mirror of
https://git.yoctoproject.org/poky
synced 2026-01-29 21:08:42 +01:00
Add a new "Security" section
The current security-related documentation is a bit hard to find and hidden within the development manual. However these are processes that are not part of a development task but is rather a vulnerability reporting process. Create a new "Security" section in the documentation to gather this information. This will be directly visible in the sidebar when opening the documentation. Split the previous security-subjects.rst document into 2 documents: - security-team.rst: defines the roles of the security teams and its members. - reporting-vulnerabilities.rst: guide to report vulnerabilities to the security team. The plan is to backport these documents to active releases. As a consequence, this section should be free of instructions and information that only make sense for a specific release. It should _not_ contain documents on how to enable security features with Yocto on target devices, this is unrelated and can be left in the development manual (for example: dev-manual/vulnerabilities.rst to deal with CVEs). (From yocto-docs rev: 80556704f8b60b5bf903da497909cfda7dd1b28b) Signed-off-by: Antonin Godard <antonin.godard@bootlin.com> (cherry picked from commit 81e14ca2d5cff9e2104c556655144b069633790c) Signed-off-by: Antonin Godard <antonin.godard@bootlin.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
This commit is contained in:
committed by
Richard Purdie
parent
495e1c2ed0
commit
9b6d0d6e5a
@@ -41,7 +41,6 @@ Yocto Project Development Tasks Manual
|
|||||||
build-quality
|
build-quality
|
||||||
debugging
|
debugging
|
||||||
licenses
|
licenses
|
||||||
security-subjects
|
|
||||||
vulnerabilities
|
vulnerabilities
|
||||||
sbom
|
sbom
|
||||||
error-reporting-tool
|
error-reporting-tool
|
||||||
|
|||||||
@@ -1,194 +0,0 @@
|
|||||||
.. SPDX-License-Identifier: CC-BY-SA-2.0-UK
|
|
||||||
|
|
||||||
Dealing with Vulnerability Reports
|
|
||||||
**********************************
|
|
||||||
|
|
||||||
The Yocto Project and OpenEmbedded are open-source, community-based projects
|
|
||||||
used in numerous products. They assemble multiple other open-source projects,
|
|
||||||
and need to handle security issues and practices both internal (in the code
|
|
||||||
maintained by both projects), and external (maintained by other projects and
|
|
||||||
organizations).
|
|
||||||
|
|
||||||
This manual assembles security-related information concerning the whole
|
|
||||||
ecosystem. It includes information on reporting a potential security issue,
|
|
||||||
the operation of the YP Security team and how to contribute in the
|
|
||||||
related code. It is written to be useful for both security researchers and
|
|
||||||
YP developers.
|
|
||||||
|
|
||||||
How to report a potential security vulnerability?
|
|
||||||
=================================================
|
|
||||||
|
|
||||||
If you would like to report a public issue (for example, one with a released
|
|
||||||
CVE number), please report it using the
|
|
||||||
:yocto_bugs:`Security Bugzilla </enter_bug.cgi?product=Security>`.
|
|
||||||
|
|
||||||
If you are dealing with a not-yet-released issue, or an urgent one, please send
|
|
||||||
a message to security AT yoctoproject DOT org, including as many details as
|
|
||||||
possible: the layer or software module affected, the recipe and its version,
|
|
||||||
and any example code, if available. This mailing list is monitored by the
|
|
||||||
Yocto Project Security team.
|
|
||||||
|
|
||||||
For each layer, you might also look for specific instructions (if any) for
|
|
||||||
reporting potential security issues in the specific ``SECURITY.md`` file at the
|
|
||||||
root of the repository. Instructions on how and where submit a patch are
|
|
||||||
usually available in ``README.md``. If this is your first patch to the
|
|
||||||
Yocto Project/OpenEmbedded, you might want to have a look into the
|
|
||||||
Contributor's Manual section
|
|
||||||
":ref:`contributor-guide/submit-changes:preparing changes for submission`".
