[Secure-testing-commits] r2991 - doc

Moritz Muehlenhoff jmm-guest at costa.debian.org
Fri Dec 9 12:21:23 UTC 2005


Author: jmm-guest
Date: 2005-12-09 12:21:23 +0000 (Fri, 09 Dec 2005)
New Revision: 2991

Modified:
   doc/narrative_introduction
Log:
very nice document, I've added a remark about read-only access to
our data and documented the severities. (I guess this was the concensus
we had at Oldenburg, feel free to change/amend, especially the people
who couldn't be present in OL).
I'll add a chapter about the [sarge] tags later in the train.


Modified: doc/narrative_introduction
===================================================================
--- doc/narrative_introduction	2005-12-09 10:34:13 UTC (rev 2990)
+++ doc/narrative_introduction	2005-12-09 12:21:23 UTC (rev 2991)
@@ -60,6 +60,11 @@
 secure-testing. Inside this directory are a number of subdirectories.
 The data directory is where we do most of our work. 
 
+If you don't need write access, you can of course check out our files
+without an Alioth account as well:
+
+svn co svn://svn.debian.org/svn/secure-testing
+
 Automatic Issue Updates
 -----------------------
 Twice a day a cronjob runs that pulls down the latest full CVE lists
@@ -147,6 +152,25 @@
    - php4 <unfixed> (bug #353585; medium)
    - php5 <unfixed> (bug #353585; medium)
 
+Severity levels
+---------------
+These levels are mostly used to prioritize the order in which security
+problems are resolved. Anyway, we have a rough overview on how you should
+assess these levels:
+
+unimportant: This problem does not affect the Debian binary package, e.g.
+             a vulnerable file, which is not built or a vulnerable file
+             in doc/foo/examples/
+low        : A security problem, which has only mild security implications
+             and one would even be comfortable with if it continues to
+             be present
+medium     : A typical, exploitable security problem.
+high       : A typical, exploitable security problem, which you'll really
+             like to fix and at least implement a workaround. This could
+             be because the vulnerable code is very broadly used, because
+             an exploit is in the wild or because the attack vector is
+             very wide.
+
 NOTE and TODO entries
 ---------------------
 There are many instances where more work has to be done to determine




More information about the Secure-testing-commits mailing list