|
1 | 1 | # Project security policy
|
2 | 2 |
|
3 |
| -The MCUboot team takes security, vulnerabilities, and weaknesses |
4 |
| -seriously. |
| 3 | +The MCUboot project uses the [TrustedFirmware.org security |
| 4 | +policy](https://www.trustedfirmware.org/.well-known/security.txt). |
5 | 5 |
|
6 |
| -## Reporting security issues |
| 6 | +## Reporting security vulnerabilities |
7 | 7 |
|
8 |
| -The preferred way to report security issues with MCUboot is via the "Report a |
9 |
| -security vulnerability" button on the main [security |
10 |
| -page](https://github.com/mcu-tools/mcuboot/security). |
| 8 | +The preferred way to report a security vulnerability with MCUboot is via the |
| 9 | +"Report a vulnerability" button on the main [security page |
| 10 | +](https://github.com/mcu-tools/mcuboot/security). |
11 | 11 |
|
12 |
| -You can also directly contact the following maintainers of the project: |
13 |
| - |
14 |
| - |
15 |
| - |
16 |
| - |
17 |
| -If you wish to send an encrypted email, you may use these PGP keys: |
18 |
| - |
19 |
| -``` |
20 |
| - pub rsa4096 2011-10-14 [SC] |
21 |
| - DAFD760825AE2636AEA9CB19E6BA9F5C5E54DF82 |
22 |
| - uid [ultimate] David Brown <[email protected]> |
23 |
| - uid [ultimate] David Brown <[email protected]> |
24 |
| - sub rsa4096 2011-10-14 [E] |
25 |
| -``` |
26 |
| - |
27 |
| -and |
28 |
| - |
29 |
| -``` |
30 |
| - pub rsa4096 2017-07-28 [SC] |
31 |
| - 126087C7E725625BC7E89CC7537097EDFD4A7339 |
32 |
| - uid [ unknown] Fabio Utzig <[email protected]> |
33 |
| - uid [ unknown] Fabio Utzig <[email protected]> |
34 |
| - sub rsa4096 2017-07-28 [E] |
35 |
| -``` |
36 |
| - |
37 |
| -Please include the word "SECURITY" as well as "MCUboot" in the subject |
| 12 | +You can also email the MCUboot security team at |
| 13 | +[email protected] as per the TrustedFirmware.org |
| 14 | +policy. Please include the word "SECURITY" as well as "MCUboot" in the subject |
38 | 15 | of any message.
|
39 | 16 |
|
40 |
| -We will make our best effort to respond in a timely manner. Most |
41 |
| -vulnerabilities found within published code will undergo an embargo of |
42 |
| -90 days to allow time fixes to be developed and deployed. |
43 |
| - |
44 |
| -## Vulnerability advisories |
| 17 | +## Disclosure |
45 | 18 |
|
46 |
| -Vulnerability reports and published fixes will be reported as follows: |
| 19 | +Any confirmed security vulnerability will be disclosed to Trusted Stakeholders |
| 20 | +as per the TrustedFirmware.org policy. |
47 | 21 |
|
48 |
| -- Issues will be entered into MCUboot's [security advisory |
49 |
| - system](https://github.com/mcu-tools/mcuboot/security/advisories) on GitHub, with |
50 |
| - the interested parties (including the reporter) added as viewers. |
| 22 | +A draft advisory and vulnerability fix will be created in MCUboot's [security |
| 23 | +advisory system](https://github.com/mcu-tools/mcuboot/security/advisories) on |
| 24 | +GitHub, with any interested Trusted Stakeholders and the reporter added as |
| 25 | +viewers. |
51 | 26 |
|
52 |
| -- The release notes will contain a reference to any allocated CVE(s). |
| 27 | +On the public disclosure date, the security advisory page will be made public, |
| 28 | +and the public CVE database will be updated with all relevant information. |
53 | 29 |
|
54 |
| -- When the embargo is lifted, the security advisory page will be made |
55 |
| - public, and the public CVE database will be updated with all |
56 |
| - relevant information. |
| 30 | +The release notes of the next MCUboot release will refer to any allocated |
| 31 | +CVE(s). |
0 commit comments