2019-10-03 03:59:42 +08:00
|
|
|
# MCUboot project security policy
|
|
|
|
|
2021-11-03 20:19:22 +08:00
|
|
|
## Reporting security issues
|
2019-10-03 03:59:42 +08:00
|
|
|
|
|
|
|
The MCUboot team takes security, vulnerabilities, and weaknesses
|
|
|
|
seriously.
|
|
|
|
|
|
|
|
Security issues should be sent to the current maintainers of the
|
|
|
|
project:
|
|
|
|
|
|
|
|
- David Brown: davidb@davidb.org or david.brown@linaro.org
|
|
|
|
- Fabio Utzig: utzig@apache.org
|
|
|
|
|
2019-10-08 23:59:55 +08:00
|
|
|
If you wish to send encrypted email, you may use these PGP keys:
|
|
|
|
|
2019-10-03 03:59:42 +08:00
|
|
|
pub rsa4096 2011-10-14 [SC]
|
|
|
|
DAFD760825AE2636AEA9CB19E6BA9F5C5E54DF82
|
|
|
|
uid [ultimate] David Brown <davidb@davidb.org>
|
|
|
|
uid [ultimate] David Brown <david.brown@linaro.org>
|
|
|
|
sub rsa4096 2011-10-14 [E]
|
|
|
|
|
|
|
|
and
|
|
|
|
|
|
|
|
pub rsa4096 2017-07-28 [SC]
|
|
|
|
126087C7E725625BC7E89CC7537097EDFD4A7339
|
|
|
|
uid [ unknown] Fabio Utzig <utzig@apache.org>
|
|
|
|
uid [ unknown] Fabio Utzig <utzig@utzig.org>
|
|
|
|
sub rsa4096 2017-07-28 [E]
|
|
|
|
|
|
|
|
Please include the word "SECURITY" as well as "MCUboot" in the subject
|
|
|
|
of any messages.
|
|
|
|
|
|
|
|
We will make our best effort to respond within a timely manner. Most
|
|
|
|
vulnerabilities found within published code will undergo an embargo of
|
|
|
|
90 days to allow time fixes to be developed and deployed.
|
|
|
|
|
2021-11-03 20:19:22 +08:00
|
|
|
## Vulnerability advisories
|
2019-10-03 03:59:42 +08:00
|
|
|
|
|
|
|
Vulnerability reports and published fixes will be reported as follows:
|
|
|
|
|
|
|
|
- Issues will be entered into Github's [Security Advisory
|
2020-11-10 23:35:04 +08:00
|
|
|
system](https://github.com/mcu-tools/mcuboot/security/advisories), with
|
2019-10-03 03:59:42 +08:00
|
|
|
the interested parties (including the reporter) added as viewers.
|
|
|
|
|
|
|
|
- The release notes will contain a reference to any allocated CVE(s).
|
|
|
|
|
|
|
|
- When any embargo is lifted, the Security Advisory page will be made
|
|
|
|
public, and the public CVE database will be updated with all
|
|
|
|
relevant information.
|