Security

From FedoraProject

(Difference between revisions)
Jump to: navigation, search
(rename link)
(link to embedded software list)
Line 43: Line 43:
  
 
* To track security vulnerabilities in packages, [[Security/TrackingBugs|tracking bugs]] are used.
 
* To track security vulnerabilities in packages, [[Security/TrackingBugs|tracking bugs]] are used.
 +
 +
== List of Embedded Software ==
 +
 +
* We are maintaining a list of embedded software within various packages.  This will help us to quickly identify if a problem in library X can be corrected with updating library X, or if it also requires updating other packages that may contain their own private copies of library X.  The [[Security/EmbeddedSoftware]] list is used for this purpose.
  
  
 
[[Category:Documentation]]
 
[[Category:Documentation]]
 
[[Category:Security]]
 
[[Category:Security]]

Revision as of 20:52, 9 November 2010

Contents

Fedora Security Response Procedures

If you would like to report any potential security issues with Fedora follow the procedures in Security Bugs page for escalated attention to it.

Security Issues Classification

So what counts a security issue in Fedora? Find answers in the Security Classifications page.

Security Status

The current security status of Fedora is available from Security Status page.

Security Features

Security features available in Fedora is explained on Security Features page.

Security Mailing list

Fedora security list: For discussion about improvement of Fedora security. Other mailing lists are available at the Communicate page

Fedora Security Response

The Fedora Security Response Team handles security issues within Fedora. The Red Hat security team can be reached by mailing secalert AT SPAMFREE redhat DOT com. Information regarding known public issues can be found on the Security Status page.

Endemic Security Risks

Due to the Fedora Project's use of resources not directly under our control, such as mirrors, Fedora and its users have exposure to additional endemic risks, and takes as many steps as possible mitigate these risks.

References

Presentations

Fedora Security Advisories

Fedora Security Tracking Bugs

  • To track security vulnerabilities in packages, tracking bugs are used.

List of Embedded Software

  • We are maintaining a list of embedded software within various packages. This will help us to quickly identify if a problem in library X can be corrected with updating library X, or if it also requires updating other packages that may contain their own private copies of library X. The Security/EmbeddedSoftware list is used for this purpose.