|
1 | 1 | # Project security policy |
2 | 2 |
|
3 | | -The MCUboot team takes security, vulnerabilities, and weaknesses |
4 | | -seriously. |
| 3 | +The MCUboot project uses the [TrustedFirmware.org security |
| 4 | +policy](https://www.trustedfirmware.org/.well-known/security.txt). |
5 | 5 |
|
6 | | -## Reporting security issues |
| 6 | +## Reporting security vulnerabilities |
7 | 7 |
|
8 | | -The preferred way to report security issues with MCUboot is via the "Report a |
9 | | -security vulnerability" button on the main [security |
10 | | -page](https://github.com/mcu-tools/mcuboot/security). |
| 8 | +The preferred way to report a security vulnerability with MCUboot is via the |
| 9 | +"Report a vulnerability" button on the main [security page |
| 10 | +](https://github.com/mcu-tools/mcuboot/security). |
11 | 11 |
|
12 | | -You can also directly contact the following maintainers of the project: |
13 | | - |
14 | | -- David Brown: davidb@davidb.org or david.brown@linaro.org |
15 | | -- Fabio Utzig: utzig@apache.org |
16 | | - |
17 | | -If you wish to send an encrypted email, you may use these PGP keys: |
18 | | - |
19 | | -``` |
20 | | - pub rsa4096 2011-10-14 [SC] |
21 | | - DAFD760825AE2636AEA9CB19E6BA9F5C5E54DF82 |
22 | | - uid [ultimate] David Brown <davidb@davidb.org> |
23 | | - uid [ultimate] David Brown <david.brown@linaro.org> |
24 | | - sub rsa4096 2011-10-14 [E] |
25 | | -``` |
26 | | - |
27 | | -and |
28 | | - |
29 | | -``` |
30 | | - pub rsa4096 2017-07-28 [SC] |
31 | | - 126087C7E725625BC7E89CC7537097EDFD4A7339 |
32 | | - uid [ unknown] Fabio Utzig <utzig@apache.org> |
33 | | - uid [ unknown] Fabio Utzig <utzig@utzig.org> |
34 | | - sub rsa4096 2017-07-28 [E] |
35 | | -``` |
36 | | - |
37 | | -Please include the word "SECURITY" as well as "MCUboot" in the subject |
| 12 | +You can also email the MCUboot security team at |
| 13 | +mcuboot-security@lists.trustedfirmware.org as per the TrustedFirmware.org |
| 14 | +policy. Please include the word "SECURITY" as well as "MCUboot" in the subject |
38 | 15 | of any message. |
39 | 16 |
|
40 | | -We will make our best effort to respond in a timely manner. Most |
41 | | -vulnerabilities found within published code will undergo an embargo of |
42 | | -90 days to allow time fixes to be developed and deployed. |
43 | | - |
44 | | -## Vulnerability advisories |
| 17 | +## Disclosure |
45 | 18 |
|
46 | | -Vulnerability reports and published fixes will be reported as follows: |
| 19 | +Any confirmed security vulnerability will be disclosed to Trusted Stakeholders |
| 20 | +as per the TrustedFirmware.org policy. |
47 | 21 |
|
48 | | -- Issues will be entered into MCUboot's [security advisory |
49 | | - system](https://github.com/mcu-tools/mcuboot/security/advisories) on GitHub, with |
50 | | - the interested parties (including the reporter) added as viewers. |
| 22 | +A draft advisory and vulnerability fix will be created in MCUboot's [security |
| 23 | +advisory system](https://github.com/mcu-tools/mcuboot/security/advisories) on |
| 24 | +GitHub, with any interested Trusted Stakeholders and the reporter added as |
| 25 | +viewers. |
51 | 26 |
|
52 | | -- The release notes will contain a reference to any allocated CVE(s). |
| 27 | +On the public disclosure date, the security advisory page will be made public, |
| 28 | +and the public CVE database will be updated with all relevant information. |
53 | 29 |
|
54 | | -- When the embargo is lifted, the security advisory page will be made |
55 | | - public, and the public CVE database will be updated with all |
56 | | - relevant information. |
| 30 | +The release notes of the next MCUboot release will refer to any allocated |
| 31 | +CVE(s). |
0 commit comments