From mboxrd@z Thu Jan 1 00:00:00 1970
From: Ian Campbell
Subject: [PATCH 5/6] Patch review,
expert advice and targetted fixes
Date: Thu, 23 Aug 2012 11:37:53 +0100
Message-ID: <1345718274-7900-5-git-send-email-ian.campbell@citrix.com>
References: <1345718230.12501.79.camel@zakaz.uk.xensource.com>
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Return-path:
In-Reply-To: <1345718230.12501.79.camel@zakaz.uk.xensource.com>
List-Unsubscribe: ,
List-Post:
List-Help:
List-Subscribe: ,
Sender: xen-devel-bounces@lists.xen.org
Errors-To: xen-devel-bounces@lists.xen.org
To: xen-devel@lists.xen.org
Cc: Ian Jackson , Ian Campbell
List-Id: xen-devel@lists.xenproject.org
See <20448.49637.38489.246434@mariner.uk.xensource.com>, section
"Patch development and review"
---
security_vulnerability_process.html | 9 +++++++--
1 file changed, 7 insertions(+), 2 deletions(-)
diff --git a/security_vulnerability_process.html b/security_vulnerability_process.html
index 687e452..c830a04 100644
--- a/security_vulnerability_process.html
+++ b/security_vulnerability_process.html
@@ -109,8 +109,13 @@ if(ns4)_d.write("<\/scr
process.
(This may rely on the other project(s) having
documented and responsive security contact points)
- We will prepare or check patch(es) which fix the vulnerability.
- This would ideally include all relevant backports.
+ We will prepare or check patch(es) which fix the
+ vulnerability. This would ideally include all relevant
+ backports. Patches will be tightly targeted on fixing the
+ specific security vulnerability in the smallest, simplest and
+ most reliable way. Where necessary domain specific experts
+ within the community will be brought in to help with patch
+ preparation.
We will determine which systems/configurations/versions are
vulnerable, and what the impact of the vulnerability is.
Depending on the nature of the vulnerability this may involve
--
1.7.10.4