@@ -55,8 +55,47 @@ Reporting a Vulnerability
5555
5656Github supports private security advisories and OpenPrinting CUPS enabled
5757their usage, report all security issue via them. Reporters can file a security
58- advisory by clicking on ` New issue ` at tab ` Issues ` and choose ` Report a vulnerability ` .
59- Provide details, impact, reproducer, affected versions, workarounds and patch
60- for the vulnerability if there are any and estimate severity when creating the advisory.
61- Expect a response within 5 business days. Once OpenPrinting group agree on the patch
62- and announce it on ` distros@vs.openwall.org ` , there is embargo period 7-10 days long.
58+ advisory by clicking on ` New issue ` at tab ` Issues ` and choose
59+ ` Report a vulnerability ` . Provide details, impact, reproducer, affected
60+ versions, workarounds and patch for the vulnerability if there are any and
61+ estimate severity when creating the advisory.
62+
63+ Expect a response within 5 business days.
64+
65+
66+ How We Respond to Vulnerability Reports
67+ ---------------------------------------
68+
69+ First, we take every report seriously. There are (conservatively) over a
70+ billion systems using CUPS, so any security issue can affect a lot of people.
71+
72+ Members of the OpenPrinting security team will try to verify/reproduce the
73+ reported issues in a timely fashion. Please keep in mind that many members of
74+ the security team are volunteers or are only employed part-time to maintain
75+ CUPS, so your patience is appreciated!
76+
77+ Sometimes a reported issue is actually in another project's code. For these
78+ issues we may ask you to re-submit your report to the correct project - an
79+ enhancement request has been submitted to GitHub to correct this limitation for
80+ projects hosted on GitHub.
81+
82+ Other times we may verify the issue exists but disagree on the severity or
83+ scope of the issue. We assess vulnerabilities based on our supported platforms
84+ and common configurations because we need to be able to test and verify issues
85+ and fixes on those supported platforms.
86+
87+ Similar issues (if multiple vulnerabilities are reported) will be combined if
88+ they share a common root cause. We don't mean any disrespect by doing this, we
89+ just want to make sure your issues are truly and efficiently addressed in full.
90+
91+ Once we have verified things, we will work towards providing a fix as quickly
92+ as possible. Fixes are typically developed against the "master" branch, then
93+ backported as needed to cover shipping CUPS releases on our supported platforms.
94+
95+ Once we have the fixes ready, we request a CVE, coordinate an embargo date, and
96+ announce it on ` distros@vs.openwall.org ` mailing list. The embargo period is
97+ typically 7-10 days long but can be longer.
98+
99+ The embargo starts a flurry of activity - hundred of developers supporting every
100+ Linux distribution, the various BSD flavors, macOS, and ChromeOS will queue up
101+ the security updates for their respective OS releases on the embargo date.
0 commit comments