|
|
||||||
|
|
||||||
Branches maintained with security fixes
|
|
||||||
---------------------------------------
|
|
||||||
|
|
||||||
See the
|
|
||||||
:ref:`Release process <ref-manual/release-process:Stable Release Process>`
|
|
||||||
documentation for details regarding the policies and maintenance of stable
|
|
||||||
branches.
|
|
||||||
|
|
||||||
The :yocto_home:`Releases </development/releases/>` page contains a list of all
|
|
||||||
releases of the Yocto Project, grouped into current and previous releases.
|
|
||||||
Previous releases are no longer actively maintained with security patches, but
|
|
||||||
well-tested patches may still be accepted for them for significant issues.
|
|
||||||
|
|
||||||
Security-related discussions at the Yocto Project
|
|
||||||
-------------------------------------------------
|
|
||||||
|
|
||||||
We have set up two security-related emails/mailing lists:
|
|
||||||
|
|
||||||
- Public Mailing List: yocto [dash] security [at] yoctoproject[dot] org
|
|
||||||
|
|
||||||
This is a public mailing list for anyone to subscribe to. This list is an
|
|
||||||
open list to discuss public security issues/patches and security-related
|
|
||||||
initiatives. For more information, including subscription information,
|
|
||||||
please see the :yocto_lists:`yocto-security mailing list info page
|
|
||||||
</g/yocto-security>`.
|
|
||||||
|
|
||||||
This list requires moderator approval for new topics to be posted, to avoid
|
|
||||||
private security reports to be posted by mistake.
|
|
||||||
|
|
||||||
- Yocto Project Security Team: security [at] yoctoproject [dot] org
|
|
||||||
|
|
||||||
This is an email for reporting non-published potential vulnerabilities.
|
|
||||||
Emails sent to this address are forwarded to the Yocto Project Security
|
|
||||||
Team members.
|
|
||||||
|
|
||||||
|
|
||||||
What you should do if you find a security vulnerability
|
|
||||||
-------------------------------------------------------
|
|
||||||
|
|
||||||
If you find a security flaw: a crash, an information leakage, or anything that
|
|
||||||
can have a security impact if exploited in any Open Source software built or
|
|
||||||
used by the Yocto Project, please report this to the Yocto Project Security
|
|
||||||
Team. If you prefer to contact the upstream project directly, please send a
|
|
||||||
copy to the security team at the Yocto Project as well. If you believe this is
|
|
||||||
highly sensitive information, please report the vulnerability in a secure way,
|
|
||||||
i.e. encrypt the email and send it to the private list. This ensures that
|
|
||||||
the exploit is not leaked and exploited before a response/fix has been generated.
|
|
||||||
|
|
||||||
Security team
|
|
||||||
=============
|
|
||||||
|
|
||||||
The Yocto Project/OpenEmbedded security team coordinates the work on security
|
|
||||||
subjects in the project. All general discussion takes place publicly. The
|
|
||||||
Security Team only uses confidential communication tools to deal with private
|
|
||||||
vulnerability reports before they are released.
|
|
||||||
|
|
||||||
Security team appointment
|
|
||||||
-------------------------
|
|
||||||
|
|
||||||
The Yocto Project Security Team consists of at least three members. When new
|
|
||||||
members are needed, the Yocto Project Technical Steering Committee (YP TSC)
|
|
||||||
asks for nominations by public channels including a nomination deadline.
|
|
||||||
Self-nominations are possible. When the limit time is
|
|
||||||
reached, the YP TSC posts the list of candidates for the comments of project
|
|
||||||
participants and developers. Comments may be sent publicly or privately to the
|
|
||||||
YP and OE TSCs. The candidates are approved by both YP TSC and OpenEmbedded
|
|
||||||
Technical Steering Committee (OE TSC) and the final list of the team members
|
|
||||||
is announced publicly. The aim is to have people representing technical
|
|
||||||
leadership, security knowledge and infrastructure present with enough people
|
|
||||||
to provide backup/coverage but keep the notification list small enough to
|
|
||||||
minimize information risk and maintain trust.
