Skip to content

Latest commit

 

History

History
27 lines (19 loc) · 2.47 KB

SECURITY.md

File metadata and controls

27 lines (19 loc) · 2.47 KB

Security Policy

Supported Versions

Following versions are supported with security updates.

Version Supported
2.x
1.x
< 1.0

Known vulnerabilities

See security advisories for a list of known and published vulnerabilities.

Steps of the Vulnerability Management

  1. Discover: The person discovering the issues (the reporter) privately reports it to webmaster@wgnf.de providing all the information needed to resolve the problem (additionally the GitHub-user can be added, so that the reporter can be added to the created security advisory) - ideally already providing the severity of the issue (choose either from a blanket severity of low, medium, high, critical or use the CVSS Calculator)
  2. Acknowledge: The owner of liz will reply in the following business days to acknowledge the receipt as well as create a new confidential draft security advisory and add the reporter to this advisory if the username was provided
  3. Assess: If not already done the severity of the vulnerability is determined (see above)
  4. Investigate: The reported vulnerability will be investigated. The reporter will receive updates if the vulnerability has been accepted or rejected via the created security advisory (if rejected the process stops here)
  5. Remediate: We will patch the vulnerability ourselves or forward the report to the affected packages/systems (in the case of multiple open vulnerabilities the riskiest according to the severity or CVSS score are prioritized). The potential fix and announcement will be shared in the security advisory
  6. Verify: We will make sure that the potential fix is actually fixing the vulnerability (using additional scans and/or tests) in cooperation with the reporter
  7. Disclosure: If the planned fix is accepted it will be published alongside an announcement and a new (patch) release, as well as publishing the created security advisory

Any person involved in this process should keep the reported vulnerability confidential until it has been fixed. This means avoiding public GitHub issues or commits, only using the created security advisory to discuss and create private PRs/branches from.