[prev in list] [next in list] [prev in thread] [next in thread] 

List:       openembedded-architecture
Subject:    Re: [Openembedded-architecture] [yocto] Security processes: YP needs
From:       "Marta Rybczynska" <rybczynska () gmail ! com>
Date:       2023-09-27 17:24:56
Message-ID: CAApg2=Tz5QDw7RPhh1Kux=w0REFp2R3K0b+QL6oPazrOpVdCnA () mail ! gmail ! com
[Download RAW message or body]

[Attachment #2 (multipart/alternative)]


On Wed, 27 Sept 2023, 12:05 Reyna, David, <david.reyna@windriver.com> wrote:

> Hi Marta!
>
> > What about 11am Pacific on tomorrow (28 Sept or Oct 3)?
>
> Let us aim for October 3 so that I can prepare a full demo..
>
> > I think that you have meant 10am to 2PM, otherwise 1am Pacific would
> work very well for me too
>
> I actually did mean 2:00 am Pacific. I do work with our India team, so I
> am often up late to sync with them..
>
> > As discussed yesterday in the call, there are some other people who seem
> interested.
>
> What time zone are you in?
> I believe Ross is in England (UTC)
> I know that Randy is in Ottawa.
>
> If anyone else wants to join, that would be great!. They should ping us
> and I can send the Zoom link. I do not want to send that link blindly to
> the full mail list.
>

I'm in CEST (Central European zone). If we aim for the 3rd then let's stay
for late afternoon for me.

I let Ross, Randy and everyone else interested to express their preferences.


> > I'm going to add the missing file for the test next week, the tool needs
> a script to download 2023 data.
>
> That file is part of my code update, so you can get that for free.
>

Thanks!


