Input Provide detailed security information and a dedicated security mailing list

Maarten

Golden Pleskian
Plesk Guru
When Plesk sends a notification about a “critical security update”, the only information we receive is the short message shown on the changelog. There is no CVE, no affected component, and no severity score.

Looking at the inf3 files in the autoinstall directory, it’s difficult to determine which specific change addresses the reported security issue. The files often cover many package updates at once, making it unclear what the actual security fix is.

For a professional control panel in this price range, this level of detail feels insufficient. Server administrators need this information to:
  • Understand the actual risk
  • Plan maintenance properly
  • Decide how urgent an update really is
  • Check whether existing security measures already cover the issue
Most software vendors and control panel providers share basic security details, such as:
  • CVE identifiers
  • Affected components
  • CVSS scores
  • A short description of the impact
Possible improvements:
  1. Publish a short security bulletin for each critical update
  2. Offer a dedicated mailing list for security announcements
  3. Add at least CVE references and affected components to the release notes
Right now, administrators either have to apply updates without knowing what’s being fixed, or manually inspect inf3 files. Neither is ideal for managing production systems.

A security mailing list would help all administrators, regardless of how their license was purchased, and would make security notifications easier to follow.
This would be a simple but meaningful improvement.
 
Back
Top