aboutsummaryrefslogtreecommitdiff
path: root/SECURITY.md
diff options
context:
space:
mode:
Diffstat (limited to 'SECURITY.md')
-rw-r--r--SECURITY.md22
1 files changed, 13 insertions, 9 deletions
diff --git a/SECURITY.md b/SECURITY.md
index 28f19f4b..e821aed1 100644
--- a/SECURITY.md
+++ b/SECURITY.md
@@ -11,9 +11,9 @@
## Reporting a Vulnerability
-If you find a significant vulnerability, or evidence of one, use either of the following contacts:
-- send an email to [Kitsune Ral](mailto:Kitsune-Ral@users.sf.net); or
-- reach out in Matrix to [@kitsune:matrix.org](https://matrix.to/#/@kitsune:matrix.org) (if you can, switch encryption on).
+If you find a vulnerability, or evidence of one, use either of the following contacts:
+- via email: [Kitsune Ral](mailto:Kitsune-Ral@users.sf.net); or
+- via Matrix: [direct chat with @kitsune:matrix.org](https://matrix.to/#/@kitsune:matrix.org?action=chat).
In any of these two options, indicate that you have such information (do not share it yet), and we'll tell you the next steps.
@@ -24,10 +24,14 @@ so this is NOT the right way for undisclosed vulnerabilities, whether or not you
## Timeline and commitments
-Initial reaction to the message about a vulnerability (see above) will be no more than 5 days. From the moment of the private report or
-public disclosure (if it hasn't been reported earlier in private) of each vulnerability, we take effort to fix it on priority before
-any other issues. In case of vulnerabilities with [CVSS v2](https://nvd.nist.gov/cvss.cfm) score of 4.0 and higher the commitment is
-to provide a workaround within 30 days and a full fix within 60 days after the specific information on the vulnerability has been
-reported to the project by any means (in private or in public). For vulnerabilities with lower score there is no commitment on the timeline,
-only prioritisation. The full fix doesn't imply that all software functionality remains accessible (in the worst case
+Initial reaction to the message about a vulnerability (see above) will be
+no more than 5 days. From the moment of the private report or public disclosure
+(if it hasn't been reported earlier in private) of each vulnerability, we take
+effort to fix it on priority before any other issues. In case of vulnerabilities
+with [CVSS v2](https://nvd.nist.gov/cvss.cfm) score of 4.0 and higher
+the commitment is to provide a workaround within 30 days and a full fix
+within 60 days after the project has been made aware about the vulnerability
+(in private or in public). For vulnerabilities with lower score there is
+no commitment on the timeline, only prioritisation. The full fix doesn't imply
+that all software functionality remains accessible (in the worst case
the vulnerable functionality may be disabled or removed to prevent the attack).