public inbox for linux-kernel@vger.kernel.org
 help / color / mirror / Atom feed
From: Chris Wright <chrisw@osdl.org>
To: Alan Cox <alan@lxorguk.ukuu.org.uk>
Cc: Chris Wright <chrisw@osdl.org>, Florian Weimer <fw@deneb.enyo.de>,
	Linux Kernel Mailing List <linux-kernel@vger.kernel.org>
Subject: security contact draft2 (was Re: security contact draft)
Date: Mon, 17 Jan 2005 16:24:17 -0800	[thread overview]
Message-ID: <20050117162417.O24171@build.pdx.osdl.net> (raw)
In-Reply-To: <1105761548.11128.0.camel@localhost.localdomain>; from alan@lxorguk.ukuu.org.uk on Sat, Jan 15, 2005 at 04:00:20AM +0000

* Alan Cox (alan@lxorguk.ukuu.org.uk) wrote:
> On Sad, 2005-01-15 at 02:43, Chris Wright wrote:
> > Guess it's an open question.  Do you agree with these basics bits?
> > 
> >  - no guarantee
> >  - attempt to work with reporter
> >  - attempt to work with vendors
> >  - goal of timely release
> >  - retain final say
> >  - within immediate to few weeks
> >  
> > Hard to put real time on it.
> 
> Its emphasising "release date set by linux-security not reporter" rather
> than length - although length guidance is good.

Minor changes to capture this.

thanks,
-chris

 DRAFT

 Linux kernel developers take security very seriously.  As such, we'd
 like to know when a security bug is found so that it can be fixed and
 disclosed as quickly as possible.  Please report security bugs to the
 Linux kernel security team.

 1) Contact

 The Linux kernel security team can be contacted by email at
 $CONTACTADR.  This is a private list of security officers
 who will help verify the bug report and develop and release a fix.
 It is possible that the security team will bring in extra help from
 area maintainers to understand and fix the security vulnerability.

 It is preferred that mail sent to the security team is encrypted
 with $PUBKEY.

 As it is with any bug, the more information provided the easier it
 will be to diagnose and fix.  Please review the procedure outlined in
 REPORTING-BUGS if you are unclear about what information is helpful.
 Any exploit code is very helpful and will not be released without
 consent from the reporter unless it has already been made public.

 2) Disclosure

 The goal of the Linux kernel security team is to work with the
 bug submitter to bug resolution as well as disclosure.  We prefer
 to fully disclose the bug as soon as possible.  It is reasonable to
 delay disclosure when the bug or the fix is not yet fully understood,
 the solution is not well-tested or for vendor coordination.  However, we
 expect these delays to be short, measurable in days, not weeks or months.
 A disclosure date is negotiated by the security team working with the
 bug submitter as well as vendors.  However, the kernel security team
 holds the final say when setting a disclosure date.  The timeframe for
 disclosure is from immediate (esp. if it's already publically known)
 to a few weeks.  As a basic default policy, we expect report date to
 disclosure date to be on the order of 7 days.

 3) Non-disclosure agreements
 
 The Linux kernel security team is not a formal body and therefore unable
 to enter any non-disclosure agreements.


  reply	other threads:[~2005-01-18  0:24 UTC|newest]

Thread overview: 14+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2005-01-13 20:55 security contact draft Chris Wright
2005-01-13 20:10 ` Alan Cox
2005-01-13 21:31   ` Linus Torvalds
2005-01-13 19:28     ` Marcelo Tosatti
2005-01-13 22:02   ` Chris Wright
2005-01-13 21:43 ` Florian Weimer
2005-01-13 22:12   ` Chris Wright
2005-01-15  0:33     ` Alan Cox
2005-01-15  2:43       ` Chris Wright
2005-01-15  4:00         ` Alan Cox
2005-01-18  0:24           ` Chris Wright [this message]
2005-01-18 17:39             ` security contact draft2 (was Re: security contact draft) Horst von Brand
2005-02-03 14:28 ` security contact draft Patrick Plattes
2005-02-03 18:08   ` Chris Wright

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=20050117162417.O24171@build.pdx.osdl.net \
    --to=chrisw@osdl.org \
    --cc=alan@lxorguk.ukuu.org.uk \
    --cc=fw@deneb.enyo.de \
    --cc=linux-kernel@vger.kernel.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox