1
- # Security Policy
1
+ # Security policy
2
2
3
- ## Supported Versions
3
+ ## Supported versions
4
4
5
5
| Version | Supported |
6
6
| ------- | ------------------ |
7
7
| 2.4.x | :white_check_mark : |
8
8
| <2.4.x | :x : |
9
9
10
- ## Reporting a Vulnerability
10
+ ## Reporting a vulnerability
11
11
12
12
Please report any security issues via email to security@getontracks.org .
13
13
If you don't get a reply for your email, resend the email after one week.
@@ -19,3 +19,45 @@ You can (and should) encrypt the email you send with OpenGPG key
19
19
20
20
Unfortunately Tracks is not part of a bug bounty program, but we do provide
21
21
appropriate credits for disclosing security issues.
22
+
23
+ ## Evaluating and fixing a vulnerability
24
+
25
+ When a security vulnerability is reported to the maintainers, the
26
+ maintainers first validate the vulnerability and preliminarily estimate
27
+ the risk caused by the vulnerability.
28
+
29
+ Any security issue is kept strictly confidential until a fix is made and
30
+ validated by the maintainers and, if necessary, the reporter. Any fixes
31
+ are not committed to the public repository before publishing.
32
+
33
+ When a fix has been validated, the final risk assessment of the issue is
34
+ done based on the latest version of the CVSS system and the criteria below.
35
+
36
+ ## Security advisories
37
+
38
+ A security advisory is a public announcement managed by the maintainers
39
+ which informs instance maintainers about a security problem in the software
40
+ and the steps instance maintainers should take to address it. On release it
41
+ is published widely so that instance maintainers can address it quickly.
42
+
43
+ If necessary, the maintainers can decide to issue a pre-announcement
44
+ informing the instance maintainers of an upcoming security advisory. This
45
+ is done when timely addressing of the vulnerability is very important due
46
+ to the high risk caused by it.
47
+
48
+ Security advisories are published for security vulnerabilities that
49
+
50
+ * Are caused by code included in the software repository (not any libraries
51
+ or other code not itself in the repository),
52
+ * Exist in stable or release candidate releases (not alpha or beta
53
+ releases or unreleased code),
54
+ * Are exploitable either without logging in or without admin privileges, and
55
+ * Affect either the whole instance or other users than the one running the
56
+ exploit.
57
+
58
+ ## Other vulnerabilities
59
+
60
+ If the vulnerability does not warrant a security advisory, the vulnerability
61
+ is fixed and released with a note in the release notes of the release.
62
+ Details of the vulnerability as well as the risk assessment and grounds for
63
+ not publishing a security advisory are included.
0 commit comments