| 10 | |
| 11 | === Preparing Security Announcements === |
| 12 | |
| 13 | Part of the release-notes of patch-level releases (such as !QtWebKit-2.2.1, !QtWebKit-2.2.2, etc) should be dedicated to the security problems which have been fixed. It's standard procedure to include a list of security issues fixed (including the CVE Id) and give credit to the researchers who discovered and reported it. |
| 14 | |
| 15 | Examples of security announcements: |
| 16 | * [http://googlechromereleases.blogspot.com/2011/08/stable-channel-update_22.html Google Chrome] |
| 17 | * [http://support.apple.com/kb/HT4808 Apple Safari] |
| 18 | |
| 19 | The list of security bugs fixed in the branch since the last release can be extracted from the git changelog using the {{{cherry-pick-into-release-branch.py}}} script. For example, to extract a list of all security issues fixed from the tag {{{qtwebkit-2.2.0}}} until now: |
| 20 | (notice you'll need proper bugzilla privileges) |
| 21 | |
| 22 | {{{ |
| 23 | $ cherry-pick-into-release-branch.py --no-git-pull --list-only --security-bugs-from qtwebkit-2.2.0.. |
| 24 | }}} |
| 25 | |
| 26 | With this list in hand, we can go to Bugzilla and find out, manually: |
| 27 | * The CVE Id of the issue; |
| 28 | * The researchers who should receive credit; |
| 29 | |
| 30 | Once the release notes is ready, it should be sent to the [mailto:security@webkit.org WebKit Security Mailing List] for peer review. Preferably one or two days before making it public. |
| 31 | |
| 32 | Exceptions should always be discussed in the [mailto:security@webkit.org WebKit Security Mailing List]. |