Home
last modified time | relevance | path

Searched full:security (Results 1 – 25 of 1615) sorted by relevance

12345678910>>...65

/openbmc/openbmc/meta-security/recipes-core/packagegroup/
H A Dpackagegroup-core-security.bb1 DESCRIPTION = "Security packagegroup for Poky"
9 packagegroup-core-security \
10 packagegroup-security-utils \
11 packagegroup-security-scanners \
12 packagegroup-security-audit \
13 packagegroup-security-ids \
14 packagegroup-security-mac \
15 packagegroup-security-compliance \
16 …${@bb.utils.contains("DISTRO_FEATURES", "ptest", "packagegroup-meta-security-ptest-packages", "", …
19 RDEPENDS:packagegroup-core-security = "\
[all …]
/openbmc/linux/Documentation/security/
Dlsm.rst
/openbmc/docs/security/
H A Dobmc-security-response-team-guidelines.md1 # Security response team guidelines
3 These are the guidelines for OpenBMC security responders, including the security
5 problems reported by the [security vulnerability reporting process][].
7 Each project within OpenBMC works independently to resolve security
8 vulnerabilities. The security response team helps the maintainers, provides
22 - Communicate by opening the GitHub draft security advistory as soon as the
34 - [Create the draft security advisory][] and populate its fields.
42 - Use private channels, for example, email, GitHub draft security advistory,
44 - Inform contacts this is private work as part of the OpenBMC security
52 - Submit the problem to another security response team, for example, the
[all …]
H A Dobmc-security-response-team.md1 # The OpenBMC security vulnerability reporting process
3 This describes the OpenBMC security vulnerability reporting process which is
4 intended to give the project time to address security problems before public
9 - a procedure to privately report security vulnerabilities
10 - a security response team to address reported vulnerabilities
11 - the openbmc-security email address for the response team
12 - guidelines for security response team members
16 1. A community member reports a problem privately to the security response team
18 2. The responders (including the security response team, the repository
20 3. The repository maintainer creates an OpenBMC security advisory which explains
[all …]
H A Dhow-to-report-a-security-vulnerability.md1 # How to report a security vulnerability
3 This describes how you can report an OpenBMC security vulnerability privately to
8 - You have information about a security problem or vulnerability which is not
14 To begin the process: Privately contact the OpenBMC security response team and
17 - Suggest sending an email. Use `openbmc-security at lists.ozlabs.org`.
20 not, the security response team will help route the problem.
21 - Include details about the security problem such as:
29 the security response team can help you route the problem.
31 When the project owners get a new security problem, they will create a [GitHub
32 security advisory][] in their repository and begin work. The advisory has draft
[all …]
H A Dnetwork-security-considerations.md1 # Network Security Considerations
7 This is only intended to be a guide; security is ultimately the responsibility
9 a security vulnerability, please consider [how to report a security
12 [how to report a security vulnerability]:
13 https://github.com/openbmc/docs/blob/master/security/how-to-report-a-security-vulnerability.md
32 - The BMC is presumed to have a network adapter. The security considerations of
33 the NIC are important to the BMC security, but are outside the scope of this
48 driver have security considerations which are important to BMC security, but are
83 Transport layer security (TLS) protocols are configured for each service at
125 Laws may require products built on OpenBMC to have reasonable security built
[all …]
H A Dobmc-github-security-advisory-template.md1 # OpenBMC Security Advisory Template
4 new draft GitHub security advisories as part of the [Security response team
8 security advisory "Description" field
10 [security response team guidelines]: ./obmc-security-response-team-guidelines.md
29 Please coordinate with the security response team
72 - Email openbmc-security at lists.ozlabs.org
/openbmc/linux/drivers/memory/tegra/
Dtegra194.c
/openbmc/openbmc/poky/documentation/dev-manual/
H A Dsecurity-subjects.rst8 and need to handle security issues and practices both internal (in the code
12 This manual assembles security-related information concerning the whole
13 ecosystem. It includes information on reporting a potential security issue,
14 the operation of the YP Security team and how to contribute in the
15 related code. It is written to be useful for both security researchers and
18 How to report a potential security vulnerability?
23 :yocto_bugs:`Security Bugzilla </enter_bug.cgi?product=Security>`.
