This is an automated email from the ASF dual-hosted git repository.
potiuk pushed a commit to branch main
in repository https://gitbox.apache.org/repos/asf/airflow.git
The following commit(s) were added to refs/heads/main by this push:
new ea60a4d6844 docs(security): document supported deployment platforms
(#66931)
ea60a4d6844 is described below
commit ea60a4d6844f39e3c5793468ba75c7e661825aad
Author: Jarek Potiuk <[email protected]>
AuthorDate: Sat May 16 02:00:05 2026 +0200
docs(security): document supported deployment platforms (#66931)
* docs(security): document supported deployment platforms
Add an explicit out-of-scope section for non-Linux platforms to the
Security Model. Bugs that only manifest on Windows / macOS / other
non-Linux platforms are not eligible for CVE allocation because Airflow
does not officially support those platforms as deployment targets.
Codifies what was already the security team's practice — most recently
the disposition on a 2026-05-14 IMAP-attachment-path-traversal report
that only manifested on Windows due to backslash path-separator
handling, closed NOT-CVE-WORTHY on this basis. Future Windows-only /
macOS-only reports get the same treatment, and reporters can read the
rule upfront before submitting.
The rule applies symmetrically: a bug that affects Linux is judged on
the Linux behavior regardless of whether it also reaches Windows;
non-Linux-only bugs are out of scope.
Co-Authored-By: Claude Opus 4.7 (1M context) <[email protected]>
* Apply suggestions from code review
Co-authored-by: Jarek Potiuk <[email protected]>
---------
Co-authored-by: Claude Opus 4.7 (1M context) <[email protected]>
---
airflow-core/docs/security/security_model.rst | 19 +++++++++++++++++++
1 file changed, 19 insertions(+)
diff --git a/airflow-core/docs/security/security_model.rst
b/airflow-core/docs/security/security_model.rst
index e7a95d44db7..d46323745b4 100644
--- a/airflow-core/docs/security/security_model.rst
+++ b/airflow-core/docs/security/security_model.rst
@@ -826,3 +826,22 @@ significantly from typical web applications — many scanner
findings (such as "
code" or "database credentials accessible in configuration") are expected
behavior. Reports must
include a proof-of-concept that demonstrates how the finding violates the
security model described
in this document, including identifying the specific user role involved and
the attack scenario.
+
+Supported deployment platforms
+..............................
+
+Apache Airflow officially supports Linux-based deployment environments only.
The reference
+deployment, the CI matrix, and the official Docker image are all
Linux-targeted (Debian Bookworm).
+macOS is supported for local development but is not a deployment platform.
Windows is not supported
+for deployment - except WSL2 for develop (buy only with POSIX filesystem which
is the same as Linux).
+
+Vulnerability reports that only manifest on a non-Linux platform — behavior
that depends on Windows
+path separators, macOS-specific filesystem semantics, etc. — are **out of
scope** for the security
+process. We do not issue CVEs or advisories for platform-specific bugs in
deployment configurations
+the project does not support.
+
+Reports where the bug affects both supported (Linux) and unsupported (Windows,
macOS) platforms are
+judged on the Linux behavior; the non-Linux aspect is informational.
+
+Reporters who identify a non-Linux-only bug should still report it through the
regular contribution
+process — fixes are welcome as defense-in-depth hardening, with no CVE or
advisory.