[Secure-testing-commits] r11279 - doc
fw at alioth.debian.org
fw at alioth.debian.org
Fri Feb 27 19:17:21 UTC 2009
Author: fw
Date: 2009-02-27 19:17:20 +0000 (Fri, 27 Feb 2009)
New Revision: 11279
Modified:
doc/narrative_introduction
Log:
CVE-20yy-XXXX documentation
Feel free to edit if necessary.
Modified: doc/narrative_introduction
===================================================================
--- doc/narrative_introduction 2009-02-27 19:08:32 UTC (rev 11278)
+++ doc/narrative_introduction 2009-02-27 19:17:20 UTC (rev 11279)
@@ -297,6 +297,30 @@
NOTE: Bug was introduced in a patch to squid-2.5.STABLE10,
NOTE: this patch was never applied to the Debian package.
+CVE assignments
+---------------
+
+Debian can only assign CVE names from its own pool for issues which
+are not public. To request a CVE from the Debian pool, write to
+<security at debian.org> and include a description which follows CVE
+conventions. To request a CVE for public issues, write to MITRE and
+possibly to the moderated oss-security list. In the meantime, you can
+add an entry of the form
+
+CVE-2009-XXXX [optipng array overflow]
+ - optipng 0.6.2.1-1 (low)
+ NOTE: http://secunia.com/advisories/34035/
+
+in the data/CVE/list file. It is desirable to include references
+which uniquely identify the issue, such as a permanent link to an
+entry in the upstream bug tracker, or a bug in the Debian BTS. If the
+issue is likely present in unstable, a bug should be filed to help the
+maintainer to track it.
+
+Lack of CVE entries should not block advisory publication which are
+otherwise ready, but we should strieve to release fully
+cross-referenced advisories nevertheless.
+
Distribution tags
-----------------
Our data is primarily targeted at sid, as we track the version that
@@ -412,5 +436,4 @@
TODO:
document DTSAs
document tsck
-document CVE-XXXX
document tracked tag
More information about the Secure-testing-commits
mailing list