26 a message to security AT yoctoproject DOT org, including as many details as
29 Yocto Project Security team.
32 reporting potential security issues in the specific ``SECURITY.md`` file at the
[all …]
H A Dsecuring-images.rst6 Security is of increasing concern for embedded devices. Consider the
10 - *"*\ `Security Risks of Embedded
18 - *"*\ `Security Issues for Embedded
19 Devices <https://elinux.org/images/6/6f/Security-issues.pdf>`__\ *"*
23 variables that you can consider to help you reach the security goals you
31 Because the security requirements and risks are different for every
35 hardening and on security.
46 other potential security problems.
48 - Pay particular attention to the security for any web-based
53 resulting from the interface's security becoming compromised can be
[all …]
/openbmc/openbmc/meta-arm/
H A DSECURITY.md3 Arm takes security issues seriously and welcomes feedback from researchers and
4 the security community in order to improve the security of its products and
6 vulnerabilities and other security issues.
8 Security issues can be complex and one single timescale doesn't fit all
10 security notifications and fixes to be available and facilitate coordinated
18 meta-arm@lists.yoctoproject.org and arm-security@arm.com.
21 to the maintainers \(see [README.md](/README.md)\) and arm-security@arm.com, including as much
24 …rmation, please visit https://developer.arm.com/support/arm-security-updates/report-security-vulne…
27 ## Branches maintained with security fixes
36 security patches, but well-tested patches may still be accepted for them for
[all …]
/openbmc/openbmc/meta-security/
H A D.gitlab-ci.yml54 - kas shell kas/$CI_JOB_NAME.yml -c "bitbake -k security-build-image integrity-image-minimal"
61 - kas build --target security-build-image kas/$CI_JOB_NAME.yml
67 - kas build --target security-parsec-image kas/$CI_JOB_NAME.yml
74 - kas build --target security-test-image kas/$CI_JOB_NAME.yml
75 - kas build -c testimage --target security-test-image kas/$CI_JOB_NAME.yml
80 …$CI_JOB_NAME.yml -c "bitbake -k core-image-minimal security-build-image security-tpm-image securi…
82 - kas build --target security-build-image kas/$CI_JOB_NAME-alt.yml
88 - kas build --target security-parsec-image kas/$CI_JOB_NAME.yml
93 - kas build --target security-build-image kas/$CI_JOB_NAME.yml
99 - kas build --target security-parsec-image kas/$CI_JOB_NAME.yml
[all …]
H A DREADME.md2 …s](https://gitlab.com/akuster/meta-security/badges/master-next/pipeline.svg)](https://gitlab.com/a…
4 …tus](https://gitlab.com/akuster/meta-security/badges/master/pipeline.svg)](https://gitlab.com/akus…
6 Meta-security
10 to have 'security' in DISTRO_FEATURES to have effect.
13 DISTRO_FEATURES:append = " security"
15 If meta-security is included, but security is not enabled as a
18 You have included the meta-security layer, but
19 'security' has not been enabled in your DISTRO_FEATURES. Some bbappend files
27 This layer provides security tools, hardening tools for Linux kernels
28 and libraries for implementing security mechanisms.
[all …]
/openbmc/linux/Documentation/driver-api/nvdimm/
Dsecurity.rst
/openbmc/linux/Documentation/netlabel/
Dlsm_interface.rst
Dintroduction.rst
/openbmc/openbmc/meta-security/dynamic-layers/meta-perl/recipes-core/packagegroup/
H A Dpackagegroup-core-security.bbappend4 packagegroup-security-hardening \
6 RDEPENDS:packagegroup-core-security += "\
7 packagegroup-security-hardening \
10 SUMMARY:packagegroup-security-hardening = "Security Hardening tools"
11 RDEPENDS:packagegroup-security-hardening = " \
15 RDEPENDS:packagegroup-security-scanners += "\
/openbmc/openbmc/meta-security/recipes-scanners/buck-security/
H A Dbuck-security_0.7.bb1 SUMMARY = "Linux security scanner"
2 DESCRIPTION = "Buck-Security is a security scanner for Debian and Ubuntu Linux. It runs a couple of…
3 system. This enables you to quickly overview the security status of your Linux system."
