Movatterモバイル変換


[0]ホーム

URL:


Wayback Machine
239 captures
09 Apr 2018 - 21 Feb 2025
AprMAYAug
Previous capture23Next capture
202120222023
success
fail
COLLECTED BY
Collection:Common Crawl
Web crawl data from Common Crawl.
TIMESTAMPS
loading
The Wayback Machine - https://web.archive.org/web/20220523013345/https://openjdk.java.net/groups/vulnerability/

OpenJDK Vulnerability Group

The Vulnerability Group is a secure, private forum in whichtrusted members of the OpenJDK Community receive reports ofvulnerabilities in OpenJDK code bases, review them, collaborate onfixing them, and coordinate the release of such fixes. The Groupalso discusses other OpenJDK security-related issues, asneeded.

The current members of the Vulnerability Group arelisted in the census.

Vulnerability reports and advisories

Please see thereportinginstructions for information about how to report avulnerability.

Current and previousvulnerabilityadvisories are available for reference. You can receivenotifications of new advisories by subscribing to thevuln-announcemailing list.

Vulnerability Group membership

Membership in the Vulnerability Group is limited, due to thenature of its work. To become a Member of this Group, an OpenJDKContributor must:

New members may be voted in after the above criteria arevalidated by the Group Lead. Voting a new member into theVulnerability Group requires aThree-Vote Consensus rather thanthe weakerLazy Consensus usedfor ordinary Groups.

The Group Lead of the Vulnerability Group will initially andalways be appointed by Oracle.

Any decisions about the Group’s membership may, as usual,be appealed to theGoverning Board.

The special membership requirements of this Group wereapproved by the Governing Board in March 2018.

Making decisions

Decisions within the OpenJDK Vulnerability Group are made byrough consensus.If consensus cannot be reached on a particular issue then the GroupLead will make the decision. Any decision of the Group Lead may beappealed to the OpenJDK Lead.

Communication channels

The Vulnerability Group will shortly establish three mailinglists, each with a specific purpose:

The Vulnerability Group will make use of theJDK bug system (JBS) to storevulnerability reports and track the development of fixes. Onlymembers of the Vulnerability Group will have access to suchreports. Additional fields will be defined as needed for,e.g., CVE numbers and CVSS scores.

Communication policy

Members of the Vulnerability Group are expected to treatinformation about vulnerabilities as highly confidential untilpublicly disclosed.

A Group Member who works for a vendor organization that shipsproducts based upon an OpenJDK code base may share vulnerabilityinformation internally within that organization on a need-to-knowbasis, and may communicate such information back to the Group.

It may occasionally be necessary for the Vulnerability Group tocontact external security organizations (e.g., CERT), orvice-versa, or to exchange information with the submitter of avulnerability report, or to exchange information with themaintainers of implementations of the Java SE Platform that are notbased upon an OpenJDK code base. In such situations the Group Leadhandles the communication unless the Lead proposes, and there isrough consensus in support of, the delegation of a specificcommunication activity to another Group Member.

Members of the Vulnerability Group speak only for themselves, oras representatives of their respective employers. No VulnerabilityGroup member, not even the Lead, is authorized to speak on behalfof the Group, of any other OpenJDK Group or Project, or of theOpenJDK Community as a whole. The only exception to this rule isthat Vulnerability Group members may post announcements to thevuln-announce list in accordance with the decisions madewithin the Group.

Violation of this policy, as judged by the Group Lead, is causefor immediate removal from the Group.

Information flow

There will be a bi-directional flow of information between theOpenJDK Vulnerability Group (hereinafter “OJVG”) andOracle’s internal security teams. An Oracle engineer who is amember of the Vulnerability Group, though not necessarily the GroupLead, will facilitate this flow as follows:

TheOpenJDK Web Site Terms of Use willgovern the content of incoming vulnerability reports and anysubsequent discussion. Reports from submitters who insist on otherterms will not be accepted.

Work flow

Once a vulnerability is reported, the members of the OJVG worktogether as follows:

  1. Review and validate the vulnerability — Checkthat the report is complete, test the proof-of-concept if one wasprovided, assign it a CVSS score if it does not already have one,request a CVE identifier if needed, and create a JBS issue. If thereport was sent to the OpenJDKvuln-report list then sendan acknowledgement to the report’s submitter.

  2. Develop a fix — This can be done collaborativelyamongst OJVG members. OJVG members can also share proposed fixesdeveloped privately within their respective organizations, whichmay be further refined in OJVG discussions.

  3. Schedule a publication date — Once a fix issettled upon, OJVG members will agree on a publication date. Thedate should allow vendor organizations who are represented in theOJVG adequate time to make updates to affected products availableto their customers and end users. The publication date isconfidential until the date itself.

  4. Publish the vulnerability and its fix — On thepublication date the fix will be integrated into the affectedOpenJDK code bases and a high-level description of thevulnerability and its fix will be posted to the OpenJDKvuln-announce list.

Last update: 2022/1/31 22:17 UTC
OpenJDK logo
Installing
Contributing
Sponsoring
Developers' Guide
Vulnerabilities
JDK GA/EA Builds
Mailing lists
Wiki ·IRC
Bylaws ·Census
Legal
JEP Process
Source code
Mercurial
GitHub
Tools
Mercurial
Git
jtreg harness
Groups
(overview)
Adoption
Build
Client Libraries
Compatibility & Specification Review
Compiler
Conformance
Core Libraries
Governing Board
HotSpot
IDE Tooling & Support
Internationalization
JMX
Members
Networking
Porters
Quality
Security
Serviceability
Vulnerability
Web
Projects
(overview)
Amber
Annotations Pipeline 2.0
Audio Engine
Build Infrastructure
CRaC
Caciocavallo
Closures
Code Tools
Coin
Common VM Interface
Compiler Grammar
Detroit
Developers' Guide
Device I/O
Duke
Font Scaler
Framebuffer Toolkit
Graal
Graphics Rasterizer
HarfBuzz Integration
IcedTea
JDK 6
JDK 7
JDK 7 Updates
JDK 8
JDK 8 Updates
JDK 9
JDK (…17,18,19)
JDK Updates
JavaDoc.Next
Jigsaw
Kona
Kulla
Lambda
Lanai
Leyden
Lilliput
Locale Enhancement
Loom
Memory Model Update
Metropolis
Mission Control
Modules
Multi-Language VM
Nashorn
New I/O
OpenJFX
Panama
Penrose
Port: AArch32
Port: AArch64
Port: BSD
Port: Haiku
Port: Mac OS X
Port: MIPS
Port: Mobile
Port: PowerPC/AIX
Port: RISC-V
Port: s390x
Portola
SCTP
Shenandoah
Skara
Sumatra
ThreeTen
Tiered Attribution
Tsan
Type Annotations
XRender Pipeline
Valhalla
Verona
VisualVM
Wakefield
Zero
ZGC
Oracle logo
© 2022 Oracle Corporation and/or its affiliates
Terms of Use · License:GPLv2 ·Privacy ·Trademarks

[8]ページ先頭

©2009-2025 Movatter.jp