|
|
||||||
|
|
||||||
YP Security Team members may resign at any time.
|
|
||||||
|
|
||||||
Security Team Operations
|
|
||||||
------------------------
|
|
||||||
|
|
||||||
The work of the Security Team might require high confidentiality. Team members
|
|
||||||
are individuals selected by merit and do not represent the companies they work
|
|
||||||
for. They do not share information about confidential issues outside of the team
|
|
||||||
and do not hint about ongoing embargoes.
|
|
||||||
|
|
||||||
Team members can bring in domain experts as needed. Those people should be
|
|
||||||
added to individual issues only and adhere to the same standards as the YP
|
|
||||||
Security Team.
|
|
||||||
|
|
||||||
The YP security team organizes its meetings and communication as needed.
|
|
||||||
|
|
||||||
When the YP Security team receives a report about a potential security
|
|
||||||
vulnerability, they quickly analyze and notify the reporter of the result.
|
|
||||||
They might also request more information.
|
|
||||||
|
|
||||||
If the issue is confirmed and affects the code maintained by the YP, they
|
|
||||||
confidentially notify maintainers of that code and work with them to prepare
|
|
||||||
a fix.
|
|
||||||
|
|
||||||
If the issue is confirmed and affects an upstream project, the YP security team
|
|
||||||
notifies the project. Usually, the upstream project analyzes the problem again.
|
|
||||||
If they deem it a real security problem in their software, they develop and
|
|
||||||
release a fix following their security policy. They may want to include the
|
|
||||||
original reporter in the loop. There is also sometimes some coordination for
|
|
||||||
handling patches, backporting patches etc, or just understanding the problem
|
|
||||||
or what caused it.
|
|
||||||
|
|
||||||
When the fix is publicly available, the YP security team member or the
|
|
||||||
package maintainer sends patches against the YP code base, following usual
|
|
||||||
procedures, including public code review.
|
|
||||||
|
|
||||||
What Yocto Security Team does when it receives a security vulnerability
|
|
||||||
-----------------------------------------------------------------------
|
|
||||||
|
|
||||||
The YP Security Team team performs a quick analysis and would usually report
|
|
||||||
the flaw to the upstream project. Normally the upstream project analyzes the
|
|
||||||
problem. If they deem it a real security problem in their software, they
|
|
||||||
develop and release a fix following their own security policy. They may want
|
|
||||||
to include the original reporter in the loop. There is also sometimes some
|
|
||||||
coordination for handling patches, backporting patches etc, or just
|
|
||||||
understanding the problem or what caused it.
|
|
||||||
|
|
||||||
The security policy of the upstream project might include a notification to
|
|
||||||
Linux distributions or other important downstream projects in advance to
|
|
||||||
discuss coordinated disclosure. These mailing lists are normally non-public.
|
|
||||||
|
|
||||||
When the upstream project releases a version with the fix, they are responsible
|
|
||||||
for contacting `Mitre <https://www.cve.org/>`__ to get a CVE number assigned and
|
|
||||||
the CVE record published.
|
|
||||||
|
|
||||||
If an upstream project does not respond quickly
|
|
||||||
-----------------------------------------------
|
|
||||||
|
|
||||||
If an upstream project does not fix the problem in a reasonable time,
|
|
||||||
the Yocto's Security Team will contact other interested parties (usually
|
|
||||||
other distributions) in the community and together try to solve the
|
|
||||||
vulnerability as quickly as possible.
|
|
||||||
|
|
||||||
The Yocto Project Security team adheres to the 90 days disclosure policy
|
|
||||||
by default. An increase of the embargo time is possible when necessary.
|
|
||||||
|
|
||||||
Current Security Team members
|
|
||||||
-----------------------------
|
|
||||||
|
|
||||||
For secure communications, please send your messages encrypted using the GPG
|
|
||||||
keys. Remember, message headers are not encrypted so do not include sensitive
|
|
||||||
information in the subject line.