David
>
> -----Original Message-----
> From: Marta Rybczynska <rybczynska@gmail.com>
> Sent: Wednesday, September 27, 2023 12:18 AM
> To: Reyna, David <david.reyna@windriver.com>
> Cc: yocto-security@lists.yoctoproject.org; OE-core <
> openembedded-core@lists.openembedded.org>;
> openembedded-architecture@lists.openembedded.org;
> yocto@lists.yoctoproject.org; MacLeod, Randy <Randy.MacLeod@windriver.com>;
> Richard Purdie <richard.purdie@linuxfoundation.org>; Steve Sakoman <
> steve@sakoman.com>; Khem Raj <raj.khem@gmail.com>;
> mark.hatle@kernel.crashing.org; Ross Burton <ross.burton@arm.com>; Joshua
> Watt <JPEWhacker@gmail.com>
> Subject: Re: [Openembedded-architecture] [yocto] Security processes: YP
> needs
>
> Hi David,
> Thank you very much for the description and the offer to get a demo.
> As discussed yesterday in the call, there are some other people who
> seem interested.
>
> > PROPOSAL 1: If the full triage is too much to bite off to start with,
> perhaps using it to track and coordinate work will bring immediate benefit.
>
> This is the reason I want to test how much time it takes.
>
> > PROPOSAL 2: I am happy to give you a live demo of Wind River's fully
> operational SRTool, so you can see all of the bells and whistles in action.
> I am available pretty much anytime between 10:00 am Pacific to 2:00 am
> Pacific.
>
> That would be nice. What about 11am Pacific on tomorrow (28 Sept or
> Oct 3)? I think that you have meant 10am to 2PM, otherwise 1am Pacific
> would work very well for me too :P
>
> > PROPOSAL 3: I will start refreshing the YP SRTool repository with my
> current implementation level from Wind River (with the Wind River specific
> modules left out of course :-)
>
> That would be great. I'm going to add the missing file for the test
> next week, the tool needs a script to download 2023 data.
>
> Kind regards,
> Marta
>
> On Mon, Sep 25, 2023 at 11:02 AM Reyna, David via
> lists.openembedded.org
> <david.reyna=windriver.com@lists.openembedded.org> wrote:
> >
> > Hi Marta,
> >
> > * SRTool: We might decide to use it again. It allows one to do much but
> requires constant commitment.
> >
> > There are many ways to use the SRTool.
> >   (a)  The original design was to perform 100% triage of incoming CVEs.
> This was a business requirement of Wind River, and we have used the SRTool
> successfully for 4-5 year now.
> >   (b)  The main limitation with the SRTool for Yocto Project was the
> lack of integration with Bugzilla (Ross ran out of time)
> >      * This is the crucial other half of the workflow
> >      * There is the automatic creation of appropriate defect records for
> investigation
> >      * There is also the automatic tracking of the overall CVE status,
> both CVEs in progress and the CVEs completed
> >      * Wind River has an extension for full integration with Jira, and
> that saves weeks of work for the CVE management
> >   (c) The guiding rule was that CVE management was in the SRTool, but
> specific defect work was also done in Jira/Bugzilla, for a clean separate
> of domains
> >   (d)  The SRTool has a user model
> >      * Together with Bugzilla, it is easy to track single people and
> even multiple people working on CVEs
> >   (e) The SRTool also has the built-on ability to look up the CVE status
> from other distributions (Red Hat, Debian, ...) so that one can get a peek
> of existing triages and resolutions
> >   (f) The SRTool is build like Toaster on top of Django, so development
> and debugging skills for Toaster immediate apply
> >   (g) Also with the Django base, it is very simple to add any number of
> modular extensions to support for example CVE Scanner integration
> >   (h) The SRTool also has report generation (in text, CSV, and Excel) in
> addition to email notification support.
> >   (i) There is also a "private" model for CVEs under embargo, with
> strict access control lists.
> >
> > PROPOSAL 1: If the full triage is too much to bite off to start with,
> perhaps using it to track and coordinate work will bring immediate benefit.
> >
> > PROPOSAL 2: I am happy to give you a live demo of Wind River's fully
> operational SRTool, so you can see all of the bells and whistles in action.
> I am available pretty much anytime between 10:00 am Pacific to 2:00 am
> Pacific.
> >
