Skip to content

Commit 3277e8f

Browse files
authored
Fix pre-commit failure for SECURTIY.md (#22102)
Signed-off-by: mgoin <[email protected]>
1 parent 8d70599 commit 3277e8f

File tree

1 file changed

+5
-1
lines changed

1 file changed

+5
-1
lines changed

SECURITY.md

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
# Security Policy
22

3-
## Reporting security issues:
3+
## Reporting security issues
44

55
Please report security issues privately using [the vulnerability submission form](https://github.com/vllm-project/vllm/security/advisories/new).
66

@@ -19,15 +19,19 @@ Please see [PyTorch's Security Policy](https://github.com/pytorch/pytorch/blob/m
1919
We will determine the risk of each issue, taking into account our experience dealing with past issues, versions affected, common defaults, and use cases. We use the following severity categories:
2020

2121
### CRITICAL Severity
22+
2223
Vulnerabilities that allow remote attackers to execute arbitrary code, take full control of the system, or significantly compromise confidentiality, integrity, or availability without any interaction or privileges needed, examples include remote code execution via network, deserialization issues that allow exploit chains. Generally those issues which are rated as CVSS ≥ 9.0.
2324

2425
### HIGH Severity
26+
2527
Serious security flaws that allow elevated impact—like RCE in specific, limited contexts or significant data loss—but require advanced conditions or some trust, examples include RCE in advanced deployment modes (e.g. multi-node), or high impact issues where some sort of privileged network access is required. These issues typically have CVSS scores between 7.0 and 8.9
2628

2729
### MODERATE Severity
30+
2831
Vulnerabilities that cause denial of service or partial disruption, but do not allow arbitrary code execution or data breach and have limited impact. These issues have a CVSS rating between 4.0 and 6.9
2932

3033
### LOW Severity
34+
3135
Minor issues such as informational disclosures, logging errors, non-exploitable flaws, or weaknesses that require local or high-privilege access and offer negligible impact. Examples include side channel attacks or hash collisions. These issues often have CVSS scores less than 4.0
3236

3337
## Prenotification policy

0 commit comments

Comments
 (0)