Francesco Servidio | 4b2f9ce | 2021-11-04 10:53:56 +0100 | [diff] [blame] | 1 | # Project security policy |
David Brown | 0d98a9c | 2019-10-02 13:59:42 -0600 | [diff] [blame] | 2 | |
| 3 | The MCUboot team takes security, vulnerabilities, and weaknesses |
| 4 | seriously. |
| 5 | |
Francesco Servidio | 4b2f9ce | 2021-11-04 10:53:56 +0100 | [diff] [blame] | 6 | ## Reporting security issues |
| 7 | |
David Brown | 2c1c5d1 | 2023-06-14 10:06:33 -0600 | [diff] [blame^] | 8 | The preferred way to report security issues with MCUboot is via the "Report a |
| 9 | security vulnerability" button on the main [security |
| 10 | page](https://github.com/mcu-tools/mcuboot/security). |
| 11 | |
| 12 | You can also directly contact the following maintainers of the project: |
David Brown | 0d98a9c | 2019-10-02 13:59:42 -0600 | [diff] [blame] | 13 | |
| 14 | - David Brown: davidb@davidb.org or david.brown@linaro.org |
| 15 | - Fabio Utzig: utzig@apache.org |
| 16 | |
Francesco Servidio | 4b2f9ce | 2021-11-04 10:53:56 +0100 | [diff] [blame] | 17 | If you wish to send an encrypted email, you may use these PGP keys: |
David Brown | 37b96e7 | 2019-10-08 09:59:55 -0600 | [diff] [blame] | 18 | |
Francesco Servidio | 4b2f9ce | 2021-11-04 10:53:56 +0100 | [diff] [blame] | 19 | ``` |
David Brown | 0d98a9c | 2019-10-02 13:59:42 -0600 | [diff] [blame] | 20 | pub rsa4096 2011-10-14 [SC] |
| 21 | DAFD760825AE2636AEA9CB19E6BA9F5C5E54DF82 |
| 22 | uid [ultimate] David Brown <davidb@davidb.org> |
| 23 | uid [ultimate] David Brown <david.brown@linaro.org> |
| 24 | sub rsa4096 2011-10-14 [E] |
Francesco Servidio | 4b2f9ce | 2021-11-04 10:53:56 +0100 | [diff] [blame] | 25 | ``` |
David Brown | 0d98a9c | 2019-10-02 13:59:42 -0600 | [diff] [blame] | 26 | |
| 27 | and |
| 28 | |
Francesco Servidio | 4b2f9ce | 2021-11-04 10:53:56 +0100 | [diff] [blame] | 29 | ``` |
David Brown | 0d98a9c | 2019-10-02 13:59:42 -0600 | [diff] [blame] | 30 | pub rsa4096 2017-07-28 [SC] |
| 31 | 126087C7E725625BC7E89CC7537097EDFD4A7339 |
| 32 | uid [ unknown] Fabio Utzig <utzig@apache.org> |
| 33 | uid [ unknown] Fabio Utzig <utzig@utzig.org> |
| 34 | sub rsa4096 2017-07-28 [E] |
Francesco Servidio | 4b2f9ce | 2021-11-04 10:53:56 +0100 | [diff] [blame] | 35 | ``` |
David Brown | 0d98a9c | 2019-10-02 13:59:42 -0600 | [diff] [blame] | 36 | |
| 37 | Please include the word "SECURITY" as well as "MCUboot" in the subject |
Francesco Servidio | 4b2f9ce | 2021-11-04 10:53:56 +0100 | [diff] [blame] | 38 | of any message. |
David Brown | 0d98a9c | 2019-10-02 13:59:42 -0600 | [diff] [blame] | 39 | |
Francesco Servidio | 4b2f9ce | 2021-11-04 10:53:56 +0100 | [diff] [blame] | 40 | We will make our best effort to respond in a timely manner. Most |
David Brown | 0d98a9c | 2019-10-02 13:59:42 -0600 | [diff] [blame] | 41 | vulnerabilities found within published code will undergo an embargo of |
| 42 | 90 days to allow time fixes to be developed and deployed. |
| 43 | |
Francesco Servidio | 5bc9832 | 2021-11-03 13:19:22 +0100 | [diff] [blame] | 44 | ## Vulnerability advisories |
David Brown | 0d98a9c | 2019-10-02 13:59:42 -0600 | [diff] [blame] | 45 | |
| 46 | Vulnerability reports and published fixes will be reported as follows: |
| 47 | |
Francesco Servidio | 4b2f9ce | 2021-11-04 10:53:56 +0100 | [diff] [blame] | 48 | - Issues will be entered into MCUboot's [security advisory |
| 49 | system](https://github.com/mcu-tools/mcuboot/security/advisories) on GitHub, with |
David Brown | 0d98a9c | 2019-10-02 13:59:42 -0600 | [diff] [blame] | 50 | the interested parties (including the reporter) added as viewers. |
| 51 | |
| 52 | - The release notes will contain a reference to any allocated CVE(s). |
| 53 | |
Francesco Servidio | 4b2f9ce | 2021-11-04 10:53:56 +0100 | [diff] [blame] | 54 | - When the embargo is lifted, the security advisory page will be made |
David Brown | 0d98a9c | 2019-10-02 13:59:42 -0600 | [diff] [blame] | 55 | public, and the public CVE database will be updated with all |
| 56 | relevant information. |