> > PROPOSAL 3: I will start refreshing the YP SRTool repository with my
> current implementation level from Wind River (with the Wind River specific
> modules left out of course :-)
> >
> > David
> >
> > BTW, I also support an extension to the SRTool that manages CVE scanning
> of build images, with hooks to a  number existing CVE scanners (e.g. Trivy)
> in addition to other vulnerability metrics. This is probably out of scope
> to YP at this time, but it is perhaps something to grow in to.
> >
> > -----Original Message-----
> > From: yocto@lists.yoctoproject.org <yocto@lists.yoctoproject.org> On
> Behalf Of Marta Rybczynska via lists.yoctoproject.org
> > Sent: Wednesday, September 13, 2023 4:52 AM
> > To: yocto-security@lists.yoctoproject.org; OE-core <
> openembedded-core@lists.openembedded.org>;
> openembedded-architecture@lists.openembedded.org;
> yocto@lists.yoctoproject.org
> > Cc: Richard Purdie <richard.purdie@linuxfoundation.org>; Steve Sakoman <
> steve@sakoman.com>; Khem Raj <raj.khem@gmail.com>;
> mark.hatle@kernel.crashing.org; Ross Burton <ross.burton@arm.com>; Joshua
> Watt <JPEWhacker@gmail.com>
> > Subject: [yocto] Security processes: YP needs
> >
> > Hello,
> > I've been working recently on collecting what works and what doesn't
> > in YP security processes. The goal is to go forward and define an
> > actionable strategy!
> >
> > Today, I'd like to share with you the summary of what I have heard as
> > needs from several people (those in Cc:).
> >
> > I want the community to comment and tell us what you find important
> > and what you'd like to see added or changed from this list.
> >
> > * CVEs: Visibility if YP is vulnerable or not
> >
> > People want to be able to check/look up a specific CVE; it might be a
> > CVE unrelated to YP
> > (eg. package not included, Windows issue). The cve-checker result is a
> > part of the solution, but people also want to know which CVEs do not
> > apply.
> >
> > * CVEs: synchronization of the work on fixes
> >
> > Currently, there is no synchronization; multiple parties might be
> > working on the same fix while nobody is working on another. There
> > might be duplication of work.
> > Ross has https://wiki.yoctoproject.org/wiki/CVE_Status
> >
> > * Triaging of security issues
> >
> > Related to CVE fixes and includes issues reported directly to the YP.
> > Some issues are more likely to be serious for embedded products
> > (attack by network), so not all has the same priority.
> >
> > * Private security communication
> >
> > A way to send a notification of a non-public security issue. For
> > researchers, other projects etc.
> > The security alias exists, but only some people know about its existence.
> >
> > * Visibility of the security work of the YP
> >
> > There is much work on security in the YP, but it lacks visibility.
> >
> > * Documentation
> >
> > Related to visibility. We need easy-to-find documentation of subjects
> > like submitting a CVE fix,
> > reporting a private issue, and how our processes work... This
> > documentation should address people who are not regular contributors.
> >
> > * Additional tooling
> >
> > We could add additional tooling: a template on how to add cve-check to
> > the CI (possibly
> > a different one than the autobuilder), analyze the result, and extend
> > our tooling to their layers...
> > It is also related to the "Architecture" topic below.
> >
> > * Architecture work
> >
> > Security if more than CVE fixes. We also have what is happening in
> > meta-security: hardening, compiler option,
> > secure package configuration, use of code coverage tools, and so on
> >
> > * SRTool
> >
> > We might decide to use it again. It allows one to do much but requires
> > constant commitment.
> >
> > * Presence on pre-notification lists and receiving information before
> > the vulnerability gets public
> >
> > YP currently depends on public data. Principal distributions receive
> > the information before
> > a vulnerability becomes public. It requires (in short) private
> > reporting, a security team, and a track
> > of excellent security record.
> >
> > * Becoming a CNA (be able to assign CVEs)
> >
> > Needed if we want to assign CVEs to the software of the YP, like
> > autobuilder, Toaster etc.
> >
> > Kind regards,
> > Marta
> >
> > 
> >
>

