Skip to content

Commit 3680944

Browse files
committed
Amend the SECURITY.md file to add a section on how reports are processed.
1 parent 0b5c3fe commit 3680944

1 file changed

Lines changed: 44 additions & 5 deletions

File tree

SECURITY.md

Lines changed: 44 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -55,8 +55,47 @@ Reporting a Vulnerability
5555

5656
Github supports private security advisories and OpenPrinting CUPS enabled
5757
their usage, report all security issue via them. Reporters can file a security
58-
advisory by clicking on `New issue` at tab `Issues` and choose `Report a vulnerability`.
59-
Provide details, impact, reproducer, affected versions, workarounds and patch
60-
for the vulnerability if there are any and estimate severity when creating the advisory.
61-
Expect a response within 5 business days. Once OpenPrinting group agree on the patch
62-
and announce it on `distros@vs.openwall.org`, there is embargo period 7-10 days long.
58+
advisory by clicking on `New issue` at tab `Issues` and choose
59+
`Report a vulnerability`. Provide details, impact, reproducer, affected
60+
versions, workarounds and patch for the vulnerability if there are any and
61+
estimate severity when creating the advisory.
62+
63+
Expect a response within 5 business days.
64+
65+
66+
How We Respond to Vulnerability Reports
67+
---------------------------------------
68+
69+
First, we take every report seriously. There are (conservatively) over a
70+
billion systems using CUPS, so any security issue can affect a lot of people.
71+
72+
Members of the OpenPrinting security team will try to verify/reproduce the
73+
reported issues in a timely fashion. Please keep in mind that many members of
74+
the security team are volunteers or are only employed part-time to maintain
75+
CUPS, so your patience is appreciated!
76+
77+
Sometimes a reported issue is actually in another project's code. For these
78+
issues we may ask you to re-submit your report to the correct project - an
79+
enhancement request has been submitted to GitHub to correct this limitation for
80+
projects hosted on GitHub.
81+
82+
Other times we may verify the issue exists but disagree on the severity or
83+
scope of the issue. We assess vulnerabilities based on our supported platforms
84+
and common configurations because we need to be able to test and verify issues
85+
and fixes on those supported platforms.
86+
87+
Similar issues (if multiple vulnerabilities are reported) will be combined if
88+
they share a common root cause. We don't mean any disrespect by doing this, we
89+
just want to make sure your issues are truly and efficiently addressed in full.
90+
91+
Once we have verified things, we will work towards providing a fix as quickly
92+
as possible. Fixes are typically developed against the "master" branch, then
93+
backported as needed to cover shipping CUPS releases on our supported platforms.
94+
95+
Once we have the fixes ready, we request a CVE, coordinate an embargo date, and
96+
announce it on `distros@vs.openwall.org` mailing list. The embargo period is
97+
typically 7-10 days long but can be longer.
98+
99+
The embargo starts a flurry of activity - hundred of developers supporting every
100+
Linux distribution, the various BSD flavors, macOS, and ChromeOS will queue up
101+
the security updates for their respective OS releases on the embargo date.

0 commit comments

Comments
 (0)