@@ -9,36 +9,13 @@ this project.
99Supported Versions
1010------------------
1111
12- All production releases of this software are subject to this security policy. A
13- production release is tagged and given a semantic version number of the form:
12+ This security policy only applies to production releases of this software. A
13+ production release is tagged and given a semantic version number of the form
14+ "MAJOR.MINOR.PATCH" where "MAJOR" is an integer starting at 1 and "MINOR" and
15+ "PATCH" are integers starting at 0.
1416
15- MAJOR.MINOR.PATCH
16-
17- where "MAJOR" is an integer starting at 1 and "MINOR" and "PATCH" are integers
18- starting at 0. A feature release has a "PATCH" value of 0, for example:
19-
20- 1.0.0
21- 1.1.0
22- 2.0.0
23-
24- Beta releases and release candidates are * not* prodution releases and use
25- semantic version numbers of the form:
26-
27- MAJOR.MINORbNUMBER
28- MAJOR.MINORrcNUMBER
29-
30- where "MAJOR" and "MINOR" identify the new feature release version number and
31- "NUMBER" identifies a beta or release candidate number starting at 1, for
32- example:
33-
34- 1.0b1
35- 1.0b2
36- 1.0rc1
37-
38- > * Note:* This security policy only applies to production releases. A security
39- > vulnerability that only affects unreleased code will be fixed immediately
40- > without coordination. Vendors * should not* package and release unstable
41- > snapshots, beta releases, or release candidates of this software.
17+ > * Note:* Please report security vulnerabilities that only affect unreleased
18+ > code as regular bugs.
4219
4320
4421Is the Issue a Bug or a Security Vulnerability?
@@ -82,20 +59,20 @@ for the vulnerability, if applicable.
8259You can expect a response within 5 business days.
8360
8461
85- How We Respond to Vulnerability Reports
86- ---------------------------------------
62+ How OpenPrinting Responds to Vulnerability Reports
63+ --------------------------------------------------
8764
88- First, we take every report seriously. There are (conservatively) several
89- billion devices/systems using CUPS, so any security issue can affect a lot of
90- people.
65+ First, OpenPrinting takes every report seriously. There are (conservatively)
66+ several billion devices/systems using CUPS, so any security issue can affect a
67+ lot of people!
9168
9269Members of the OpenPrinting security team will try to verify/reproduce the
9370reported issues in a timely fashion. Please keep in mind that many members of
9471the security team are volunteers or are only employed part-time to maintain
95- CUPS, so your patience is appreciated!
72+ CUPS, so your patience is appreciated.
9673
9774Sometimes a reported issue is actually in another project's code. For these
98- issues we may ask you to re-submit your report to the correct project - an
75+ issues, we may ask you to re-submit your report to the correct project - an
9976enhancement request has been submitted to GitHub to correct this limitation for
10077projects hosted on GitHub.
10178
@@ -109,7 +86,8 @@ and fixes on those supported platforms.
10986> in CVSS because the default cupsd configuration only listens on the loopback
11087> and domain socket addresses.
11188
112- The final CVSS score determines how the vulnerability is disclosed.
89+ The final CVSS score determines how the vulnerability is disclosed - see below
90+ for details.
11391
11492Similar issues (if multiple vulnerabilities are reported) will be combined if
11593they share a common root cause. We don't mean any disrespect by doing this, we
0 commit comments