|
|
||||||
|
|
||||||
- Ross Burton: <ross@burtonini.com> `Public key <https://keys.openpgp.org/search?q=ross%40burtonini.com>`__
|
|
||||||
|
|
||||||
- Michael Halstead: <mhalstead [at] linuxfoundation [dot] org>
|
|
||||||
`Public key <https://pgp.mit.edu/pks/lookup?op=vindex&search=0x3373170601861969>`__
|
|
||||||
or `Public key <https://keyserver.ubuntu.com/pks/lookup?op=get&search=0xd1f2407285e571ed12a407a73373170601861969>`__
|
|
||||||
|
|
||||||
- Richard Purdie: <richard.purdie@linuxfoundation.org> `Public key <https://keys.openpgp.org/search?q=richard.purdie%40linuxfoundation.org>`__
|
|
||||||
|
|
||||||
- Marta Rybczynska: <marta DOT rybczynska [at] syslinbit [dot] com> `Public key <https://keys.openpgp.org/search?q=marta.rybczynska@syslinbit.com>`__
|
|
||||||
|
|
||||||
- Steve Sakoman: <steve [at] sakoman [dot] com> `Public key <https://keys.openpgp.org/search?q=steve%40sakoman.com>`__
|
|
||||||
@@ -20,7 +20,6 @@ Welcome to the Yocto Project Documentation
|
|||||||
Yocto Project Software Overview <https://www.yoctoproject.org/software-overview/>
|
Yocto Project Software Overview <https://www.yoctoproject.org/software-overview/>
|
||||||
Tips and Tricks Wiki <https://wiki.yoctoproject.org/wiki/TipsAndTricks>
|
Tips and Tricks Wiki <https://wiki.yoctoproject.org/wiki/TipsAndTricks>
|
||||||
|
|
||||||
|
|
||||||
.. toctree::
|
.. toctree::
|
||||||
:maxdepth: 1
|
:maxdepth: 1
|
||||||
:caption: Manuals
|
:caption: Manuals
|
||||||
@@ -37,6 +36,12 @@ Welcome to the Yocto Project Documentation
|
|||||||
Test Environment Manual <test-manual/index>
|
Test Environment Manual <test-manual/index>
|
||||||
bitbake
|
bitbake
|
||||||
|
|
||||||
|
.. toctree::
|
||||||
|
:maxdepth: 1
|
||||||
|
:caption: Security
|
||||||
|
|
||||||
|
Yocto Project Security Reference <security-reference/index>
|
||||||
|
|
||||||
.. toctree::
|
.. toctree::
|
||||||
:maxdepth: 1
|
:maxdepth: 1
|
||||||
:caption: Release Manuals
|
:caption: Release Manuals
|
||||||
|
|||||||
@@ -274,7 +274,7 @@ New Features / Enhancements in 4.3
|
|||||||
|
|
||||||
- New :doc:`../contributor-guide/index` document.
|
- New :doc:`../contributor-guide/index` document.
|
||||||
|
|
||||||
- New :doc:`../dev-manual/security-subjects` chapter in the Development
|
- New "Dealing with Vulnerability Reports" chapter in the Development
|
||||||
Tasks Manual.
|
Tasks Manual.
|
||||||
|
|
||||||
- Long overdue documentation for the :ref:`ref-classes-devicetree` class.
|
- Long overdue documentation for the :ref:`ref-classes-devicetree` class.
