Home
last modified time | relevance | path

Searched refs:security (Results 1 – 25 of 512) sorted by relevance

12345678910>>...21

/openbmc/openbmc/meta-security/recipes-core/packagegroup/
H A Dpackagegroup-core-security.bb9 packagegroup-core-security \
10 packagegroup-security-utils \
11 packagegroup-security-scanners \
12 packagegroup-security-audit \
13 packagegroup-security-ids \
14 packagegroup-security-mac \
15 packagegroup-security-compliance \
16 …${@bb.utils.contains("DISTRO_FEATURES", "ptest", "packagegroup-meta-security-ptest-packages", "", …
19 RDEPENDS:packagegroup-core-security = "\
20 packagegroup-security-utils \
[all …]
/openbmc/docs/security/
H A Dobmc-security-response-team.md1 # The OpenBMC security vulnerability reporting process
3 This describes the OpenBMC security vulnerability reporting process which is
4 intended to give the project time to address security problems before public
9 - a procedure to privately report security vulnerabilities
10 - a security response team to address reported vulnerabilities
11 - the openbmc-security email address for the response team
12 - guidelines for security response team members
16 1. A community member reports a problem privately to the security response team
18 2. The responders (including the security response team, the repository
20 3. The repository maintainer creates an OpenBMC security advisory which explains
[all …]
H A Dobmc-security-response-team-guidelines.md3 These are the guidelines for OpenBMC security responders, including the security
5 problems reported by the [security vulnerability reporting process][].
7 Each project within OpenBMC works independently to resolve security
8 vulnerabilities. The security response team helps the maintainers, provides
22 - Communicate by opening the GitHub draft security advistory as soon as the
34 - [Create the draft security advisory][] and populate its fields.
42 - Use private channels, for example, email, GitHub draft security advistory,
44 - Inform contacts this is private work as part of the OpenBMC security
52 - Submit the problem to another security response team, for example, the
70 - Publish a security advisory to the affected OpenBMC repository.
[all …]
H A Dhow-to-report-a-security-vulnerability.md1 # How to report a security vulnerability
3 This describes how you can report an OpenBMC security vulnerability privately to
8 - You have information about a security problem or vulnerability which is not
14 To begin the process: Privately contact the OpenBMC security response team and
17 - Suggest sending an email. Use `openbmc-security at lists.ozlabs.org`.
20 not, the security response team will help route the problem.
21 - Include details about the security problem such as:
29 the security response team can help you route the problem.
31 When the project owners get a new security problem, they will create a [GitHub
32 security advisory][] in their repository and begin work. The advisory has draft
[all …]
H A Dobmc-github-security-advisory-template.md4 new draft GitHub security advisories as part of the [Security response team
8 security advisory "Description" field
10 [security response team guidelines]: ./obmc-security-response-team-guidelines.md
29 Please coordinate with the security response team
72 - Email openbmc-security at lists.ozlabs.org
/openbmc/openbmc/meta-security/dynamic-layers/meta-perl/recipes-core/packagegroup/
H A Dpackagegroup-core-security.bbappend4 packagegroup-security-hardening \
6 RDEPENDS:packagegroup-core-security += "\
7 packagegroup-security-hardening \
10 SUMMARY:packagegroup-security-hardening = "Security Hardening tools"
11 RDEPENDS:packagegroup-security-hardening = " \
15 RDEPENDS:packagegroup-security-scanners += "\
/openbmc/openbmc/meta-security/
H A DREADME.md2 …s](https://gitlab.com/akuster/meta-security/badges/master-next/pipeline.svg)](https://gitlab.com/a…
4 …tus](https://gitlab.com/akuster/meta-security/badges/master/pipeline.svg)](https://gitlab.com/akus…
6 Meta-security
10 to have 'security' in DISTRO_FEATURES to have effect.
13 DISTRO_FEATURES:append = " security"
15 If meta-security is included, but security is not enabled as a
18 You have included the meta-security layer, but
19 'security' has not been enabled in your DISTRO_FEATURES. Some bbappend files
27 This layer provides security tools, hardening tools for Linux kernels
28 and libraries for implementing security mechanisms.
[all …]
/openbmc/openbmc/meta-arm/
H A DSECURITY.md3 Arm takes security issues seriously and welcomes feedback from researchers and
4 the security community in order to improve the security of its products and
6 vulnerabilities and other security issues.
10 security notifications and fixes to be available and facilitate coordinated
18 meta-arm@lists.yoctoproject.org and arm-security@arm.com.
21 to the maintainers \(see [README.md](/README.md)\) and arm-security@arm.com, including as much
24 …rmation, please visit https://developer.arm.com/support/arm-security-updates/report-security-vulne…
27 ## Branches maintained with security fixes
36 security patches, but well-tested patches may still be accepted for them for
43 pull upstream components, incorporating their respective security fixes
[all …]
/openbmc/openbmc/meta-security/recipes-scanners/buck-security/
H A Dbuck-security_0.7.bb1 SUMMARY = "Linux security scanner"
2 DESCRIPTION = "Buck-Security is a security scanner for Debian and Ubuntu Linux. It runs a couple of…
3 system. This enables you to quickly overview the security status of your Linux system."
