should not make available, even to their own customers and partners:<ul>
<li>the Xen.org advisory</li>
<li>their own advisory</li>
+ <li>the impact, scope, set of vulnerable systems or the nature
+ of the vulnerability</li>
<li>revision control commits which are a fix for the problem</li>
<li>patched software (even in binary form) without prior consultation with security@xen and/or the discoverer.</li>
</ul></p>
+ <p>List members are allowed to make available to their users only the following:<ul>
+ <li>The existance of an issue</li>
+ <li>The assigned XSA and CVE numbers</li>
+ <li>The planned disclosure date</li>
+ </ul></p>
+
<p>Organisations who meet the criteria should contact security@xen if they wish to receive pre-disclosure of advisories.</p>
<p>The pre-disclosure list will also receive copies of public advisories when they are first issued or updated.</p>