All of lore.kernel.org
 help / color / mirror / Atom feed
* [PATCH] Add SECURITY.md
@ 2023-10-17 15:25 Marta Rybczynska
  2023-10-17 21:50 ` [OE-core] " Richard Purdie
  0 siblings, 1 reply; 4+ messages in thread
From: Marta Rybczynska @ 2023-10-17 15:25 UTC (permalink / raw)
  To: openembedded-core; +Cc: Marta Rybczynska, Marta Rybczynska

Add a SECURITY.md filr with hints for security researchers and other
parties who might report potential security vulnerabilities.

Signed-off-by: Marta Rybczynska <marta.rybczynska@syslinbit.com>
---
 SECURITY.md | 17 +++++++++++++++++
 1 file changed, 17 insertions(+)
 create mode 100644 SECURITY.md

diff --git a/SECURITY.md b/SECURITY.md
new file mode 100644
index 0000000000..900da76e59
--- /dev/null
+++ b/SECURITY.md
@@ -0,0 +1,17 @@
+How to Report a Vulnerability?
+==============================
+
+Please send a message to security AT yoctoproject DOT org, including as many details
+as possible: the layer or software module affected, the recipe and its version,
+and any example code, if available.
+
+Branches maintained with security fixes
+---------------------------------------
+
+See [https://wiki.yoctoproject.org/wiki/Stable_Release_and_LTS Stable release and LTS]
+for detailed info regarding the policies and maintenance of Stable branch.
+
+The [https://wiki.yoctoproject.org/wiki/Releases Release page] contains a list of all
+releases of the Yocto Project. Versions in grey are no longer actively maintained with
+security patches, but well-tested patches may still be accepted for them for
+significant issues.
-- 
2.39.2



^ permalink raw reply related	[flat|nested] 4+ messages in thread

* Re: [OE-core] [PATCH] Add SECURITY.md
  2023-10-17 15:25 [PATCH] Add SECURITY.md Marta Rybczynska
@ 2023-10-17 21:50 ` Richard Purdie
  2023-10-18  5:03   ` Marta Rybczynska
  0 siblings, 1 reply; 4+ messages in thread
From: Richard Purdie @ 2023-10-17 21:50 UTC (permalink / raw)
  To: Marta Rybczynska, openembedded-core; +Cc: Marta Rybczynska

On Tue, 2023-10-17 at 17:25 +0200, Marta Rybczynska wrote:
> Add a SECURITY.md filr with hints for security researchers and other
> parties who might report potential security vulnerabilities.
> 
> Signed-off-by: Marta Rybczynska <marta.rybczynska@syslinbit.com>
> ---
>  SECURITY.md | 17 +++++++++++++++++
>  1 file changed, 17 insertions(+)
>  create mode 100644 SECURITY.md
> 
> diff --git a/SECURITY.md b/SECURITY.md
> new file mode 100644
> index 0000000000..900da76e59
> --- /dev/null
> +++ b/SECURITY.md
> @@ -0,0 +1,17 @@
> +How to Report a Vulnerability?
> +==============================
> +
> +Please send a message to security AT yoctoproject DOT org, including as many details
> +as possible: the layer or software module affected, the recipe and its version,
> +and any example code, if available.

Rather than send everyone to the security address, can we suggest
bugzilla as the first port of call for anything public knowledge and
less urgent and to only to use the security address for non-public or
urgent issues?

We do have the ability to mark bugs as security and private and then
triage unlocks them too.

Cheers,

Richard


^ permalink raw reply	[flat|nested] 4+ messages in thread

* Re: [OE-core] [PATCH] Add SECURITY.md
  2023-10-17 21:50 ` [OE-core] " Richard Purdie
@ 2023-10-18  5:03   ` Marta Rybczynska
  2023-10-19 10:30     ` Richard Purdie
  0 siblings, 1 reply; 4+ messages in thread
From: Marta Rybczynska @ 2023-10-18  5:03 UTC (permalink / raw)
  To: Richard Purdie; +Cc: openembedded-core, Marta Rybczynska

On Tue, Oct 17, 2023 at 11:50 PM Richard Purdie
<richard.purdie@linuxfoundation.org> wrote:
>
> On Tue, 2023-10-17 at 17:25 +0200, Marta Rybczynska wrote:
> > Add a SECURITY.md filr with hints for security researchers and other
> > parties who might report potential security vulnerabilities.
> >
> > Signed-off-by: Marta Rybczynska <marta.rybczynska@syslinbit.com>
> > ---
> >  SECURITY.md | 17 +++++++++++++++++
> >  1 file changed, 17 insertions(+)
> >  create mode 100644 SECURITY.md
> >
> > diff --git a/SECURITY.md b/SECURITY.md
> > new file mode 100644
> > index 0000000000..900da76e59
> > --- /dev/null
> > +++ b/SECURITY.md
> > @@ -0,0 +1,17 @@
> > +How to Report a Vulnerability?
> > +==============================
> > +
> > +Please send a message to security AT yoctoproject DOT org, including as many details
> > +as possible: the layer or software module affected, the recipe and its version,
> > +and any example code, if available.
>
> Rather than send everyone to the security address, can we suggest
> bugzilla as the first port of call for anything public knowledge and
> less urgent and to only to use the security address for non-public or
> urgent issues?
>
> We do have the ability to mark bugs as security and private and then
> triage unlocks them too.
>

Absolutely. I will be sending a v2 to OE-core only. When we agree on this one,
I will send it also to other layers. As they might come in different
combinations,
a SECURITY.md for each layer (like README) gives us best visibility.

Regards,
Marta


^ permalink raw reply	[flat|nested] 4+ messages in thread

* Re: [OE-core] [PATCH] Add SECURITY.md
  2023-10-18  5:03   ` Marta Rybczynska
@ 2023-10-19 10:30     ` Richard Purdie
  0 siblings, 0 replies; 4+ messages in thread
From: Richard Purdie @ 2023-10-19 10:30 UTC (permalink / raw)
  To: Marta Rybczynska; +Cc: openembedded-core, Marta Rybczynska, Steve Sakoman

On Wed, 2023-10-18 at 07:03 +0200, Marta Rybczynska wrote:
> On Tue, Oct 17, 2023 at 11:50 PM Richard Purdie
> <richard.purdie@linuxfoundation.org> wrote:
> > 
> > On Tue, 2023-10-17 at 17:25 +0200, Marta Rybczynska wrote:
> > > Add a SECURITY.md filr with hints for security researchers and other
> > > parties who might report potential security vulnerabilities.
> > > 
> > > Signed-off-by: Marta Rybczynska <marta.rybczynska@syslinbit.com>
> > > ---
> > >  SECURITY.md | 17 +++++++++++++++++
> > >  1 file changed, 17 insertions(+)
> > >  create mode 100644 SECURITY.md
> > > 
> > > diff --git a/SECURITY.md b/SECURITY.md
> > > new file mode 100644
> > > index 0000000000..900da76e59
> > > --- /dev/null
> > > +++ b/SECURITY.md
> > > @@ -0,0 +1,17 @@
> > > +How to Report a Vulnerability?
> > > +==============================
> > > +
> > > +Please send a message to security AT yoctoproject DOT org, including as many details
> > > +as possible: the layer or software module affected, the recipe and its version,
> > > +and any example code, if available.
> > 
> > Rather than send everyone to the security address, can we suggest
> > bugzilla as the first port of call for anything public knowledge and
> > less urgent and to only to use the security address for non-public or
> > urgent issues?
> > 
> > We do have the ability to mark bugs as security and private and then
> > triage unlocks them too.
> > 
> 
> Absolutely. I will be sending a v2 to OE-core only. When we agree on this one,
> I will send it also to other layers. As they might come in different
> combinations,
> a SECURITY.md for each layer (like README) gives us best visibility.

I'm happy with the OE-Core v2 so plan to merge that to the nanbield and
master branches even if we've built rc1. I'm assuming Steve will add to
the LTS branches too?

Cheers,

Richard


^ permalink raw reply	[flat|nested] 4+ messages in thread

end of thread, other threads:[~2023-10-19 10:30 UTC | newest]

Thread overview: 4+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2023-10-17 15:25 [PATCH] Add SECURITY.md Marta Rybczynska
2023-10-17 21:50 ` [OE-core] " Richard Purdie
2023-10-18  5:03   ` Marta Rybczynska
2023-10-19 10:30     ` Richard Purdie

This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.