Skip to content

Commit d9f083f

Browse files
authored
Merge pull request #68 from bitnami-labs/bugfix/fix-linter-errors
Fix linter errors in SECURITY.md
2 parents 055870a + e86b6ec commit d9f083f

File tree

1 file changed

+10
-19
lines changed

1 file changed

+10
-19
lines changed

SECURITY.md

Lines changed: 10 additions & 19 deletions
Original file line numberDiff line numberDiff line change
@@ -2,47 +2,40 @@
22

33
The community has adopted this security disclosure and response policy to ensure we responsibly handle critical issues.
44

5-
65
## Supported Versions
76

87
For a list of support versions that this project will potentially create security fixes for, please refer to the Releases page on this project's GitHub and/or project related documentation on release cadence and support.
98

10-
119
## Reporting a Vulnerability - Private Disclosure Process
1210

1311
Security is of the highest importance and all security vulnerabilities or suspected security vulnerabilities should be reported to this project privately, to minimize attacks against current users before they are fixed. Vulnerabilities will be investigated and patched on the next patch (or minor) release as soon as possible. This information could be kept entirely internal to the project.
1412

1513
If you know of a publicly disclosed security vulnerability for this project, please **IMMEDIATELY** contact the maintainers of this project privately. The use of encrypted email is encouraged.
1614

15+
**IMPORTANT: Do not file public issues on GitHub for security vulnerabilities**. To report a vulnerability or a security-related issue, please contact the maintainers with enough details through one of the following channels:
1716

18-
**IMPORTANT: Do not file public issues on GitHub for security vulnerabilities**
19-
20-
To report a vulnerability or a security-related issue, please contact the maintainers with enough details through one of the following channels:
2117
* Directly via their individual email addresses
2218
* Open a [GitHub Security Advisory](https://docs.github.com/en/code-security/security-advisories/guidance-on-reporting-and-writing/privately-reporting-a-security-vulnerability). This allows for anyone to report security vulnerabilities directly and privately to the maintainers via GitHub. Note that this option may not be present for every repository.
2319

24-
The report will be fielded by the maintainers who have committer and release permissions. Feedback will be sent within 3 business days, including a detailed plan to investigate the issue and any potential workarounds to perform in the meantime.
20+
The report will be fielded by the maintainers who have committer and release permissions. Feedback will be sent within 3 business days, including a detailed plan to investigate the issue and any potential workarounds to perform in the meantime.
2521

2622
Do not report non-security-impacting bugs through this channel. Use GitHub issues for all non-security-impacting bugs.
2723

28-
2924
## Proposed Report Content
3025

3126
Provide a descriptive title and in the description of the report include the following information:
3227

33-
* Basic identity information, such as your name and your affiliation or company.
34-
* Detailed steps to reproduce the vulnerability (POC scripts, screenshots, and logs are all helpful to us).
35-
* Description of the effects of the vulnerability on this project and the related hardware and software configurations, so that the maintainers can reproduce it.
36-
* How the vulnerability affects this project's usage and an estimation of the attack surface, if there is one.
37-
* List other projects or dependencies that were used in conjunction with this project to produce the vulnerability.
38-
28+
* Basic identity information, such as your name and your affiliation or company.
29+
* Detailed steps to reproduce the vulnerability (POC scripts, screenshots, and logs are all helpful to us).
30+
* Description of the effects of the vulnerability on this project and the related hardware and software configurations, so that the maintainers can reproduce it.
31+
* How the vulnerability affects this project's usage and an estimation of the attack surface, if there is one.
32+
* List other projects or dependencies that were used in conjunction with this project to produce the vulnerability.
3933

4034
## When to report a vulnerability
4135

42-
* When you think this project has a potential security vulnerability.
43-
* When you suspect a potential vulnerability but you are unsure that it impacts this project.
44-
* When you know of or suspect a potential vulnerability on another project that is used by this project.
45-
36+
* When you think this project has a potential security vulnerability.
37+
* When you suspect a potential vulnerability but you are unsure that it impacts this project.
38+
* When you know of or suspect a potential vulnerability on another project that is used by this project.
4639

4740
## Patch, Release, and Disclosure
4841

@@ -56,14 +49,12 @@ The maintainers will respond to vulnerability reports as follows:
5649
6. The maintainers will work on fixing the vulnerability and perform internal testing before preparing to roll out the fix.
5750
7. Once the fix is confirmed, the maintainers will patch the vulnerability in the next patch or minor release, and backport a patch release into all earlier supported releases.
5851

59-
6052
## Public Disclosure Process
6153

6254
The maintainers publish the public advisory to this project's community via GitHub. In most cases, additional communication via Slack, Twitter, mailing lists, blog, and other channels will assist in educating the project's users and rolling out the patched release to affected users.
6355

6456
The maintainers will also publish any mitigating steps users can take until the fix can be applied to their instances. This project's distributors will handle creating and publishing their own security advisories.
6557

66-
6758
## Confidentiality, integrity and availability
6859

6960
We consider vulnerabilities leading to the compromise of data confidentiality, elevation of privilege, or integrity to be our highest priority concerns. Availability, in particular in areas relating to DoS and resource exhaustion, is also a serious security concern. The maintainer team takes all vulnerabilities, potential vulnerabilities, and suspected vulnerabilities seriously and will investigate them in an urgent and expeditious manner.

0 commit comments

Comments
 (0)