policy

ISC treats the security of its software products very seriously. ISC's Security Vulnerability Disclosure Policy is documented in the relevant ISC KnowledgeBase article.

For official ISC security policy, see this KB article. As a convenience to the reader, below are the major points from the policy.

Reporting Possible Security Issues

To report a security vulnerability, please follow the instructions on this page.

We prefer that you open a confidential GitLab issue (not GitHub). The GitLab issue creates a record, is visible to all ISC engineers, and provides a shared communication channel with the reporter.

If it is not possible to create a GitLab issue, then send e-mail (encrypted if possible) to stork-security@isc.org.

Please do not discuss undisclosed security vulnerabilities on any public mailing list. ISC has a long history of handling reported vulnerabilities promptly and effectively and we respect and acknowledge responsible reporters.

If you have a crash, you may want to consult the KnowledgeBase article entitled "What to do if your BIND, Kea DHCP, Stork, or ISC DHCP server has crashed".

Reporting a Possible Bug

We are working with the interests of the greater Internet at heart, and we hope you are too. In that vein, we do not offer bug bounties. If you think you have found a bug in Stork, we encourage you to report it responsibly via a confidential GitLab issue as described above; if verified, we will be happy to credit you in our Release Notes.

Supported Versions

The first stable version is 2.0.0. Stable versions, denoted with even minor numbers, will be supported for at least six months plus three months of transition when we will provide critical updates. Development versions will reach EOL as soon as the next development or stable version is released.

Version Kind Period End-Of-Life
2.2.0 stable ~6 months (+ ~3 months) on release of 2.4.0 + 3 months
2.1.x development ~2 months on release of 2.1.(x+1) or 2.2.0
2.0.0 stable ~6 months (+ ~3 months) on release of 2.2.0 + 3 months
earlier development on release of 2.0.0

Limited past EOL support may be available to higher-tier customers. For more information, please contact ISC sales using our contact form.

The Stork team may release a security release when a severe vulnerability is found. The vulnerability must have a high CVSS score, and must either affect a Stork component directly or allow an attack on Kea or BIND 9 through Stork. We will not make a security release if the vulnerability affects part of a third-party dependency that Stork does not use.

If the Stork team recognizes a serious security issue, we will immediately notify higher-tier customers via internal security channels. When the fix is ready, we will preannounce the release date (without technical details) on our stork-users mailing list.

Further Reading

Past advisories for Stork can be found in our KnowledgeBase. On the left-hand panel, see the Security Advisories in the Stork section.

There aren’t any published security advisories