[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] [Xen-devel] Re: Security vulnerability process - last call
Ian Jackson <Ian.Jackson <at> eu.citrix.com> writes: [...] > 1. We request that anyone who discovers a vulnerability in xen.org > software reports this by email to security (at) xen (dot) org. > > (This also covers the situation where an existing published > changeset is retrospectively found to be a security fix.) For this situation, the patch is already made public. Such information should be shared with both the pre-disclosure and oss-security lists immediately, so that we can avoid having duplicated CVE names assigned. > (d) If we think other software systems (for example, competing > hypervisor systems) are likely to be affected by the same > vulnerability, we will try to make those other projects aware > of the problem and include them in the advisory preparation > process. (This may rely on the other project(s) having > documented and responsive security contact points.) There's linux-distros@xxxxxxxxxxxxxxx if you are unable to find the necessary security contacts. > 3. Advisory public release: > > At the embargo date we will publish the advisory, and push > bugfix changesets to public revision control trees. Perhaps be a bit more specific. At which timezone will the advisory be published? For the folks in Asia Pacific, this could mean a public pre- disclosure of about 12 hours or more if security (at) xen is based in the States. > Public advisories will be posted to xen-devel. > > Copies will also be sent to the pre-disclosure list, unless > the advisory was already sent there previously during the embargo > period and has not been updated since. And the oss-security list. > Specifically, prior to the embargo date, pre-disclosure list members > should not make available, even to their own customers and partners: > - the Xen.org advisory > - their own advisory > - revision control commits which are a fix for the problem > - patched software (even in binary form) > without prior consultation with security <at> xen and/or the discoverer. Shouldn't this be "and", instead of "and/or"? And shouldn't this includes prior consultation with the list members too? Thanks, Eugene -- Eugene Teo / Red Hat Security Response Team _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxxxxxxxx http://lists.xensource.com/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |