You are viewing a plain text version of this content. The canonical link for it is here.
Posted to cvs@httpd.apache.org by co...@apache.org on 2023/01/17 19:12:11 UTC

svn commit: r1906749 - /httpd/dev-tools/release/README

Author: covener
Date: Tue Jan 17 19:12:11 2023
New Revision: 1906749

URL: http://svn.apache.org/viewvc?rev=1906749&view=rev
Log:
clarify for V5

Modified:
    httpd/dev-tools/release/README

Modified: httpd/dev-tools/release/README
URL: http://svn.apache.org/viewvc/httpd/dev-tools/release/README?rev=1906749&r1=1906748&r2=1906749&view=diff
==============================================================================
--- httpd/dev-tools/release/README (original)
+++ httpd/dev-tools/release/README Tue Jan 17 19:12:11 2023
@@ -41,11 +41,11 @@ Usage overview:
      - set CVEs to READY on the cveprocess site
      - Use the 'OSS/ASF Emails' tab for the emails you should send to oss-security
        and to Apache lists.
-     - Fill in a 'reference' type 'CONFIRM' with the URL to your public post about
-       this issue. ASF Security will be notified and will submit to the CVE
+     - Fill in a 'reference' tag 'vendor-advisory' with the URL to your public post about
+       this issue.  A link to https://httpd.apache.org/security/vulnerabilities_24.html is sufficient.
+     - ASF Security will be notified and will submit to the CVE
        project and then set state to 'PUBLIC'.
 
-
  On vote failure or when aborting for other reasons:
    > $DEV_TOOLS/release/reset-candidate.sh version
      # removes all additions to SVN repositories and clears local dist