4 SECTION = "security"
8 SRC_URI = "http://sourceforge.net/projects/buck-security/files/buck-security/buck-security_${PV}/${…
21 cp -r ${S}/buck-security ${D}${bindir}
22 …:Spec->catfile(dirname(File::Spec->rel2abs(__FILE__)), "buck/checks")!' ${D}${bindir}/buck-security
23 …c->catfile(dirname(File::Spec->rel2abs(__FILE__)), "buck/checks/lib")!' ${D}${bindir}/buck-security
24 …le::Spec->catfile(dirname(File::Spec->rel2abs(__FILE__)), "buck/lib")!' ${D}${bindir}/buck-security
25 …= File::Spec->catfile(dirname(File::Spec->rel2abs(__FILE__)), "buck")!' ${D}${bindir}/buck-security
/openbmc/openbmc/meta-security/classes/
H A Dsanity-meta-security.bbclass5 if 'security' not in e.data.getVar('DISTRO_FEATURES').split() and not skip_check:
6 bb.warn("You have included the meta-security layer, but \
7 'security' has not been enabled in your DISTRO_FEATURES. Some bbappend files \
8 and preferred version setting may not take effect. See the meta-security README \
9 for details on enabling security support.")
/openbmc/openbmc/poky/documentation/dev-manual/
H A Dsecurity-subjects.rst8 and need to handle security issues and practices both internal (in the code
12 This manual assembles security-related information concerning the whole
13 ecosystem. It includes information on reporting a potential security issue,
15 related code. It is written to be useful for both security researchers and
18 How to report a potential security vulnerability?
26 a message to security AT yoctoproject DOT org, including as many details as
32 reporting potential security issues in the specific ``SECURITY.md`` file at the
39 Branches maintained with security fixes
49 maintained with security patches, but well-tested patches may still be accepted
55 We have set up two security-related mailing lists:
[all …]
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-support/ssiapi/ssiapi/
H A D0004-Do-not-override-flags-coming-from-build-environment.patch6 e.g. we need some optimization level turned on when security flags are enabled
24 …ty=hidden -D_GNU_SOURCE -O3 -fstack-protector -D_FORTIFY_SOURCE=2 -Wformat -Wformat-security -fPIC"
25 -CFLAGS="-std=gnu99 -fstack-protector -D_FORTIFY_SOURCE=2 -Wformat -Wformat-security -fPIC"
26 …sibility-inlines-hidden -O3 -fstack-protector -D_FORTIFY_SOURCE=2 -Wformat -Wformat-security -fPIC"
27 …ty=hidden -D_GNU_SOURCE -O3 -fstack-protector -D_FORTIFY_SOURCE=2 -Wformat -Wformat-security -fPIC"
28 +#CFLAGS="-std=gnu99 -fstack-protector -D_FORTIFY_SOURCE=2 -Wformat -Wformat-security -fPIC"
29 …sibility-inlines-hidden -O3 -fstack-protector -D_FORTIFY_SOURCE=2 -Wformat -Wformat-security -fPIC"
/openbmc/openbmc/meta-security/meta-tpm/recipes-core/packagegroup/
H A Dpackagegroup-security-tpm-i2c.bb8 PACKAGES = "packagegroup-security-tpm-i2c"
10 SUMMARY:packagegroup-security-tpm-i2c = "Security TPM i2c support"
11 RDEPENDS:packagegroup-security-tpm-i2c = " \
12 ${@bb.utils.contains('MACHINE_FEATURES', 'tpm', 'packagegroup-security-tpm', '', d)} \
13 ${@bb.utils.contains('MACHINE_FEATURES', 'tpm2', 'packagegroup-security-tpm2', '', d)} \
H A Dpackagegroup-security-vtpm.bb8 PACKAGES = "packagegroup-security-vtpm"
10 SUMMARY:packagegroup-security-vtpm = "Security Software vTPM support"
11 RDEPENDS:packagegroup-security-vtpm = " \
/openbmc/docs/
H A DSECURITY.md3 ## How to report a security vulnerability
5 This describes how you can report an OpenBMC security vulnerability privately to
10 - You have information about a security problem which is not yet publicly
18 - Send an email to `openbmc-security at lists.ozlabs.org` with details about the
19 security problem such as:
26 The OpenBMC security response team (SRT) will respond to you and work to address
30 Anyone brought onboard should be given a link to the OpenBMC [security
38 - Create an OpenBMC security advisory.