|
||||||
|
|||||||
14
documentation/security-reference/index.rst
Normal file
14
documentation/security-reference/index.rst
Normal file
@@ -0,0 +1,14 @@
|
|||||||
|
.. SPDX-License-Identifier: CC-BY-SA-2.0-UK
|
||||||
|
|
||||||
|
================================
|
||||||
|
Yocto Project Security Reference
|
||||||
|
================================
|
||||||
|
|
||||||
|
.. toctree::
|
||||||
|
:caption: Table of Contents
|
||||||
|
:numbered:
|
||||||
|
|
||||||
|
security-team
|
||||||
|
reporting-vulnerabilities
|
||||||
|
|
||||||
|
.. include:: /boilerplate.rst
|
||||||
@@ -0,0 +1,85 @@
|
|||||||
|
.. SPDX-License-Identifier: CC-BY-SA-2.0-UK
|
||||||
|
|
||||||
|
Reporting Vulnerabilities
|
||||||
|
*************************
|
||||||
|
|
||||||
|
The Yocto Project and OpenEmbedded are open-source, community-based projects
|
||||||
|
used in numerous products. They assemble multiple other open-source projects,
|
||||||
|
and need to handle security issues and practices both internal (in the code
|
||||||
|
maintained by both projects), and external (maintained by other projects and
|
||||||
|
organizations).
|
||||||
|
|
||||||
|
This manual assembles security-related information concerning the whole
|
||||||
|
ecosystem. It includes information on reporting a potential security issue,
|
||||||
|
the operation of the YP Security team and how to contribute in the
|
||||||
|
related code. It is written to be useful for both security researchers and
|
||||||
|
YP developers.
|
||||||
|
|
||||||
|
How to report a potential security vulnerability?
|
||||||
|
=================================================
|
||||||
|
|
||||||
|
If you would like to report a public issue (for example, one with a released
|
||||||
|
CVE number), please report it using the
|
||||||
|
:yocto_bugs:`Security Bugzilla </enter_bug.cgi?product=Security>`.
|
||||||
|
|
||||||
|
If you are dealing with a not-yet-released issue, or an urgent one, please send
|
||||||
|
a message to security AT yoctoproject DOT org, including as many details as
|
||||||
|
possible: the layer or software module affected, the recipe and its version,
|
||||||
|
and any example code, if available. This mailing list is monitored by the
|
||||||
|
Yocto Project Security team.
|
||||||
|
|
||||||
|
For each layer, you might also look for specific instructions (if any) for
|
||||||
|
reporting potential security issues in the specific ``SECURITY.md`` file at the
|
||||||
|
root of the repository. Instructions on how and where submit a patch are
|
||||||
|
usually available in ``README.md``. If this is your first patch to the
|
||||||
|
Yocto Project/OpenEmbedded, you might want to have a look into the
|
||||||
|
Contributor's Manual section
|
||||||
|
":ref:`contributor-guide/submit-changes:preparing changes for submission`".
|
||||||
|
|
||||||
|
Branches maintained with security fixes
|
||||||
|
---------------------------------------
|
||||||
|
|
||||||
|
See the
|
||||||
|
:ref:`Release process <ref-manual/release-process:Stable Release Process>`
|
||||||
|
documentation for details regarding the policies and maintenance of stable
|
||||||
|
branches.
|
||||||
|
|
||||||
|
The :yocto_home:`Releases </development/releases/>` page contains a list of all
|
||||||
|
releases of the Yocto Project, grouped into current and previous releases.
|
||||||
|
Previous releases are no longer actively maintained with security patches, but
|
||||||
|
well-tested patches may still be accepted for them for significant issues.
|
||||||
|
|
||||||
|
Security-related discussions at the Yocto Project
|
||||||
|
-------------------------------------------------
|
||||||
|
|
||||||
|
We have set up two security-related emails/mailing lists:
|
||||||
|
|
||||||
|
- Public Mailing List: yocto [dash] security [at] yoctoproject[dot] org
|
||||||
|
|
||||||
|
This is a public mailing list for anyone to subscribe to. This list is an
|
||||||
|
open list to discuss public security issues/patches and security-related
|
||||||
|
initiatives. For more information, including subscription information,
|
||||||
|
please see the :yocto_lists:`yocto-security mailing list info page
|
||||||
|
</g/yocto-security>`.
|
||||||
|
|
||||||
|
This list requires moderator approval for new topics to be posted, to avoid
|
||||||
|
private security reports to be posted by mistake.
