oss-security Mailing List Charter

Group Purpose

The purpose of the Open Source Security (oss-security) group is to encourage public discussion of security flaws, concepts, and practices in the Open Source community. The members of this group include, but are not limited to Open Source projects, distributors, researchers, and developers.

List Membership and Moderation

Membership to this group is not formally restricted, but is targeted at Open Source Projects, Distributors, Researchers, and Developers.

Anyone can send mail to the mailing list at oss [dash] security [at] lists [dot] openwall [dot] com, regardless of membership status. Non-members, and new members will have their messages to the mailing list moderated to ensure that the discussions remain on topic and stay positive. Once a person has shown themselves to be a responsible community member, their messages to the list will no longer be moderated.

Anyone is welcome to subscribe to the mailing list by sending an empty message to oss [dash] security [dash] subscribe [at] lists [dot] openwall [dot] com or entering the e-mail address on the subscription page. You will be required to confirm your subscription by “replying” to the automated confirmation request that will be sent to you. You will be able to unsubscribe at any time and we will not use your e-mail address for any other purposes or share it with a third party. However, if you post to the list, other subscribers and those viewing the archives may see your address(es) as specified on your message.

Please note that registration on this wiki is distinct from mailing list subscription; you're not automatically subscribed when you register on the wiki.

A read-only archive of the discussions contained on the list is available to the general public locally, as well as via MARC and SecLists.Org (RSS feed). Additionally, there is Twitter account oss_security.

List Content Guidelines

  • English please
  • Plain text mail required (no HTML-only messages)
  • When applicable, the message Subject must include the name and version(s) of affected software, and vulnerability type. For example, a Subject saying only “CVE-2099-99999” is not appropriate, whereas “CVE-2099-99999: Acme Placeholder 1.0 buffer overflow” would be OK.
  • At least the most essential part of your message (e.g., vulnerability detail and/or exploit) should be directly included in the message itself (and in plain text), rather than only included by reference to an external resource. Posting links to relevant external resources as well is acceptable, but posting only links is not. Your message should remain valuable even with all of the external resources gone.
  • This is a security list. Try to stick to the topic of security without digressing into other aspects except as it might be necessary to discuss the security aspects in their proper context.
  • Please keep discussions relevant to Open Source software. This is not a list to discuss the behavior or problems with closed source software or companies.
  • Any security issues that you post to oss-security should be either already public or to be made public by your posting 1)
  • Security advisories aimed at end-users only are not welcome (e.g., those from a distribution vendor announcing new pre-built packages). There has to be desirable information for others in the Open Source community (e.g., an upstream maintainer may announce a new version of their software with security fixes to be picked up by distributors).
  • Occasional announcements of Open Source security tools (and relevant features of non-security tools) are acceptable, but only for initial announcements and major updates (not for minor updates). Especially desirable are news on tools/features aimed to enhance security of other Open Source software.
  • Please don't post conference CFPs, (e-)magazine calls for articles, and survey questionnaires. (These are generally cross-posted to lots of places, and oss-security list members have expressed that they do not want to see them here.)
  • Please don't cross-post messages to oss-security and other mailing lists at once, especially not to high-volume lists such as LKML and netdev, as this tends to result in threads that wander partially or fully off-topic (e.g., Linux kernel coding style detail may end up being discussed in comments to a patch posted to LKML, but it would be off-topic for oss-security). If you feel that something needs to be posted to oss-security and to another list, please make separate postings. You may mention the other posting(s) in your oss-security posting, and even link to other lists' archives.

CVE Requests

Previously, one could request CVE IDs for issues in Open Source software from oss-security. This is no longer the case. Instead, please start by posting about the (to be made) public issue to oss-security (without a CVE ID), request a CVE ID from MITRE directly, and finally “reply” to your own posting when you also have the CVE ID to add. With the described approach you would only approach MITRE after the issue is already public, but if you choose to do things differently and contact MITRE about an issue that is not yet public, then please do not disclose to them more than the absolute minimum needed for them to assign a CVE ID.

Contact Information

If you experience any problems with mailing list subscription or setup, or have suggestions on improving it, please contact us at listadmin [at] oss [dash] security [dot] openwall [dot] org.

1) Some kinds of embargoed information (intended for public disclosure in at most 2 weeks) may initially be disclosed to distros, but by doing so you accept responsibility to also bring the issue to oss-security, and in most cases you should just post to oss-security right away instead of ever posting to distros
mailing-lists/oss-security.txt · Last modified: 2024/02/28 03:54 by solar
Except where otherwise noted, content on this wiki is licensed under the following license: CC Attribution-Noncommercial-Share Alike 3.0 Unported
Recent changes RSS feed Donate to DokuWiki Powered by PHP Valid XHTML 1.0 Valid CSS Driven by DokuWiki Powered by OpenVZ Powered by Openwall GNU/*/Linux