OASIS Common Security Advisory Framework (CSAF) TC

 View Only
  • 1.  E-Mail motion to progress the CSAF v2.0 Errata01-CSD01

    Posted 12-08-2023 17:13
    Dear members, I hereby submit the following motion and request that if seconded and no objection received per this list before one week has passed on 2023-12-15T18:00:00Z to automatically carry. The Chair will of course subsequently state the result per mail to this list when the period has passed. The motion can be superseded by a TC meeting with quorum within the period mentioned above. Stefan Hagen moves that the TC approve Common Security Advisory Framework Version 2.0 Errata 01 and all associated artifacts packaged together in [csaf-2_0-errata-01-csd-01-20231208-rc1.zip](https://www.oasis-open.org/committees/document.php?document_id=71571) as an Errata Draft to Common Security Advisory Framework Version 2.0 OASIS Standard approved on 18 November 2022 and confirm that the errata corrections do not constitute Substantive Changes to the Standard. Stefan Hagen further moves that the TC approve submitting Common Security Advisory Framework Version 2.0 Errata 01 contained in [csaf-2_0-errata-01-csd-01-20231208-rc1.zip](https://www.oasis-open.org/committees/document.php?document_id=71571) for 15 day public review. # SHA256 Checksums ## Archive fcce65c3905cd9685662f632313d608b5d345743db033241c52a56e71069bf48  csaf-2_0-errata-01-csd-01-20231208-rc1.zip ` ## Included Artifacts 6e76b27b9552168e756f4b1c8be0a9d43414338ee44793e55357869b86031242  aggregator_json_schema.json 29c114b35b0a30831f1674f2ab8b3ed9b2890cfeaa63b924ac6ed9d70ef44262  csaf_json_schema.json 716db1494b4843ae7ea7328122a1ff77387a728446b57c90950026581630e634  index.md 0270d0cfadf5202ff83a63502012a407e0e8ec3194a07296f13641c9f5630aba  provider_json_schema.json Cheers, Stefan. --- Stefan Hagen, Emmetten, Nidwalden, Switzerland. read: https://stefan-hagen.website write: stefan@hagen.link


  • 2.  FW: [csaf] E-Mail motion to progress the CSAF v2.0 Errata01-CSD01

    Posted 12-08-2023 17:17
    Dear colleagues, I, Thomas Schmidt, second both motions. Best wishes, Thomas -- Thomas Schmidt From: csaf@lists.oasis-open.org <csaf@lists.oasis-open.org> On Behalf Of Stefan Hagen Sent: Friday, December 8, 2023 6:13 PM To: csaf@lists.oasis-open.org Subject: [csaf] E-Mail motion to progress the CSAF v2.0 Errata01-CSD01 Dear members, I hereby submit the following motion and request that if seconded and no objection received per this list before one week has passed on 2023-12-15T18:00:00Z to automatically carry. The Chair will of course subsequently state the result per mail to this list when the period has passed. The motion can be superseded by a TC meeting with quorum within the period mentioned above. Stefan Hagen moves that the TC approve Common Security Advisory Framework Version 2.0 Errata 01 and all associated artifacts packaged together in [csaf-2_0-errata-01-csd-01-20231208-rc1.zip]( https://www.oasis-open.org/committees/document.php?document_id=71571 ) as an Errata Draft to Common Security Advisory Framework Version 2.0 OASIS Standard approved on 18 November 2022 and confirm that the errata corrections do not constitute Substantive Changes to the Standard. Stefan Hagen further moves that the TC approve submitting Common Security Advisory Framework Version 2.0 Errata 01 contained in [csaf-2_0-errata-01-csd-01-20231208-rc1.zip]( https://www.oasis-open.org/committees/document.php?document_id=71571 ) for 15 day public review. # SHA256 Checksums ## Archive fcce65c3905cd9685662f632313d608b5d345743db033241c52a56e71069bf48  csaf-2_0-errata-01-csd-01-20231208-rc1.zip ` ## Included Artifacts 6e76b27b9552168e756f4b1c8be0a9d43414338ee44793e55357869b86031242  aggregator_json_schema.json 29c114b35b0a30831f1674f2ab8b3ed9b2890cfeaa63b924ac6ed9d70ef44262  csaf_json_schema.json 716db1494b4843ae7ea7328122a1ff77387a728446b57c90950026581630e634  index.md 0270d0cfadf5202ff83a63502012a407e0e8ec3194a07296f13641c9f5630aba  provider_json_schema.json Cheers, Stefan. --- Stefan Hagen, Emmetten, Nidwalden, Switzerland. read: https://stefan-hagen.website write: mailto:stefan@hagen.link