
Often projects have a security@ private list w/ just key core developers subscribed. I'm not fundamentally opposed to secalert being subscribed, but it does set a precedent that distros' security teams may expect to be involved rather than notified via somehting like oss-security.
Subscribing secalert allows us to handle reported issues in-confidence or under embargo. When security researchers who are practising responsible disclosure report issues, they often want the issue handled under embargo so that they can synchronize their own publication of the flaw with the release of a patch. There's no reason in my view that other distros' security teams can't be involved too, if they can handle issues under embargo. oss-security is publicly archived, so issues sent there can't be kept under embargo. Red Hat SRT has a set of tools that allow us to file tracking bugs for all versions of a product affected by a given flaw. Since most ovirt projects so far are using bugzilla, we can use these tools to file tracking bugs against the ovirt projects. By giving the direct feed of information to secalert, the ovirt projects will be getting triage and bug filing back, for free. Thanks David