Projects
Eulaceura:Factory
tpm2-tss-engine
_service:obs_scm:SECURITY.md
Sign Up
Log In
Username
Password
Overview
Repositories
Revisions
Requests
Users
Attributes
Meta
File _service:obs_scm:SECURITY.md of Package tpm2-tss-engine
# Security Policy ## Supported Versions Currently supported versions: | Version | Supported | | ------- | ------------------ | | any | :white_check_mark: | ## Reporting a Vulnerability ### Reporting Security vulnerabilities can be disclosed in one of two ways: - GitHub: *preferred* By following [these](https://docs.github.com/en/code-security/security-advisories/guidance-on-reporting-and-writing/privately-reporting-a-security-vulnerability) instructions. - Email: A descirption *should be emailed* to **all** members of the [MAINTAINERS](MAINTAINERS) file to coordinate the disclosure of the vulnerability. ### Tracking When a maintainer is notified of a security vulnerability, they *must* create a GitHub security advisory per the instructions at: - <https://docs.github.com/en/code-security/repository-security-advisories/about-github-security-advisories-for-repositories> Maintainers *should* use the optional feature through GitHub to request a CVE be issued, alternatively RedHat has provided CVE's in the past and *may* be used, but preference is on GitHub as the issuing CNA. ### Publishing Once ready, maintainers should publish the security vulnerability as outlined in: - <https://docs.github.com/en/code-security/repository-security-advisories/publishing-a-repository-security-advisory> As well as ensuring the publishing of the CVE, maintainers *shal*l have new release versions ready to publish at the same time as the CVE. Maintainers *should* should strive to adhere to a sub 60 say turn around from report to release.
Locations
Projects
Search
Status Monitor
Help
Open Build Service
OBS Manuals
API Documentation
OBS Portal
Reporting a Bug
Contact
Mailing List
Forums
Chat (IRC)
Twitter
Open Build Service (OBS)
is an
openSUSE project
.
浙ICP备2022010568号-2