55 [security response team guidelines]: ./obmc-security-response-team-guidelines.md
/openbmc/openbmc/meta-security/recipes-core/images/
H A Dsecurity-test-image.bb1 DESCRIPTION = "A small image for testing meta-security packages"
3 require security-build-image.bb
9 ${@bb.utils.contains("BBFILE_COLLECTIONS", "tpm-layer", "packagegroup-security-tpm","", d)} \
10 ${@bb.utils.contains("BBFILE_COLLECTIONS", "tpm-layer", "packagegroup-security-tpm2","", d)} \
11 …${@bb.utils.contains("BBFILE_COLLECTIONS", "parsec-layer", "packagegroup-security-parsec","", d)} \
H A Dsecurity-build-image.bb1 DESCRIPTION = "A small image for building meta-security packages"
9 packagegroup-core-security \
18 export IMAGE_BASENAME = "security-build-image"
22 …END = " ${@bb.utils.contains('DISTRO_FEATURES', 'apparmor', 'apparmor=1 security=apparmor', '', d)…
/openbmc/pldm/
H A D.clang-tidy114 clang-analyzer-security.FloatLoopCounter,
115 clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling,
116 clang-analyzer-security.insecureAPI.SecuritySyntaxChecker,
117 clang-analyzer-security.insecureAPI.UncheckedReturn,
118 clang-analyzer-security.insecureAPI.bcmp,
119 clang-analyzer-security.insecureAPI.bcopy,
120 clang-analyzer-security.insecureAPI.bzero,
121 clang-analyzer-security.insecureAPI.decodeValueOfObjCType,
122 clang-analyzer-security.insecureAPI.getpw,
123 clang-analyzer-security.insecureAPI.gets,
[all …]
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-extended/libpwquality/
H A Dlibpwquality_1.4.5.bb32 --with-securedir=${base_libdir}/security \
38 FILES:${PN} += "${base_libdir}/security/pam_pwquality.so"
39 FILES:${PN}-dbg += "${base_libdir}/security/.debug"
40 FILES:${PN}-staticdev += "${base_libdir}/security/pam_pwquality.a"
41 FILES:${PN}-dev += "${base_libdir}/security/pam_pwquality.la"
/openbmc/openbmc/meta-security/meta-parsec/recipes-core/packagegroups/
H A Dpackagegroup-security-parsec.bb9 packagegroup-security-parsec \
12 SUMMARY:packagegroup-security-parsec = "Security Parsec"
13 RDEPENDS:packagegroup-security-parsec = "\
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-extended/pam/
H A Dpam-radius_3.0.0.bb25 install -d ${D}${base_libdir}/security
26 install -m 644 ${S}/pam_radius_auth.so ${D}${base_libdir}/security
29 FILES:${PN} += "${base_libdir}/security/*.so"
30 FILES:${PN}-dbg += "${base_libdir}/security/.debug"
/openbmc/openbmc/meta-security/meta-parsec/recipes-core/images/
H A Dsecurity-parsec-image.bb10 packagegroup-security-tpm2 \
11 packagegroup-security-parsec \
16 export IMAGE_BASENAME = "security-parsec-image"
/openbmc/obmc-console/
H A D.clang-tidy112 clang-analyzer-security.FloatLoopCounter,
113 clang-analyzer-security.insecureAPI.SecuritySyntaxChecker,
114 clang-analyzer-security.insecureAPI.UncheckedReturn,
115 clang-analyzer-security.insecureAPI.bcmp,
116 clang-analyzer-security.insecureAPI.bcopy,
117 clang-analyzer-security.insecureAPI.bzero,
118 clang-analyzer-security.insecureAPI.decodeValueOfObjCType,
119 clang-analyzer-security.insecureAPI.getpw,
120 clang-analyzer-security.insecureAPI.gets,
121 clang-analyzer-security.insecureAPI.mkstemp,
[all …]
/openbmc/libpldm/
H A D.clang-tidy112 clang-analyzer-security.FloatLoopCounter,
113 clang-analyzer-security.insecureAPI.SecuritySyntaxChecker,
114 clang-analyzer-security.insecureAPI.UncheckedReturn,
115 clang-analyzer-security.insecureAPI.bcmp,
116 clang-analyzer-security.insecureAPI.bcopy,
117 clang-analyzer-security.insecureAPI.bzero,
118 clang-analyzer-security.insecureAPI.decodeValueOfObjCType,
119 clang-analyzer-security.insecureAPI.getpw,
120 clang-analyzer-security.insecureAPI.gets,
121 clang-analyzer-security.insecureAPI.mkstemp,
[all …]
/openbmc/libcper/
H A D.clang-tidy105 clang-analyzer-security.FloatLoopCounter,
106 clang-analyzer-security.insecureAPI.SecuritySyntaxChecker,
107 clang-analyzer-security.insecureAPI.UncheckedReturn,
108 clang-analyzer-security.insecureAPI.bcmp,
109 clang-analyzer-security.insecureAPI.bcopy,
110 clang-analyzer-security.insecureAPI.bzero,
111 clang-analyzer-security.insecureAPI.decodeValueOfObjCType,
112 clang-analyzer-security.insecureAPI.getpw,
113 clang-analyzer-security.insecureAPI.gets,
114 clang-analyzer-security.insecureAPI.mkstemp,
[all …]

12345678910>>...21