1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56
|
# Security policy
## Supported versions
<!-- Include start supported versions -->
snapd has two types of releases:
- Major releases to introduce partial/complete features, along with bug fixes.
- Minor releases to fix bugs or security vulnerabilities.
A snapd release typically involves publishing snapd snaps to the Snap Store and
snapd debs to supported [Ubuntu releases](https://ubuntu.com/about/release-cycle)
alongside snapd packages for [other supported distributions](https://snapcraft.io/docs/distro-support).
Minor releases containing security fixes are developed in a private snapd
repository, with fixes merged back into the public repository when ready for
disclosure.
The latest snapd snap major release receives support through minor releases
until the next major release. Similarly, snapd debs for Ubuntu releases
within standard support, as well as snapd packages for other supported
distributions, receive minor releases up to the next major release. For Ubuntu
releases that have moved beyond standard support but remain within expanded or
legacy support, minor releases are typically based on the last major release
issued before the transition out of standard support. Refer to the
[Ubuntu release cycle documentation](https://ubuntu.com/about/release-cycle) for
more details about the Ubuntu lifecycle and release cadence.
<!-- Include end supported versions -->
## What qualifies as a security issue
By default, snaps are confined within a restrictive security sandbox,
limiting access to system resources beyond what is explicitly allowed by
store-approved interfaces. Any vulnerability that allows a snap to bypass these
restrictions is considered a security issue. Likewise, any flaw in snapd that
enables an unprivileged user or snap to escalate privileges, cause a denial of
service, or otherwise compromise system integrity also qualifies as a security
issue.
## Reporting a vulnerability
The easiest way to report a security issue is through
[GitHub](https://github.com/canonical/snapd/security/advisories/new). See
[Privately reporting a security
vulnerability](https://docs.github.com/en/code-security/security-advisories/guidance-on-reporting-and-writing/privately-reporting-a-security-vulnerability)
for instructions.
The snapd GitHub admins will be notified of the issue and will work with you
to determine whether the issue qualifies as a security issue and, if so, in
which component. We will then handle figuring out a fix, getting a CVE
assigned and coordinating the release of the fix to the snapd snap and the
various Ubuntu releases and Linux distributions.
The [Ubuntu Security disclosure and embargo
policy](https://ubuntu.com/security/disclosure-policy) contains more
information about what you can expect when you contact us, and what we
expect from you.
|