Skip to content

Commit b59e69f

Browse files
sethmlarsonhugovk
andauthored
Apply suggestions from code review
Co-authored-by: Hugo van Kemenade <1324225+hugovk@users.noreply.github.com>
1 parent d244891 commit b59e69f

File tree

1 file changed

+27
-17
lines changed

1 file changed

+27
-17
lines changed

peps/pep-0811.rst

Lines changed: 27 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -2,9 +2,12 @@ PEP: 811
22
Title: Defining Python Security Response Team membership and responsibilities
33
Author: Seth Michael Larson <seth@python.org>
44
Sponsor: Gregory P. Smith <greg@krypto.org>
5+
Discussions-To: Pending
56
Status: Draft
67
Type: Process
8+
Topic: Governance
79
Created: 22-Oct-2025
10+
Post-History: Pending
811

912
Abstract
1013
========
@@ -248,23 +251,30 @@ Therefore, vulnerability reporting has additional requirements for PSF staff
248251
detailed in CRA `Article 24 <https://eur-lex.europa.eu/legal-content/EN/TXT/HTML/?uri=OJ:L_202402847#art_24>`_.
249252
These requirements can be summarized as:
250253

251-
➤ Maintain a vulnerability disclosure policy fostering the voluntary reporting of vulnerabilities.
252-
The policy shall include aspects related to documenting, addressing, and remediating vulnerabilities
253-
and promote the sharing of information concerning discovered vulnerabilities within the open-source community.
254-
255-
➤ Cooperate with EU market surveillance authorities (ENISA and CSIRTs) to
256-
mitigate cybersecurity risks.
257-
258-
➤ If a vulnerability is **known to be actively exploited** EU market surveillance
259-
authorities must be notified through the Single Reporting Platform (SRP)
260-
within the following timelines:
261-
262-
* **Within 24 hours of becoming aware of an actively exploited vulnerability:** submit an early warning notification.
263-
* **Within 72 hours of becoming aware of an actively exploited vulnerability:** submit general information,
264-
the product, general nature of the exploit and vulnerability, and mitigating measures taking or mitigating measures that users can take.
265-
* **Within 14 days after a corrective or mitigating measure is available:** a final report including a description
266-
of the vulnerability including severity and impact, information concerning any malicious actor, and details
267-
about the security update or other corrective measures available to remedy the vulnerability.
254+
* Maintain a vulnerability disclosure policy fostering the voluntary reporting
255+
of vulnerabilities. The policy shall include aspects related to documenting,
256+
addressing, and remediating vulnerabilities and promote the sharing of
257+
information concerning discovered vulnerabilities within the open-source
258+
community.
259+
260+
* Cooperate with EU market surveillance authorities (ENISA and CSIRTs) to
261+
mitigate cybersecurity risks.
262+
263+
* If a vulnerability is **known to be actively exploited** EU market
264+
surveillance authorities must be notified through the Single Reporting
265+
Platform (SRP) within the following timelines:
266+
267+
* **Within 24 hours of becoming aware of an actively exploited
268+
vulnerability:** submit an early warning notification.
269+
* **Within 72 hours of becoming aware of an actively exploited
270+
vulnerability:** submit general information,
271+
the product, general nature of the exploit and vulnerability, and
272+
mitigating measures taking or mitigating measures that users can take.
273+
* **Within 14 days after a corrective or mitigating measure is available:** a
274+
final report including a description of the vulnerability including
275+
severity and impact, information concerning any malicious actor, and details
276+
about the security update or other corrective measures available to remedy
277+
the vulnerability.
268278

269279
Note that these additional responsibilities don't apply to all members of the
270280
PSRT, only to PSF staff.

0 commit comments

Comments
 (0)