| 
 | 1 | +This is the Security Policy for the Perl DBD::mysql distribution.  | 
 | 2 | + | 
 | 3 | +Report security issues via email to Daniël van Eeden  <[email protected]> | 
 | 4 | +or via the  | 
 | 5 | +[private security issue reporting feature in GitHub](https://github.com/perl5-dbi/DBD-mysql/security/advisories/new).  | 
 | 6 | + | 
 | 7 | +The latest version of the Security Policy can be found in the  | 
 | 8 | +[git repository for DBD::mysql](https://github.com/perl5-dbi/DBD-mysql).  | 
 | 9 | + | 
 | 10 | +This text is based on the CPAN Security Group's Guidelines for Adding  | 
 | 11 | +a Security Policy to Perl Distributions (version 1.4.1)  | 
 | 12 | +https://security.metacpan.org/docs/guides/security-policy-for-authors.html  | 
 | 13 | + | 
 | 14 | +# How to Report a Security Vulnerability  | 
 | 15 | + | 
 | 16 | +Security vulnerabilities can be reported by e-mail to Daniël van Eeden  | 
 | 17 | + | 
 | 18 | + | 
 | 19 | +Please include as many details as possible, including code samples  | 
 | 20 | +or test cases, so that we can reproduce the issue.  Check that your  | 
 | 21 | +report does not expose any sensitive data, such as passwords,  | 
 | 22 | +tokens, or personal information.  | 
 | 23 | + | 
 | 24 | +Project maintainers will normally credit the reporter when a  | 
 | 25 | +vulnerability is disclosed or fixed.  If you do not want to be  | 
 | 26 | +credited publicly, please indicate that in your report.  | 
 | 27 | + | 
 | 28 | +If you would like any help with triaging the issue, or if the issue  | 
 | 29 | +is being actively exploited, please copy the report to the CPAN  | 
 | 30 | +Security Group (CPANSec) at  <[email protected]>.  | 
 | 31 | + | 
 | 32 | +Please *do not* use the public issue reporting system on RT or  | 
 | 33 | +GitHub issues for reporting security vulnerabilities.  | 
 | 34 | + | 
 | 35 | +Please do not disclose the security vulnerability in public forums  | 
 | 36 | +until past any proposed date for public disclosure, or it has been  | 
 | 37 | +made public by the maintainers or CPANSec.  That includes patches or  | 
 | 38 | +pull requests or mitigation advice.  | 
 | 39 | + | 
 | 40 | +For more information, see  | 
 | 41 | +[Report a Security Issue](https://security.metacpan.org/docs/report.html)  | 
 | 42 | +on the CPANSec website.  | 
 | 43 | + | 
 | 44 | +## Response to Reports  | 
 | 45 | + | 
 | 46 | +The maintainer(s) aim to acknowledge your security report as soon as  | 
 | 47 | +possible.  However, this project is maintained by a single volunteer in  | 
 | 48 | +their spare time, and they cannot guarantee a rapid response.  If you  | 
 | 49 | +have not received a response from them within a week, then  | 
 | 50 | +please send a reminder to them and copy the report to CPANSec at  | 
 | 51 | + | 
 | 52 | + | 
 | 53 | +Please note that the initial response to your report will be an  | 
 | 54 | +acknowledgement, with a possible query for more information.  It  | 
 | 55 | +will not necessarily include any fixes for the issue.  | 
 | 56 | + | 
 | 57 | +The project maintainer(s) may forward this issue to the security  | 
 | 58 | +contacts for other projects where we believe it is relevant.  This  | 
 | 59 | +may include embedded libraries, system libraries, prerequisite  | 
 | 60 | +modules or downstream software that uses this software.  | 
 | 61 | + | 
 | 62 | +They may also forward this issue to CPANSec.  | 
 | 63 | + | 
 | 64 | +# Which Software This Policy Applies To  | 
 | 65 | + | 
 | 66 | +Any security vulnerabilities in DBD::mysql are covered by this policy.  | 
 | 67 | + | 
 | 68 | +Security vulnerabilities in versions of any libraries that are  | 
 | 69 | +included in DBD::mysql are also covered by this policy.  | 
 | 70 | + | 
 | 71 | +Security vulnerabilities are considered anything that allows users  | 
 | 72 | +to execute unauthorised code, access unauthorised resources, or to  | 
 | 73 | +have an adverse impact on accessibility or performance of a system.  | 
 | 74 | + | 
 | 75 | +Security vulnerabilities in upstream software (prerequisite modules  | 
 | 76 | +or system libraries, or in Perl), are not covered by this policy  | 
 | 77 | +unless they affect DBD::mysql, or DBD::mysql can be used to exploit  | 
 | 78 | +vulnerabilities in them.  | 
 | 79 | + | 
 | 80 | +Security vulnerabilities in downstream software (any software that  | 
 | 81 | +uses DBD::mysql, or plugins to it that are not included with the  | 
 | 82 | +DBD::mysql distribution) are not covered by this policy.  | 
 | 83 | + | 
 | 84 | +## Supported Versions of DBD::mysql  | 
 | 85 | + | 
 | 86 | +The maintainer(s) will release security fixes for the latest version  | 
 | 87 | +of DBD::mysql and the v4 branch.  | 
 | 88 | + | 
 | 89 | +Note that the DBD::mysql project only supports major versions of Perl  | 
 | 90 | +released in the past ten (10) years, even though DBD::mysql will run on  | 
 | 91 | +older versions of Perl.  If a security fix requires the maintainers to  | 
 | 92 | +increase the minimum version of Perl that is supported, then they may  | 
 | 93 | +do so.  | 
 | 94 | + | 
 | 95 | +# Installation and Usage Issues  | 
 | 96 | + | 
 | 97 | +The distribution metadata specifies minimum versions of  | 
 | 98 | +prerequisites that are required for DBD::mysql to work.  However, some  | 
 | 99 | +of these prerequisites may have security vulnerabilities, and you  | 
 | 100 | +should ensure that you are using up-to-date versions of these  | 
 | 101 | +prerequisites.  | 
 | 102 | + | 
 | 103 | +Where security vulnerabilities are known, the metadata may indicate  | 
 | 104 | +newer versions as recommended.  | 
 | 105 | + | 
 | 106 | +## Usage  | 
 | 107 | + | 
 | 108 | +Please see the software documentation for further information.  | 
0 commit comments