public inbox for linux-kernel@vger.kernel.org
 help / color / mirror / Atom feed
From: Chris Wright <chrisw@osdl.org>
To: akpm@osdl.org, torvalds@osdl.org, alan@lxorguk.ukuu.org.uk,
	marcelo.tosatti@cyclades.com
Cc: linux-kernel@vger.kernel.org
Subject: security contact draft
Date: Thu, 13 Jan 2005 12:55:03 -0800	[thread overview]
Message-ID: <20050113125503.C469@build.pdx.osdl.net> (raw)

To keep the conversation concrete, here's a pretty rough stab at
documenting the policy.

 Linux kernel developers take security very seriously.  As such, we'd
 like to know when a security bug is found so that it can be fixed and
 disclosed as quickly as possible.

 1) Contact

 The Linux kernel security contact is $CONTACTADDR.  This is a private
 list of security officers who will help verify the bug report and develop
 and release a fix.  It is possible that the security officers will bring
 in extra help from area maintainers to understand and fix the security
 vulnerability.

 It is preferred that mail sent to the security contact is encrypted
 with $PUBKEY.

 As it is with any bug, the more information provided the easier it
 will be to diagnose and fix.  Please review the procedure outlined in
 REPORTING-BUGS if you are unclear about what information is helpful.
 Any exploit code is very helpful and will not be released without
 consent from the reporter unless it's already been made public.

 2) Disclosure

 The goal of the kernel security contact is to work with the bug submitter
 to bug resolution as well as disclosure.  We prefer to fully disclose
 the bug as soon as possible.  It is reasonable to delay disclosure when
 the bug or the fix is not yet fully understood, the solution is not
 well-tested or for vendor coordination.  However, we expect these delays
 to be short, measurable in days, not weeks or months.  As a basic default
 policy, we expect report to disclosure to be on the order of $NUMDAYS.


             reply	other threads:[~2005-01-13 21:03 UTC|newest]

Thread overview: 14+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2005-01-13 20:55 Chris Wright [this message]
2005-01-13 20:10 ` security contact draft Alan Cox
2005-01-13 21:31   ` Linus Torvalds
2005-01-13 19:28     ` Marcelo Tosatti
2005-01-13 22:02   ` Chris Wright
2005-01-13 21:43 ` Florian Weimer
2005-01-13 22:12   ` Chris Wright
2005-01-15  0:33     ` Alan Cox
2005-01-15  2:43       ` Chris Wright
2005-01-15  4:00         ` Alan Cox
2005-01-18  0:24           ` security contact draft2 (was Re: security contact draft) Chris Wright
2005-01-18 17:39             ` Horst von Brand
2005-02-03 14:28 ` security contact draft Patrick Plattes
2005-02-03 18:08   ` Chris Wright

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=20050113125503.C469@build.pdx.osdl.net \
    --to=chrisw@osdl.org \
    --cc=akpm@osdl.org \
    --cc=alan@lxorguk.ukuu.org.uk \
    --cc=linux-kernel@vger.kernel.org \
    --cc=marcelo.tosatti@cyclades.com \
    --cc=torvalds@osdl.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox