[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Xen-devel] [PATCH SECURITY-POLICY 4/9] Use a public mailing list for predisclosure membership applications.



On Fri, 2015-01-16 at 19:52 +0000, Ian Jackson wrote:
> Signed-off-by: Ian Jackson <ijackson@xxxxxxxxxxxxxxxxxxxxxx>
> Signed-off-by: Ian Jackson <Ian.Jackson@xxxxxxxxxxxxx>
> ---
>  security_vulnerability_process.html |    5 +++--
>  1 file changed, 3 insertions(+), 2 deletions(-)
> 
> diff --git a/security_vulnerability_process.html 
> b/security_vulnerability_process.html
> index de5e83e..4fd02e9 100644
> --- a/security_vulnerability_process.html
> +++ b/security_vulnerability_process.html
> @@ -228,8 +228,9 @@ permitted to also make available the allocated CVE 
> number. This is no
>  longer permitted in accordance with MITRE policy.</p>
>  <h3>Predisclosure list membership application process</h3>
>  <p>Organisations who meet the criteria should contact
> -security@xenproject if they wish to receive pre-disclosure of
> -advisories. Please include in the e-mail:</p>
> +predisclosure-applications@xenproject if they wish to receive
                                        ^.org

> +pre-disclosure of advisories.  That is a public mailing list.

s/That/This/? Not sure.

> +<p>Please include in the e-mail:</p>
>  <ul>
>    <li>The name of your organization</li>
>    <li>A brief description of why you fit the criteria, along with



_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxx
http://lists.xen.org/xen-devel


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.