[Attachment #5 (text/html)]

<div dir="auto"><div><br><br><div class="gmail_quote"><div dir="ltr" \
class="gmail_attr">On Wed, 27 Sept 2023, 12:05 Reyna, David, &lt;<a \
href="mailto:david.reyna@windriver.com">david.reyna@windriver.com</a>&gt; \
wrote:<br></div><blockquote class="gmail_quote" style="margin:0 0 0 \
.8ex;border-left:1px #ccc solid;padding-left:1ex">Hi Marta!<br> <br>
&gt; What about 11am Pacific on tomorrow (28 Sept or Oct 3)? <br>
<br>
Let us aim for October 3 so that I can prepare a full demo..<br>
<br>
&gt; I think that you have meant 10am to 2PM, otherwise 1am Pacific would work very \
well for me too <br> <br>
I actually did mean 2:00 am Pacific. I do work with our India team, so I am often up \
late to sync with them..<br> <br>
&gt; As discussed yesterday in the call, there are some other people who seem \
interested.<br> <br>
What time zone are you in? <br>
I believe Ross is in England (UTC)<br>
I know that Randy is in Ottawa.<br>
<br>
If anyone else wants to join, that would be great!. They should ping us and I can \
send the Zoom link. I do not want to send that link blindly to the full mail \
list.<br></blockquote></div></div><div dir="auto"><br></div><div dir="auto">I&#39;m \
in CEST (Central European zone). If we aim for the 3rd then let&#39;s stay for late \
afternoon for me.</div><div dir="auto"><br></div><div dir="auto">I let Ross, Randy \
and everyone else interested to express their preferences.</div><div \
dir="auto"><br></div><div dir="auto"><div class="gmail_quote"><blockquote \
class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc \
solid;padding-left:1ex"> <br>
&gt; I&#39;m going to add the missing file for the test next week, the tool needs a \
script to download 2023 data.<br> <br>
That file is part of my code update, so you can get that for \
free.<br></blockquote></div></div><div dir="auto"><br></div><div dir="auto">Thanks!  \
</div><div dir="auto"><br></div><div dir="auto"><br></div><div dir="auto"><div \
class="gmail_quote"><blockquote class="gmail_quote" style="margin:0 0 0 \
.8ex;border-left:1px #ccc solid;padding-left:1ex"> David<br>
<br>
-----Original Message-----<br>
From: Marta Rybczynska &lt;<a href="mailto:rybczynska@gmail.com" target="_blank" \
                rel="noreferrer">rybczynska@gmail.com</a>&gt; <br>
Sent: Wednesday, September 27, 2023 12:18 AM<br>
To: Reyna, David &lt;<a href="mailto:david.reyna@windriver.com" target="_blank" \
                rel="noreferrer">david.reyna@windriver.com</a>&gt;<br>
Cc: <a href="mailto:yocto-security@lists.yoctoproject.org" target="_blank" \
rel="noreferrer">yocto-security@lists.yoctoproject.org</a>; OE-core &lt;<a \
href="mailto:openembedded-core@lists.openembedded.org" target="_blank" \
rel="noreferrer">openembedded-core@lists.openembedded.org</a>&gt;; <a \
href="mailto:openembedded-architecture@lists.openembedded.org" target="_blank" \
rel="noreferrer">openembedded-architecture@lists.openembedded.org</a>; <a \
href="mailto:yocto@lists.yoctoproject.org" target="_blank" \
rel="noreferrer">yocto@lists.yoctoproject.org</a>; MacLeod, Randy &lt;<a \
href="mailto:Randy.MacLeod@windriver.com" target="_blank" \
rel="noreferrer">Randy.MacLeod@windriver.com</a>&gt;; Richard Purdie &lt;<a \
href="mailto:richard.purdie@linuxfoundation.org" target="_blank" \
rel="noreferrer">richard.purdie@linuxfoundation.org</a>&gt;; Steve Sakoman &lt;<a \
href="mailto:steve@sakoman.com" target="_blank" \
rel="noreferrer">steve@sakoman.com</a>&gt;; Khem Raj &lt;<a \
href="mailto:raj.khem@gmail.com" target="_blank" \
rel="noreferrer">raj.khem@gmail.com</a>&gt;; <a \
href="mailto:mark.hatle@kernel.crashing.org" target="_blank" \
rel="noreferrer">mark.hatle@kernel.crashing.org</a>; Ross Burton &lt;<a \
href="mailto:ross.burton@arm.com" target="_blank" \
rel="noreferrer">ross.burton@arm.com</a>&gt;; Joshua Watt &lt;<a \
href="mailto:JPEWhacker@gmail.com" target="_blank" \
                rel="noreferrer">JPEWhacker@gmail.com</a>&gt;<br>
Subject: Re: [Openembedded-architecture] [yocto] Security processes: YP needs<br>
<br>
Hi David,<br>
Thank you very much for the description and the offer to get a demo.<br>
As discussed yesterday in the call, there are some other people who<br>
seem interested.<br>
<br>
&gt; PROPOSAL 1: If the full triage is too much to bite off to start with, perhaps \
using it to track and coordinate work will bring immediate benefit.<br> <br>
This is the reason I want to test how much time it takes.<br>
<br>
&gt; PROPOSAL 2: I am happy to give you a live demo of Wind River&#39;s fully \
operational SRTool, so you can see all of the bells and whistles in action. I am \
available pretty much anytime between 10:00 am Pacific to 2:00 am Pacific.<br> <br>
That would be nice. What about 11am Pacific on tomorrow (28 Sept or<br>
Oct 3)? I think that you have meant 10am to 2PM, otherwise 1am Pacific<br>
would work very well for me too :P<br>
<br>