4 SECTION = "security"
8 SRC_URI = "http://sourceforge.net/projects/buck-security/files/buck-security/buck-security_${PV}/${…
21 cp -r ${S}/buck-security ${D}${bindir}
22 …:Spec->catfile(dirname(File::Spec->rel2abs(__FILE__)), "buck/checks")!' ${D}${bindir}/buck-security
23 …c->catfile(dirname(File::Spec->rel2abs(__FILE__)), "buck/checks/lib")!' ${D}${bindir}/buck-security
24 …le::Spec->catfile(dirname(File::Spec->rel2abs(__FILE__)), "buck/lib")!' ${D}${bindir}/buck-security
25 …= File::Spec->catfile(dirname(File::Spec->rel2abs(__FILE__)), "buck")!' ${D}${bindir}/buck-security
/openbmc/docs/
H A DSECURITY.md1 # Security Policy
3 ## How to report a security vulnerability
5 This describes how you can report an OpenBMC security vulnerability privately to
10 - You have information about a security problem which is not yet publicly
18 - Send an email to `openbmc-security at lists.ozlabs.org` with details about the
19 security problem such as:
26 The OpenBMC security response team (SRT) will respond to you and work to address
30 Anyone brought onboard should be given a link to the OpenBMC [security
38 - Create an OpenBMC security advisory.
55 [security response team guidelines]: ./obmc-security-response-team-guidelines.md
/openbmc/openbmc/meta-security/meta-tpm/recipes-core/packagegroup/
H A Dpackagegroup-security-tpm-i2c.bb1 DESCRIPTION = "Security packagegroup for TPM i2c support"
8 PACKAGES = "packagegroup-security-tpm-i2c"
10 SUMMARY:packagegroup-security-tpm-i2c = "Security TPM i2c support"
11 RDEPENDS:packagegroup-security-tpm-i2c = " \
12 ${@bb.utils.contains('MACHINE_FEATURES', 'tpm', 'packagegroup-security-tpm', '', d)} \
13 ${@bb.utils.contains('MACHINE_FEATURES', 'tpm2', 'packagegroup-security-tpm2', '', d)} \
/openbmc/linux/fs/cachefiles/
Dsecurity.c
/openbmc/linux/fs/ceph/
DKconfig
/openbmc/qemu/docs/system/
H A Dsecurity.rst1 Security title
7 This chapter explains the security requirements that QEMU is designed to meet
10 Security Requirements
13 QEMU supports many different use cases, some of which have stricter security
14 requirements than others. The community has agreed on the overall security
16 considered supported from a security perspective.
36 real-world use cases and treated as security bugs if this is the case.
43 the non-virtualization use case should meet the same security requirements as
45 non-virtualization use case code was not written with these security
48 Bugs affecting the non-virtualization use case are not considered security
[all …]
/openbmc/pldm/
H A D.clang-tidy114 clang-analyzer-security.FloatLoopCounter,
115 clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling,
116 clang-analyzer-security.insecureAPI.SecuritySyntaxChecker,
117 clang-analyzer-security.insecureAPI.UncheckedReturn,
118 clang-analyzer-security.insecureAPI.bcmp,
119 clang-analyzer-security.insecureAPI.bcopy,
120 clang-analyzer-security.insecureAPI.bzero,
121 clang-analyzer-security.insecureAPI.decodeValueOfObjCType,
122 clang-analyzer-security.insecureAPI.getpw,
123 clang-analyzer-security.insecureAPI.gets,
[all …]
/openbmc/linux/include/uapi/linux/
Drxrpc.h

12345678910>>...65