[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[Qemu-security] QEMU Vulnerability Pre Disclosure List
From: |
Lev Lazinskiy |
Subject: |
[Qemu-security] QEMU Vulnerability Pre Disclosure List |
Date: |
Wed, 27 May 2015 13:19:26 -0400 |
User-agent: |
Mozilla/5.0 (Macintosh; Intel Mac OS X 10.10; rv:31.0) Gecko/20100101 Thunderbird/31.7.0 |
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
Good afternoon,
My name is Lev and I am writing on behalf of the Linode Security Team.
I am wondering if there is a QEMU Vulernability Pre-Disclosure list
that allows Infrastructure providers to take action during an embargo
period in the event of a vulnerability similar to what the Xen project
has. If so, what is the process for getting added to it?
I have read through the QEMU Security wiki
http://wiki.qemu.org/SecurityProcess and I am not able to see anything
regarding this type of list.
- --
Best,
Lev Lazinskiy
Linode Security Team
-----BEGIN PGP SIGNATURE-----
Comment: GPGTools - https://gpgtools.org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=Y9aW
-----END PGP SIGNATURE-----
[Prev in Thread] |
Current Thread |
[Next in Thread] |
- [Qemu-security] QEMU Vulnerability Pre Disclosure List,
Lev Lazinskiy <=