&gt; PROPOSAL 3: I will start refreshing the YP SRTool repository with my current \
implementation level from Wind River (with the Wind River specific modules left out \
of course :-)<br> <br>
That would be great. I&#39;m going to add the missing file for the test<br>
next week, the tool needs a script to download 2023 data.<br>
<br>
Kind regards,<br>
Marta<br>
<br>
On Mon, Sep 25, 2023 at 11:02 AM Reyna, David via<br>
<a href="http://lists.openembedded.org" rel="noreferrer noreferrer" \
target="_blank">lists.openembedded.org</a><br> &lt;david.reyna=<a \
href="mailto:windriver.com@lists.openembedded.org" target="_blank" \
rel="noreferrer">windriver.com@lists.openembedded.org</a>&gt; wrote:<br> &gt;<br>
&gt; Hi Marta,<br>
&gt;<br>
&gt; * SRTool: We might decide to use it again. It allows one to do much but requires \
constant commitment.<br> &gt;<br>
&gt; There are many ways to use the SRTool.<br>
&gt;     (a)   The original design was to perform 100% triage of incoming CVEs. This \
was a business requirement of Wind River, and we have used the SRTool successfully \
for 4-5 year now.<br> &gt;     (b)   The main limitation with the SRTool for Yocto \
Project was the lack of integration with Bugzilla (Ross ran out of time)<br> &gt;     \
* This is the crucial other half of the workflow<br> &gt;         * There is the \
automatic creation of appropriate defect records for investigation<br> &gt;         * \
There is also the automatic tracking of the overall CVE status, both CVEs in progress \
and the CVEs completed<br> &gt;         * Wind River has an extension for full \
integration with Jira, and that saves weeks of work for the CVE management<br> &gt;   \
(c) The guiding rule was that CVE management was in the SRTool, but specific defect \
work was also done in Jira/Bugzilla, for a clean separate of domains<br> &gt;     (d) \
The SRTool has a user model<br> &gt;         * Together with Bugzilla, it is easy to \
track single people and even multiple people working on CVEs<br> &gt;     (e) The \
SRTool also has the built-on ability to look up the CVE status from other \
distributions (Red Hat, Debian, ...) so that one can get a peek of existing triages \
and resolutions<br> &gt;     (f) The SRTool is build like Toaster on top of Django, \
so development and debugging skills for Toaster immediate apply<br> &gt;     (g) Also \
with the Django base, it is very simple to add any number of modular extensions to \
support for example CVE Scanner integration<br> &gt;     (h) The SRTool also has \
report generation (in text, CSV, and Excel) in addition to email notification \
support.<br> &gt;     (i) There is also a &quot;private&quot; model for CVEs under \
embargo, with strict access control lists.<br> &gt;<br>
&gt; PROPOSAL 1: If the full triage is too much to bite off to start with, perhaps \
using it to track and coordinate work will bring immediate benefit.<br> &gt;<br>
&gt; PROPOSAL 2: I am happy to give you a live demo of Wind River&#39;s fully \
operational SRTool, so you can see all of the bells and whistles in action. I am \
available pretty much anytime between 10:00 am Pacific to 2:00 am Pacific.<br> \
&gt;<br> &gt; PROPOSAL 3: I will start refreshing the YP SRTool repository with my \
current implementation level from Wind River (with the Wind River specific modules \
left out of course :-)<br> &gt;<br>
&gt; David<br>
&gt;<br>
&gt; BTW, I also support an extension to the SRTool that manages CVE scanning of \
build images, with hooks to a   number existing CVE scanners (e.g. Trivy) in addition \
to other vulnerability metrics. This is probably out of scope to YP at this time, but \
it is perhaps something to grow in to.<br> &gt;<br>
&gt; -----Original Message-----<br>
&gt; From: <a href="mailto:yocto@lists.yoctoproject.org" target="_blank" \
rel="noreferrer">yocto@lists.yoctoproject.org</a> &lt;<a \
href="mailto:yocto@lists.yoctoproject.org" target="_blank" \
rel="noreferrer">yocto@lists.yoctoproject.org</a>&gt; On Behalf Of Marta Rybczynska \
via <a href="http://lists.yoctoproject.org" rel="noreferrer noreferrer" \
target="_blank">lists.yoctoproject.org</a><br> &gt; Sent: Wednesday, September 13, \
2023 4:52 AM<br> &gt; To: <a href="mailto:yocto-security@lists.yoctoproject.org" \
target="_blank" rel="noreferrer">yocto-security@lists.yoctoproject.org</a>; OE-core \
&lt;<a href="mailto:openembedded-core@lists.openembedded.org" target="_blank" \
rel="noreferrer">openembedded-core@lists.openembedded.org</a>&gt;; <a \
href="mailto:openembedded-architecture@lists.openembedded.org" target="_blank" \
rel="noreferrer">openembedded-architecture@lists.openembedded.org</a>; <a \
href="mailto:yocto@lists.yoctoproject.org" target="_blank" \
rel="noreferrer">yocto@lists.yoctoproject.org</a><br> &gt; Cc: Richard Purdie &lt;<a \
href="mailto:richard.purdie@linuxfoundation.org" target="_blank" \
rel="noreferrer">richard.purdie@linuxfoundation.org</a>&gt;; Steve Sakoman &lt;<a \
