> On 22. May 2020, at 13:48, Jonathan Hall <fli...@flimzy.com> wrote:
>
> An alternative, if we think this is somehow too revealing, would be to
> include a generic "This may contain security-related fixes" blurb in _every_
> release announcement, to serve as a constant reminder that upgrading to the
> latest patch version is always wise.
>
> That said, I'm in favor of the proposed change. Anyone serious about
> exploiting security holes will already know, by watching the code changes
This reminded me of something. For a particularly egregious vulnerability that
we absolutely do not want to make public in advance, we have a fallback variant
of making a release off of a private branch. We have used this once in the
past. Give that we have that fallback, I’m +0.5 on making the change :)
I’m not sure the “might” message would do much good.
Best
Jan
–
> , so I see the upside of informing potential victims as much higher than any
> possible downside of informing bad actors.
>
> Maybe I'm overlooking something, though, so I'll keep my vote to +0 for now.
>
> Jonathan
>
>
> On 5/22/20 1:43 PM, Jan Lehnardt wrote:
>> I like the OpenSSL announcements and their categorisation. They allow me to
>> decide, whether I have to pencil in an upgrade for the date of the release
>> or not. So *if* we decide to do this, I’d advocate to include severity and
>> mitigation information in broad strokes at least.
>>
>> I’m +0 on making the change.
>>
>> Best
>> Jan
>> —
>>
>>> On 22. May 2020, at 13:38, Robert Samuel Newson <rnew...@apache.org> wrote:
>>>
>>> Hi All,
>>>
>>> We've just published a CVE and it made me think about our current
>>> announcement policy.
>>>
>>> Currently, when we receive notice of a security issue, the PMC investigate
>>> it, fix it if it's genuine, then we prepare and publish a release without
>>> mentioning the security issue. A week after publication we publish the CVE.
>>>
>>> I think we can do better. I follow haproxy and openssl announcements for
>>> security reasons and have found their early warning very helpful. I wonder
>>> if we can do something similar?
>>>
>>> My proposal is modest. Everything stays the same as today except we
>>> announce that there is a security fix in the release _at the time we
>>> publish it_. The details are withheld for the regular 7 day period.
>>>
>>> Are there objections to that step? Should we do more? Would it useful to
>>> categorise the security issue (low, medium, high. whether it is present in
>>> the default config. whether it can be mitigated without taking the upgrade)?
>>>
>>> B.
>>>