[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] Security vulnerability process, and CVE-2012-0217
>>> On 29.06.12 at 12:26, George Dunlap <George.Dunlap@xxxxxxxxxxxxx> wrote: > On Wed, Jun 20, 2012 at 9:49 AM, Jan Beulich <JBeulich@xxxxxxxx> wrote: >> As to downstreams, I think only direct ones should be involved in >> any decision making processes. Indirect ones might be allowed on >> the list, but exclusively as observers. Mis-use of the observer role >> (e.g. as in influencing those participating in decision making in >> undue ways), should it become known, should result in removal of >> list membership. > > Do we have an outline of who should decide that someone has mis-used > their role, what kind of appeal process there is (if any), and when > and under what conditions a person or organization can be reinstated > to the list? If common sense can't be applied here (and from how subsequent discussion went I'm afraid it can't be), I don't think we can come up with a definition that can't be put under attack by someone for what would appear to be not completely illegitimate reasons. Jan _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxx http://lists.xen.org/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |