From mboxrd@z Thu Jan 1 00:00:00 1970 From: Ian Jackson Subject: [PATCH v2 SECURITY-POLICY 8/9] Clarify what announcements may be made by to service users Date: Fri, 23 Jan 2015 19:31:19 +0000 Message-ID: <1422041480-1164-9-git-send-email-ijackson@chiark.greenend.org.uk> References: <21689.27383.339939.319567@chiark.greenend.org.uk> <1422041480-1164-1-git-send-email-ijackson@chiark.greenend.org.uk> Mime-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit Return-path: Received: from mail6.bemta3.messagelabs.com ([195.245.230.39]) by lists.xen.org with esmtp (Exim 4.72) (envelope-from ) id 1YEjxH-0007Ax-BN for xen-devel@lists.xenproject.org; Fri, 23 Jan 2015 19:31:43 +0000 In-Reply-To: <1422041480-1164-1-git-send-email-ijackson@chiark.greenend.org.uk> List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Sender: xen-devel-bounces@lists.xen.org Errors-To: xen-devel-bounces@lists.xen.org To: xen-devel@lists.xenproject.org Cc: Ian Jackson , Ian Jackson List-Id: xen-devel@lists.xenproject.org Service provider list members should not be prevented from being reasonably honest with their users. Signed-off-by: Ian Jackson Signed-off-by: Ian Jackson --- security_vulnerability_process.html | 8 ++++++++ 1 file changed, 8 insertions(+) diff --git a/security_vulnerability_process.html b/security_vulnerability_process.html index 7412652..3b9c1ba 100644 --- a/security_vulnerability_process.html +++ b/security_vulnerability_process.html @@ -222,6 +222,14 @@ restrictions only insofar as it is necessary to prevent the exposure of technicalities (for example, differences in behaviour) which present a significant risk of rediscovery of the vulnerability. Such situations are expected to be rare.

+

Where the list member is a service provider who intends to take +disruptive action such as rebooting as part of deploying a fix: the +list member's communications to its users about the service disruption +may mention that the disruption is to correct a security issue, and +relate it to the public information about the issue (as listed above). +This applies whether the deployment occurs during the embargo (with +permission - see above) or is planned for after the end of the +embargo.

NOTE: Prior v2.2 of this policy (25 June 2014) it was permitted to also make available the allocated CVE number. This is no longer permitted in accordance with MITRE policy.

-- 1.7.10.4