Skip to content

Add security policy #478

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Merged
merged 1 commit into from
Jun 25, 2025
Merged
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
108 changes: 108 additions & 0 deletions SECURITY.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,108 @@
This is the Security Policy for the Perl DBD::mysql distribution.

Report security issues via email to Daniël van Eeden <[email protected]>
or via the
[private security issue reporting feature in GitHub](https://github.com/perl5-dbi/DBD-mysql/security/advisories/new).
Comment on lines +3 to +5
Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I think a single point of contact is best, but I can understand for cases where users do not have a github account.

Perhaps put the GitHub reporting first, and your email address as a fallback?


The latest version of the Security Policy can be found in the
[git repository for DBD::mysql](https://github.com/perl5-dbi/DBD-mysql).

This text is based on the CPAN Security Group's Guidelines for Adding
a Security Policy to Perl Distributions (version 1.4.1)
https://security.metacpan.org/docs/guides/security-policy-for-authors.html

# How to Report a Security Vulnerability

Security vulnerabilities can be reported by e-mail to Daniël van Eeden
at <[email protected]>.

Please include as many details as possible, including code samples
or test cases, so that we can reproduce the issue. Check that your
report does not expose any sensitive data, such as passwords,
tokens, or personal information.

Project maintainers will normally credit the reporter when a
vulnerability is disclosed or fixed. If you do not want to be
credited publicly, please indicate that in your report.

If you would like any help with triaging the issue, or if the issue
is being actively exploited, please copy the report to the CPAN
Security Group (CPANSec) at <[email protected]>.

Please *do not* use the public issue reporting system on RT or
GitHub issues for reporting security vulnerabilities.

Please do not disclose the security vulnerability in public forums
until past any proposed date for public disclosure, or it has been
made public by the maintainers or CPANSec. That includes patches or
pull requests or mitigation advice.

For more information, see
[Report a Security Issue](https://security.metacpan.org/docs/report.html)
on the CPANSec website.

## Response to Reports

The maintainer(s) aim to acknowledge your security report as soon as
possible. However, this project is maintained by a single volunteer in
their spare time, and they cannot guarantee a rapid response. If you
Comment on lines +47 to +48
Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Is this project maintained "by a single volunteer" or a team of volunteers?

You can reword this if you want.

Copy link
Collaborator Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

There are multiple people that have permissions and DBD::mysql is part of perl5-dbi which has multiple people.

However in practice it has been just me for the last few years.

have not received a response from them within a week, then
please send a reminder to them and copy the report to CPANSec at
<[email protected]>.

Please note that the initial response to your report will be an
acknowledgement, with a possible query for more information. It
will not necessarily include any fixes for the issue.

The project maintainer(s) may forward this issue to the security
contacts for other projects where we believe it is relevant. This
may include embedded libraries, system libraries, prerequisite
modules or downstream software that uses this software.

They may also forward this issue to CPANSec.

# Which Software This Policy Applies To

Any security vulnerabilities in DBD::mysql are covered by this policy.

Security vulnerabilities in versions of any libraries that are
included in DBD::mysql are also covered by this policy.

Security vulnerabilities are considered anything that allows users
to execute unauthorised code, access unauthorised resources, or to
have an adverse impact on accessibility or performance of a system.

Security vulnerabilities in upstream software (prerequisite modules
or system libraries, or in Perl), are not covered by this policy
unless they affect DBD::mysql, or DBD::mysql can be used to exploit
vulnerabilities in them.

Security vulnerabilities in downstream software (any software that
uses DBD::mysql, or plugins to it that are not included with the
DBD::mysql distribution) are not covered by this policy.

## Supported Versions of DBD::mysql

The maintainer(s) will release security fixes for the latest version
of DBD::mysql and the v4 branch.

Note that the DBD::mysql project only supports major versions of Perl
released in the past ten (10) years, even though DBD::mysql will run on
older versions of Perl. If a security fix requires the maintainers to
increase the minimum version of Perl that is supported, then they may
do so.

# Installation and Usage Issues

The distribution metadata specifies minimum versions of
prerequisites that are required for DBD::mysql to work. However, some
of these prerequisites may have security vulnerabilities, and you
should ensure that you are using up-to-date versions of these
prerequisites.

Where security vulnerabilities are known, the metadata may indicate
newer versions as recommended.

## Usage

Please see the software documentation for further information.