| .. SPDX-License-Identifier: CC-BY-SA-2.0-UK |
| |
| Reporting Vulnerabilities |
| ************************* |
| |
| The Yocto Project and OpenEmbedded are open-source, community-based projects |
| used in numerous products. They assemble multiple other open-source projects, |
| and need to handle security issues and practices both internal (in the code |
| maintained by both projects), and external (maintained by other projects and |
| organizations). |
| |
| This manual assembles security-related information concerning the whole |
| ecosystem. It includes information on reporting a potential security issue, |
| the operation of the YP Security team and how to contribute in the |
| related code. It is written to be useful for both security researchers and |
| YP developers. |
| |
| How to report a potential security vulnerability? |
| ================================================= |
| |
| If you would like to report a public issue (for example, one with a released |
| CVE number), please report it using the |
| :yocto_bugs:`Security Bugzilla </enter_bug.cgi?product=Security>`. |
| |
| If you are dealing with a not-yet-released issue, or an urgent one, please send |
| a message to security AT yoctoproject DOT org, including as many details as |
| possible: the layer or software module affected, the recipe and its version, |
| and any example code, if available. This mailing list is monitored by the |
| Yocto Project Security team. |
| |
| For each layer, you might also look for specific instructions (if any) for |
| reporting potential security issues in the specific ``SECURITY.md`` file at the |
| root of the repository. Instructions on how and where submit a patch are |
| usually available in ``README.md``. If this is your first patch to the |
| Yocto Project/OpenEmbedded, you might want to have a look into the |
| Contributor's Manual section |
| ":ref:`contributor-guide/submit-changes:preparing changes for submission`". |
| |
| Branches maintained with security fixes |
| --------------------------------------- |
| |
| See the |
| :ref:`Release process <ref-manual/release-process:Stable Release Process>` |
| documentation for details regarding the policies and maintenance of stable |
| branches. |
| |
| The :yocto_home:`Releases </development/releases/>` page contains a list of all |
| releases of the Yocto Project, grouped into current and previous releases. |
| Previous releases are no longer actively maintained with security patches, but |
| well-tested patches may still be accepted for them for significant issues. |
| |
| Security-related discussions at the Yocto Project |
| ------------------------------------------------- |
| |
| We have set up two security-related emails/mailing lists: |
| |
| - Public Mailing List: yocto [dash] security [at] yoctoproject[dot] org |
| |
| This is a public mailing list for anyone to subscribe to. This list is an |
| open list to discuss public security issues/patches and security-related |
| initiatives. For more information, including subscription information, |
| please see the :yocto_lists:`yocto-security mailing list info page |
| </g/yocto-security>`. |
| |
| This list requires moderator approval for new topics to be posted, to avoid |
| private security reports to be posted by mistake. |
| |
| - Yocto Project Security Team: security [at] yoctoproject [dot] org |
| |
| This is an email for reporting non-published potential vulnerabilities. |
| Emails sent to this address are forwarded to the Yocto Project Security |
| Team members. |
| |
| |
| What you should do if you find a security vulnerability |
| ------------------------------------------------------- |
| |
| If you find a security flaw: a crash, an information leakage, or anything that |
| can have a security impact if exploited in any Open Source software built or |
| used by the Yocto Project, please report this to the Yocto Project Security |
| Team. If you prefer to contact the upstream project directly, please send a |
| copy to the security team at the Yocto Project as well. If you believe this is |
| highly sensitive information, please report the vulnerability in a secure way, |
| i.e. encrypt the email and send it to the private list. This ensures that |
| the exploit is not leaked and exploited before a response/fix has been generated. |