From mboxrd@z Thu Jan 1 00:00:00 1970 From: Ian Campbell Subject: Re: [PATCH SECURITY-POLICY 3/9] Deployment with Security Team Permission Date: Mon, 19 Jan 2015 12:35:29 +0000 Message-ID: <1421670929.10440.75.camel@citrix.com> References: <21689.27383.339939.319567@chiark.greenend.org.uk> <1421437941-10997-1-git-send-email-ijackson@chiark.greenend.org.uk> <1421437941-10997-3-git-send-email-ijackson@chiark.greenend.org.uk> Mime-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit Return-path: Received: from mail6.bemta4.messagelabs.com ([85.158.143.247]) by lists.xen.org with esmtp (Exim 4.72) (envelope-from ) id 1YDBYf-0007ow-Nn for xen-devel@lists.xenproject.org; Mon, 19 Jan 2015 12:35:53 +0000 In-Reply-To: <1421437941-10997-3-git-send-email-ijackson@chiark.greenend.org.uk> List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Sender: xen-devel-bounces@lists.xen.org Errors-To: xen-devel-bounces@lists.xen.org To: Ian Jackson Cc: lars.kurth.xen@gmail.com, xen-devel@lists.xenproject.org, Ian Jackson List-Id: xen-devel@lists.xenproject.org On Fri, 2015-01-16 at 19:52 +0000, Ian Jackson wrote: > Permitting deployment during embargo seemed to have rough consensus on > the principle. We seemed to be converging on the idea that the > Security Team should explicitly set deployment restrictions for each > set of patches. > > Signed-off-by: Ian Jackson > Signed-off-by: Ian Jackson > --- > security_vulnerability_process.html | 11 +++++++++++ > 1 file changed, 11 insertions(+) > > diff --git a/security_vulnerability_process.html b/security_vulnerability_process.html > index 010cf76..de5e83e 100644 > --- a/security_vulnerability_process.html > +++ b/security_vulnerability_process.html > @@ -212,6 +212,17 @@ following:

>
  • The assigned XSA number
  • >
  • The planned disclosure date
  • > > +

    List members may, if (and only if) the Security Team grants > +permission, deploy fixed versions during the embargo. Permission for > +deployment, and any restrictions, will be stated in the embargoed > +advisory text.

    Do you have a corresponding patch to our advisory template to add a section with an XXX for this? > +

    The Security Team will normally permit such deployment, even for > +systems where VMs are managed or used by non-members of the > +predisclosure list. The Security Team will impose deployment > +restrictions only insofar as it is necessary to prevent the exposure > +of technicalities (for example, differences in behaviour) which > +present a significant risk of rediscovery of the vulnerability. Such > +situations are expected to be rare.

    >

    NOTE: Prior v2.2 of this policy (25 June 2014) it was > permitted to also make available the allocated CVE number. This is no > longer permitted in accordance with MITRE policy.