Skip to content

Commit 4bcd4b4

Browse files
committed
More cleanup, simplify supported version section.
1 parent 18a8a71 commit 4bcd4b4

1 file changed

Lines changed: 15 additions & 37 deletions

File tree

SECURITY.md

Lines changed: 15 additions & 37 deletions
Original file line numberDiff line numberDiff line change
@@ -9,36 +9,13 @@ this project.
99
Supported Versions
1010
------------------
1111

12-
All production releases of this software are subject to this security policy. A
13-
production release is tagged and given a semantic version number of the form:
12+
This security policy only applies to production releases of this software. A
13+
production release is tagged and given a semantic version number of the form
14+
"MAJOR.MINOR.PATCH" where "MAJOR" is an integer starting at 1 and "MINOR" and
15+
"PATCH" are integers starting at 0.
1416

15-
MAJOR.MINOR.PATCH
16-
17-
where "MAJOR" is an integer starting at 1 and "MINOR" and "PATCH" are integers
18-
starting at 0. A feature release has a "PATCH" value of 0, for example:
19-
20-
1.0.0
21-
1.1.0
22-
2.0.0
23-
24-
Beta releases and release candidates are *not* prodution releases and use
25-
semantic version numbers of the form:
26-
27-
MAJOR.MINORbNUMBER
28-
MAJOR.MINORrcNUMBER
29-
30-
where "MAJOR" and "MINOR" identify the new feature release version number and
31-
"NUMBER" identifies a beta or release candidate number starting at 1, for
32-
example:
33-
34-
1.0b1
35-
1.0b2
36-
1.0rc1
37-
38-
> *Note:* This security policy only applies to production releases. A security
39-
> vulnerability that only affects unreleased code will be fixed immediately
40-
> without coordination. Vendors *should not* package and release unstable
41-
> snapshots, beta releases, or release candidates of this software.
17+
> *Note:* Please report security vulnerabilities that only affect unreleased
18+
> code as regular bugs.
4219
4320

4421
Is the Issue a Bug or a Security Vulnerability?
@@ -82,20 +59,20 @@ for the vulnerability, if applicable.
8259
You can expect a response within 5 business days.
8360

8461

85-
How We Respond to Vulnerability Reports
86-
---------------------------------------
62+
How OpenPrinting Responds to Vulnerability Reports
63+
--------------------------------------------------
8764

88-
First, we take every report seriously. There are (conservatively) several
89-
billion devices/systems using CUPS, so any security issue can affect a lot of
90-
people.
65+
First, OpenPrinting takes every report seriously. There are (conservatively)
66+
several billion devices/systems using CUPS, so any security issue can affect a
67+
lot of people!
9168

9269
Members of the OpenPrinting security team will try to verify/reproduce the
9370
reported issues in a timely fashion. Please keep in mind that many members of
9471
the security team are volunteers or are only employed part-time to maintain
95-
CUPS, so your patience is appreciated!
72+
CUPS, so your patience is appreciated.
9673

9774
Sometimes a reported issue is actually in another project's code. For these
98-
issues we may ask you to re-submit your report to the correct project - an
75+
issues, we may ask you to re-submit your report to the correct project - an
9976
enhancement request has been submitted to GitHub to correct this limitation for
10077
projects hosted on GitHub.
10178

@@ -109,7 +86,8 @@ and fixes on those supported platforms.
10986
> in CVSS because the default cupsd configuration only listens on the loopback
11087
> and domain socket addresses.
11188
112-
The final CVSS score determines how the vulnerability is disclosed.
89+
The final CVSS score determines how the vulnerability is disclosed - see below
90+
for details.
11391

11492
Similar issues (if multiple vulnerabilities are reported) will be combined if
11593
they share a common root cause. We don't mean any disrespect by doing this, we

0 commit comments

Comments
 (0)