dhcpsrv/SECURITY.md

1.6 KiB

Security policy

Thanks for taking the time to look at this. Even small tools can introduce real risk — this one binds a privileged UDP port and reconfigures a network adapter on the host — so vulnerability reports are very welcome.

Supported versions

Only the latest tagged release on GitHub is supported. Older versions will not get fixes; please upgrade first.

How to report a vulnerability

Please do not open a public issue for security-sensitive findings. Use one of these private channels instead:

  1. Preferred: GitHub's private security advisories. Go to the Security tab of this repo and click "Report a vulnerability". GitHub will route it to me privately.
  2. Email: engelgardt2024@gmail.com with the subject prefix [security].

Please include:

  • The version of dhcpsrv you tested (output of the startup banner is enough).
  • Steps to reproduce, ideally with a packet capture or a short script.
  • An assessment of impact (LAN-only? remote? admin needed? etc.).

What to expect

  • Acknowledgement within 3 business days.
  • A first technical reply within 7 business days.
  • A fix and a public advisory once the issue is resolved. Reporters are credited unless they prefer to stay anonymous.

Out of scope

  • DoS by flooding the DHCP server on the local link (it's a small tool meant for direct-cable / single-switch use; flooding your own laptop is your call).
  • Behavior when run without administrator privileges (the tool refuses to start in that case anyway).
  • Issues that require the attacker to already control the user's machine.