href="mailto:steve@sakoman.com" target="_blank" \
rel="noreferrer">steve@sakoman.com</a>&gt;; Khem Raj &lt;<a \
href="mailto:raj.khem@gmail.com" target="_blank" \
rel="noreferrer">raj.khem@gmail.com</a>&gt;; <a \
href="mailto:mark.hatle@kernel.crashing.org" target="_blank" \
rel="noreferrer">mark.hatle@kernel.crashing.org</a>; Ross Burton &lt;<a \
href="mailto:ross.burton@arm.com" target="_blank" \
rel="noreferrer">ross.burton@arm.com</a>&gt;; Joshua Watt &lt;<a \
href="mailto:JPEWhacker@gmail.com" target="_blank" \
rel="noreferrer">JPEWhacker@gmail.com</a>&gt;<br> &gt; Subject: [yocto] Security \
processes: YP needs<br> &gt;<br>
&gt; Hello,<br>
&gt; I&#39;ve been working recently on collecting what works and what doesn&#39;t<br>
&gt; in YP security processes. The goal is to go forward and define an<br>
&gt; actionable strategy!<br>
&gt;<br>
&gt; Today, I&#39;d like to share with you the summary of what I have heard as<br>
&gt; needs from several people (those in Cc:).<br>
&gt;<br>
&gt; I want the community to comment and tell us what you find important<br>
&gt; and what you&#39;d like to see added or changed from this list.<br>
&gt;<br>
&gt; * CVEs: Visibility if YP is vulnerable or not<br>
&gt;<br>
&gt; People want to be able to check/look up a specific CVE; it might be a<br>
&gt; CVE unrelated to YP<br>
&gt; (eg. package not included, Windows issue). The cve-checker result is a<br>
&gt; part of the solution, but people also want to know which CVEs do not<br>
&gt; apply.<br>
&gt;<br>
&gt; * CVEs: synchronization of the work on fixes<br>
&gt;<br>
&gt; Currently, there is no synchronization; multiple parties might be<br>
&gt; working on the same fix while nobody is working on another. There<br>
&gt; might be duplication of work.<br>
&gt; Ross has <a href="https://wiki.yoctoproject.org/wiki/CVE_Status" rel="noreferrer \
noreferrer" target="_blank">https://wiki.yoctoproject.org/wiki/CVE_Status</a><br> \
&gt;<br> &gt; * Triaging of security issues<br>
&gt;<br>
&gt; Related to CVE fixes and includes issues reported directly to the YP.<br>
&gt; Some issues are more likely to be serious for embedded products<br>
&gt; (attack by network), so not all has the same priority.<br>
&gt;<br>
&gt; * Private security communication<br>
&gt;<br>
&gt; A way to send a notification of a non-public security issue. For<br>
&gt; researchers, other projects etc.<br>
&gt; The security alias exists, but only some people know about its existence.<br>
&gt;<br>
&gt; * Visibility of the security work of the YP<br>
&gt;<br>
&gt; There is much work on security in the YP, but it lacks visibility.<br>
&gt;<br>
&gt; * Documentation<br>
&gt;<br>
&gt; Related to visibility. We need easy-to-find documentation of subjects<br>
&gt; like submitting a CVE fix,<br>
&gt; reporting a private issue, and how our processes work... This<br>
&gt; documentation should address people who are not regular contributors.<br>
&gt;<br>
&gt; * Additional tooling<br>
&gt;<br>
&gt; We could add additional tooling: a template on how to add cve-check to<br>
&gt; the CI (possibly<br>
&gt; a different one than the autobuilder), analyze the result, and extend<br>
&gt; our tooling to their layers...<br>
&gt; It is also related to the &quot;Architecture&quot; topic below.<br>
&gt;<br>
&gt; * Architecture work<br>
&gt;<br>
&gt; Security if more than CVE fixes. We also have what is happening in<br>
&gt; meta-security: hardening, compiler option,<br>
&gt; secure package configuration, use of code coverage tools, and so on<br>
&gt;<br>
&gt; * SRTool<br>
&gt;<br>
&gt; We might decide to use it again. It allows one to do much but requires<br>
&gt; constant commitment.<br>
&gt;<br>
&gt; * Presence on pre-notification lists and receiving information before<br>
&gt; the vulnerability gets public<br>
&gt;<br>
&gt; YP currently depends on public data. Principal distributions receive<br>
&gt; the information before<br>
&gt; a vulnerability becomes public. It requires (in short) private<br>
&gt; reporting, a security team, and a track<br>
&gt; of excellent security record.<br>
&gt;<br>
&gt; * Becoming a CNA (be able to assign CVEs)<br>
&gt;<br>
&gt; Needed if we want to assign CVEs to the software of the YP, like<br>
&gt; autobuilder, Toaster etc.<br>
&gt;<br>
&gt; Kind regards,<br>
&gt; Marta<br>
&gt;<br>
&gt; <br>
&gt;<br>
</blockquote></div></div></div>



-=-=-=-=-=-=-=-=-=-=-=-
Links: You receive all messages sent to this group.
View/Reply Online (#1779): \
https://lists.openembedded.org/g/openembedded-architecture/message/1779 Mute This \
Topic: https://lists.openembedded.org/mt/101570670/4454510 Group Owner: \
                openembedded-architecture+owner@lists.openembedded.org
Unsubscribe: https://lists.openembedded.org/g/openembedded-architecture/unsub \
                [openembedded-architecture@marc.info]
-=-=-=-=-=-=-=-=-=-=-=-



[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic