xen-devel.lists.xenproject.org archive mirror
 help / color / mirror / Atom feed
From: Ian Jackson <Ian.Jackson@eu.citrix.com>
To: xen-devel@lists.xen.org
Subject: Security vulnerability process - lessons learned discussion
Date: Tue, 12 Jun 2012 13:12:06 +0100	[thread overview]
Message-ID: <20439.12822.424318.955833@mariner.uk.xensource.com> (raw)

During the past weeks the Xen.org security team have been involved
with the preparation, predisclosure and publication of Xen Security
Advisories 7, 8 and 9.

During this exercise we found that there were a number of difficulties
with the current security vulnerability process.  These include both
the need for some straightforward procedural improvements, and some
more thorny questions of policy.

We also wish to make the community aware of some of the key decisions
we were faced with during the predisclosure period, and explain what
we as the Xen.org team did and why.

Some members of the predisclosure list, and some community members who
appear to have heard about a problem via some kind of leaks, have also
expressed the view to us that there are elements of the process that
they feel could be improved.

However, many users - particularly those not on the predisclosure list
- will be busy right now upgrading systems to cope with these
vulnerabilities.  We do not expect that community members will want to
divert their resources from front-line security response to
longer-term process improvements, and it is important that everyone
gets a chance to participate properly in policy discussions without
being overly distracted.

We therefore intend to postpone starting this discussion ourselves for
around a week, until the 19th of June.  We would respectfully request
that other community members do likewise.

Starting on the Tuesday 19th of June we expect to have a full and
frank conversation and we look forward to engaging fully with the Xen
community.

The existing established consensus decisionmaking approach of the Xen
project will of course be used to agree any changes to the
vulnerability response process document.

Thanks,
Ian.
(on behalf of the Xen.org security response team)

                 reply	other threads:[~2012-06-12 12:12 UTC|newest]

Thread overview: [no followups] expand[flat|nested]  mbox.gz  Atom feed

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=20439.12822.424318.955833@mariner.uk.xensource.com \
    --to=ian.jackson@eu.citrix.com \
    --cc=xen-devel@lists.xen.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).