|
||||||
|
|
||||||
|
- Yocto Project Security Team: security [at] yoctoproject [dot] org
|
||||||
|
|
||||||
|
This is an email for reporting non-published potential vulnerabilities.
|
||||||
|
Emails sent to this address are forwarded to the Yocto Project Security
|
||||||
|
Team members.
|
||||||
|
|
||||||
|
|
||||||
|
What you should do if you find a security vulnerability
|
||||||
|
-------------------------------------------------------
|
||||||
|
|
||||||
|
If you find a security flaw: a crash, an information leakage, or anything that
|
||||||
|
can have a security impact if exploited in any Open Source software built or
|
||||||
|
used by the Yocto Project, please report this to the Yocto Project Security
|
||||||
|
Team. If you prefer to contact the upstream project directly, please send a
|
||||||
|
copy to the security team at the Yocto Project as well. If you believe this is
|
||||||
|
highly sensitive information, please report the vulnerability in a secure way,
|
||||||
|
i.e. encrypt the email and send it to the private list. This ensures that
|
||||||
|
the exploit is not leaked and exploited before a response/fix has been generated.
|
||||||
110
documentation/security-reference/security-team.rst
Normal file
110
documentation/security-reference/security-team.rst
Normal file
@@ -0,0 +1,110 @@
|
|||||||
|
.. SPDX-License-Identifier: CC-BY-SA-2.0-UK
|
||||||
|
|
||||||
|
Security team
|
||||||
|
*************
|
||||||
|
|
||||||
|
The Yocto Project/OpenEmbedded security team coordinates the work on security
|
||||||
|
subjects in the project. All general discussion takes place publicly. The
|
||||||
|
Security Team only uses confidential communication tools to deal with private
|
||||||
|
vulnerability reports before they are released.
|
||||||
|
|
||||||
|
Security team appointment
|
||||||
|
=========================
|
||||||
|
|
||||||
|
The Yocto Project Security Team consists of at least three members. When new
|
||||||
|
members are needed, the Yocto Project Technical Steering Committee (YP TSC)
|
||||||
|
asks for nominations by public channels including a nomination deadline.
|
||||||
|
Self-nominations are possible. When the limit time is
|
||||||
|
reached, the YP TSC posts the list of candidates for the comments of project
|
||||||
|
participants and developers. Comments may be sent publicly or privately to the
|
||||||
|
YP and OE TSCs. The candidates are approved by both YP TSC and OpenEmbedded
|
||||||
|
Technical Steering Committee (OE TSC) and the final list of the team members
|
||||||
|
is announced publicly. The aim is to have people representing technical
|
||||||
|
leadership, security knowledge and infrastructure present with enough people
|
||||||
|
to provide backup/coverage but keep the notification list small enough to
|
||||||
|
minimize information risk and maintain trust.
|
||||||
|
|
||||||
|
YP Security Team members may resign at any time.
|
||||||
|
|
||||||
|
Security Team Operations
|
||||||
|
========================
|
||||||
|
|
||||||
|
The work of the Security Team might require high confidentiality. Team members
|
||||||
|
are individuals selected by merit and do not represent the companies they work
|
||||||
|
for. They do not share information about confidential issues outside of the team
|
||||||
|
and do not hint about ongoing embargoes.
|
||||||
|
|
||||||
|
Team members can bring in domain experts as needed. Those people should be
|
||||||
|
added to individual issues only and adhere to the same standards as the YP
|
||||||
|
Security Team.
|
||||||
|
|
||||||
|
The YP security team organizes its meetings and communication as needed.
|
||||||
|
|
||||||
|
When the YP Security team receives a report about a potential security
|
||||||
|
vulnerability, they quickly analyze and notify the reporter of the result.
|
||||||
|
They might also request more information.
|
||||||
|
|
||||||
|
If the issue is confirmed and affects the code maintained by the YP, they
|
||||||
|
confidentially notify maintainers of that code and work with them to prepare
|
||||||
|
a fix.
