[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] RFC: Adding a section to the Xen security policy about what constitutes a vulnerability
>>> On 24.01.17 at 12:33, <ian.jackson@xxxxxxxxxxxxx> wrote: > Jan Beulich writes ("Re: [Xen-devel] RFC: Adding a section to the Xen > security > policy about what constitutes a vulnerability"): >> "If a bug requires a vulnerable operating system to be exploitable, the >> Xen Security Team will pro-actively investigate the vulnerability of >> the following open-source operating systems: Linux, OpenBSD, FreeBSD, >> and NetBSD. The security team will also test or otherwise investigate >> the vulnerability of supported Windows versions, and it may also do so >> for some other proprietary operating systems." > > I don't think we can promise to come up with a definitely conclusion > for any proprietary system, can we ? Answering such a question for > Windows is not within our power because we don't have the source code. Well - see George's original mail, which the above was a reply to. He has suggested that there's enough knowledge around. > The question, which the above text leaves unclear, is, what do we do > if we aren't sure whether there are configurations of Windows which > have the exposed behaviour. I think I had given my opinion on this in an earlier mail: If in doubt, we ought to issue an advisory. Jan _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxx https://lists.xen.org/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |