Lexmark XC4342 Security White Paper - Page 8

Lexmark Secure Software Development Lifecycle SSDL, Systems CVSS.

Page 8 highlights

Lexmark Secure Software Development Lifecycle (SSDL) 8 3 If yes to 2 step then, the security bug is scored using the industry standard Common Vulnerability Scoring Systems (CVSS). Note: The severity score published in a technical alert can score differently in specific implementations. 4 Internal processes are initiated to log, track, patch, and test the bug fix, and an updated code is provided through a patch process. 5 If the CVSS score warrants, Lexmark issues a security advisory for the products affected. For Lexmark security advisories, go to https://support.lexmark.com/alerts To submit a potential vulnerability or concern to the team, an e-mail is sent to [email protected]. This submission form allows for direct communication with our subject matter experts. We then follow our standard vulnerability process to assign severity and timelines for resolution.

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64

3
If yes to 2 step then, the security bug is scored using the industry standard Common Vulnerability Scoring
Systems (CVSS).
Note:
The severity score published in a technical alert can score differently in specific implementations.
4
Internal processes are initiated to log, track, patch, and test the bug fix, and an updated code is provided
through a patch process.
5
If the CVSS score warrants, Lexmark issues a security advisory for the products affected.
For Lexmark security advisories, go to
To submit a potential vulnerability or concern to the team, an e-mail is sent to
.
This submission form allows for direct communication with our subject matter experts. We then follow our
standard vulnerability process to assign severity and timelines for resolution.
Lexmark Secure Software Development Lifecycle (SSDL)
8