|
||||||
|
|
||||||
|
If the issue is confirmed and affects an upstream project, the YP security team
|
||||||
|
notifies the project. Usually, the upstream project analyzes the problem again.
|
||||||
|
If they deem it a real security problem in their software, they develop and
|
||||||
|
release a fix following their security policy. They may want to include the
|
||||||
|
original reporter in the loop. There is also sometimes some coordination for
|
||||||
|
handling patches, backporting patches etc, or just understanding the problem
|
||||||
|
or what caused it.
|
||||||
|
|
||||||
|
When the fix is publicly available, the YP security team member or the
|
||||||
|
package maintainer sends patches against the YP code base, following usual
|
||||||
|
procedures, including public code review.
|
||||||
|
|
||||||
|
What Yocto Security Team does when it receives a security vulnerability
|
||||||
|
=======================================================================
|
||||||
|
|
||||||
|
The YP Security Team team performs a quick analysis and would usually report
|
||||||
|
the flaw to the upstream project. Normally the upstream project analyzes the
|
||||||
|
problem. If they deem it a real security problem in their software, they
|
||||||
|
develop and release a fix following their own security policy. They may want
|
||||||
|
to include the original reporter in the loop. There is also sometimes some
|
||||||
|
coordination for handling patches, backporting patches etc, or just
|
||||||
|
understanding the problem or what caused it.
|
||||||
|
|
||||||
|
The security policy of the upstream project might include a notification to
|
||||||
|
Linux distributions or other important downstream projects in advance to
|
||||||
|
discuss coordinated disclosure. These mailing lists are normally non-public.
|
||||||
|
|
||||||
|
When the upstream project releases a version with the fix, they are responsible
|
||||||
|
for contacting `Mitre <https://www.cve.org/>`__ to get a CVE number assigned and
|
||||||
|
the CVE record published.
|
||||||
|
|
||||||
|
If an upstream project does not respond quickly
|
||||||
|
===============================================
|
||||||
|
|
||||||
|
If an upstream project does not fix the problem in a reasonable time,
|
||||||
|
the Yocto's Security Team will contact other interested parties (usually
|
||||||
|
other distributions) in the community and together try to solve the
|
||||||
|
vulnerability as quickly as possible.
|
||||||
|
|
||||||
|
The Yocto Project Security team adheres to the 90 days disclosure policy
|
||||||
|
by default. An increase of the embargo time is possible when necessary.
|
||||||
|
|
||||||
|
Security Team Members
|
||||||
|
=====================
|
||||||
|
|
||||||
|
For secure communications, please send your messages encrypted using the GPG
|
||||||
|
keys. Remember, message headers are not encrypted so do not include sensitive
|
||||||
|
information in the subject line.
|
||||||
|
|
||||||
|
- Ross Burton: <ross [at] burtonini [dot] com> `Public key <https://keys.openpgp.org/search?q=ross%40burtonini.com>`__
|
||||||
|
|
||||||
|
- Michael Halstead: <mhalstead [at] linuxfoundation [dot] org>
|
||||||
|
`Public key <https://pgp.mit.edu/pks/lookup?op=vindex&search=0x3373170601861969>`__
|
||||||
|
or `Public key <https://keyserver.ubuntu.com/pks/lookup?op=get&search=0xd1f2407285e571ed12a407a73373170601861969>`__
|
||||||
|
|
||||||
|
- Richard Purdie: <richard.purdie [at] linuxfoundation [dot] org> `Public key <https://keys.openpgp.org/search?q=richard.purdie%40linuxfoundation.org>`__
|
||||||
|
|
||||||
|
- Marta Rybczynska: <marta DOT rybczynska [at] syslinbit [dot] com> `Public key <https://keys.openpgp.org/search?q=marta.rybczynska@syslinbit.com>`__
|
||||||
|
|
||||||
|
- Steve Sakoman: <steve [at] sakoman [dot] com> `Public key <https://keys.openpgp.org/search?q=steve%40sakoman.com>`__
|
||||||
Reference in New Issue
Block a user