Skip to content

Commit 7961023

Browse files
authored
Improve: SECURITY.md for clarity and detail + Adding PVE9 as supported (#7690)
1 parent ea58fdb commit 7961023

File tree

1 file changed

+47
-7
lines changed

1 file changed

+47
-7
lines changed

SECURITY.md

Lines changed: 47 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -1,24 +1,64 @@
1+
# Security Policy
2+
13
## Supported Versions
2-
This project currently supports the following versions of Proxmox VE:
4+
5+
This project currently supports the following versions of Proxmox VE (PVE):
36

47
| Version | Supported |
58
| ------- | ------------------ |
9+
| 9.0.x | :white_check_mark: |
610
| 8.4.x | :white_check_mark: |
711
| 8.3.x | :white_check_mark: |
812
| 8.2.x | :white_check_mark: |
913
| 8.1.x | :white_check_mark: |
10-
| 8.0.x | Limited support*|
14+
| 8.0.x | Limited support* |
1115
| < 8.0 | :x: |
1216

13-
*Version 8.0.x has limited support. Security updates may not be provided for all issues in this version.
17+
*Version 8.0.x has limited support. Security updates may not be provided for all issues affecting this version.
18+
19+
---
1420

1521
## Reporting a Vulnerability
1622

17-
Security vulnerabilities shouldn’t be reported publicly to prevent potential exploitation. Instead, please report any vulnerabilities privately by reaching out directly to us. You can either join our [Discord server](https://discord.gg/jsYVk5JBxq) and send a direct message to a maintainer or contact us via email at [email protected]. Be sure to include a detailed description of the vulnerability and the steps to reproduce it. Thank you for helping us keep our project secure!
23+
Security vulnerabilities must not be reported publicly to avoid potential exploitation.
24+
Instead, please report them privately via one of the following channels:
25+
26+
- **Discord**: Join our [Discord server](https://discord.gg/jsYVk5JBxq) and send a direct message to a maintainer.
27+
- **Email**: Write to us at **[email protected]** with the subject line:
28+
`Vulnerability Report - <Project/Script Name>`.
29+
30+
When reporting a vulnerability, please provide:
31+
32+
- A clear description of the issue
33+
- Steps to reproduce the vulnerability
34+
- Affected versions or environments
35+
- (Optional) Suggested fixes or workarounds
36+
37+
---
38+
39+
## Response Process
40+
41+
1. **Acknowledgment**
42+
- We will review and acknowledge your report within **7 business days**.
43+
44+
2. **Assessment**
45+
- The maintainers will verify the issue and classify its severity.
46+
- Depending on impact, a patch may be released immediately or scheduled for the next update.
47+
48+
3. **Resolution**
49+
- Critical security fixes will be prioritized.
50+
- Non-critical issues may be deferred or declined with an explanation.
51+
52+
---
1853

19-
Once a vulnerability has been reported, the project maintainers will review it and acknowledge the report within 7 business days. We will then work to address the vulnerability and provide a fix as soon as possible. Depending on the severity of the issue, a patch may be released immediately or included in the next scheduled update.
54+
## Disclaimer
2055

21-
Please note that not all reported vulnerabilities may be accepted. The project maintainers reserve the right to decline a vulnerability report if it is deemed to be a low-risk issue or if it conflicts with the project's design or architecture. In such cases, we will provide an explanation for the decision.
56+
Not all reported issues will be treated as vulnerabilities.
57+
Reports may be declined if they are deemed:
58+
- Low-risk
59+
- Out of project scope
60+
- Conflicting with intended design or architecture
2261

23-
If you have any questions or concerns about this security policy, please don't hesitate to contact the project maintainers.
62+
---
2463

64+
If you have any questions or concerns about this security policy, please reach out to the maintainers through the contact options above.

0 commit comments

Comments
 (0)