Skip to content

Commit c6c80bc

Browse files
authored
admin: Update security instructions to emphasize reporting via GitHub (#5149)
The security@openimageio.org is still fine, but we prefer that true vulnerability reports come via the GitHub security advisory mechanism. (That makes it easy for us to turn them into CVEs when needed, among other administrative niceties.) Signed-off-by: Larry Gritz <lg@larrygritz.com>
1 parent ba8d726 commit c6c80bc

2 files changed

Lines changed: 18 additions & 10 deletions

File tree

README.md

Lines changed: 7 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -123,11 +123,15 @@ it and potentially be able to answer your question quickly (more so than a GH
123123
"issue"). For quick questions, you could also try the [ASWF
124124
Slack](https://slack.aswf.io) `#openimageio` channel.
125125

126-
Bugs, build problems, and discovered vulnerabilities that you are relatively
127-
certain is a legit problem in the code, and **for which you can give clear
128-
instructions for how to reproduce**, should be [reported as
126+
A bug or build problem that you are relatively certain is a legit problem in
127+
the code, and **for which you can give clear instructions for how to
128+
reproduce**, should be [reported as
129129
issues](https://github.com/AcademySoftwareFoundation/OpenImageIO/issues).
130130

131+
To report a security vulnerability that is serious enough that it should not
132+
be discussed publicly until a patch is ready, please file a GitHub [security
133+
advisory](https://github.com/AcademySoftwareFoundation/OpenImageIO/security/advisories/new).
134+
131135
If confidentiality precludes a public question or issue, you may contact us
132136
privately at [info@openimageio.org](info@openimageio.org), or for
133137
security-related issues [security@openimageio.org](security@openimageio.org).

SECURITY.md

Lines changed: 11 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -16,14 +16,18 @@ security vulnerabilities.
1616
## Reporting a Vulnerability
1717

1818
If you think you've found a potential vulnerability in OpenImageIO, please
19-
report it by emailing security@openimageio.org. Only the project administrators
20-
have access to these messages. Include detailed steps to reproduce the issue,
21-
and any other information that could aid an investigation. Our policy is to
22-
respond to vulnerability reports within 14 days.
19+
report it to the maintainers. Include detailed steps to reproduce the issue,
20+
and any other information that could aid an investigation.
2321

24-
Our policy is to address critical security vulnerabilities rapidly and post
25-
patches as quickly as possible.
22+
The best way to report a vulnerability is to file a GitHub [security
23+
advisory](https://github.com/AcademySoftwareFoundation/OpenImageIO/security/advisories/new).
24+
If that is not possible, it is also fine to email your report to
25+
security@openimageio.org. Only the project administrators have access to these
26+
reports.
2627

28+
Our policy is to respond to vulnerability reports within 14 days, and to
29+
address critical security vulnerabilities rapidly and post patches as quickly
30+
as possible.
2731

2832
## Other security features
2933

@@ -44,7 +48,7 @@ None known
4448

4549
## History of CVE Fixes
4650

47-
Most recent fixes listed first, more or less
51+
Most recent fixes listed first, more or less:
4852

4953
- CVE-2024-40630: Fixed incorrect image size for certain HEIC files.
5054
[advisory](https://github.com/AcademySoftwareFoundation/OpenImageIO/security/advisories/GHSA-jjm9-9m4m-c8p2) (Fixed in 2.5.13.1)

0 commit comments

Comments
 (0)