Security: clarify use of confidential issues
All threads resolved!
Merged
requested to merge mrybczyn/org.eclipse.dash.handbook:security-update-confidential-issues into master
All threads resolved!
Compare changes
+ 12
− 1
@@ -68,7 +68,7 @@ Project can request CVE numbers in different ways depending on the project setup
* *Request the number*: When you know that there is a security issue (the fix is not yet needed at this point), go to {cveRequestUrl}[the CVE Request form] and fill it. Make sure to keep the issue confidential for now. If you want to make the issue visible to multiple project members, add them as assignees or CC them when creating the ticket (it will be hard later on).
* *Request the number*: When you know that there is a security issue (the fix is not yet needed at this point), go to {cveRequestUrl}[the CVE Request form] and fill it. Make sure to keep the issue confidential for now. If you want to make the issue visible to multiple project members, add them as assignees when creating the ticket (it will be hard later on).
@@ -85,6 +85,13 @@ For most projects the process looks as follows:
The _Tracking_ section of the request issue includes some checkboxes for the project team and for the Security Team. The Security Team will assign the CVE upon receipt of the request, but will not escalate (that is, they will not report the assignment of the CVE to the central authority) until after a project committer clearly indicates that they are ready to disclose the vulnerability.
@@ -206,3 +213,7 @@ Do we need a <<vulnerability-cve,CVE>> for versions of software that we released
The answer to this is not obvious, but as a general rule... no. The answer is not obvious because the continuity of the source of affected products may not be obvious (or relevant) to consumers, and it is not strictly wrong for a CVE Numbering Authority to create a CVE for a version of a product not immediately in their purview.