Cristy | dc134b4 | 2020-06-07 09:53:54 -0400 | [diff] [blame] | 1 | # Security Policy |
Cristy | 0e2fe46 | 2020-06-07 09:53:07 -0400 | [diff] [blame] | 2 | |
Cristy | eeaef15 | 2020-11-21 13:58:43 -0500 | [diff] [blame] | 3 | ImageMagick recommended practices **strongly** encourages you to configure a [security policy](https://imagemagick.org/script/security-policy.php) that suits your local environment. |
Cristy | 0e2fe46 | 2020-06-07 09:53:07 -0400 | [diff] [blame] | 4 | |
Cristy | dc134b4 | 2020-06-07 09:53:54 -0400 | [diff] [blame] | 5 | ## Supported Versions |
Cristy | 0e2fe46 | 2020-06-07 09:53:07 -0400 | [diff] [blame] | 6 | |
Cristy | dc134b4 | 2020-06-07 09:53:54 -0400 | [diff] [blame] | 7 | We encourage users to upgrade to the lastest ImageMagick release to ensure that all known security vulnerabilities are addressed. On request, we can backport a vulnerability to other ImageMagick versions. |
Cristy | 0e2fe46 | 2020-06-07 09:53:07 -0400 | [diff] [blame] | 8 | |
Cristy | dc134b4 | 2020-06-07 09:53:54 -0400 | [diff] [blame] | 9 | ## Reporting a Vulnerability |
Cristy | 0e2fe46 | 2020-06-07 09:53:07 -0400 | [diff] [blame] | 10 | |
Cristy | 196f03c | 2020-06-09 07:27:40 -0400 | [diff] [blame] | 11 | Post any vulnerability as an [issue](https://github.com/ImageMagick/ImageMagick/issues). Or you can post privately to the ImageMagick development [team](https://imagemagick.org/script/contact.php). Most vulnerabilities are fixed within 48 hours. |
| 12 | |
| 13 | In addition, request a [CVE](https://cve.mitre.org/cve/request_id.html). We rely on you to post CVE's so our development team can concentrate on delivering a robust security patch. |