- 1 Mission
- 2 Secure Coding
- 3 Code Auditing
- 4 Security Response
- 4.1 Fedora Security Response Procedures
- 4.2 Security Issues Classification
- 4.3 Security Status
- 4.4 Security Features
- 4.5 Security Mailing list
- 4.6 Fedora Security Response
- 4.7 Endemic Security Risks
- 4.8 References
- 4.9 Presentations
- 4.10 Fedora Security Advisories
- 4.11 Fedora Security Tracking Bugs
- 4.12 List of Embedded Software
- 4.13 List of SUID / SGID executables
The Security SIG has three missions that contributors can assist with:
- Secure Coding
- Code Auditing
- Security Response
Contributors can work on any or all of these missions.
Fedora Security Response Procedures
If you would like to report any potential security issues with Fedora follow the procedures in Security Bugs page for escalated attention to it.
Security Issues Classification
So what counts a security issue in Fedora? Find answers in the Security Classifications page.
The current security status of Fedora is available from Security Status page.
Security features available in Fedora is explained on Security Features page.
Security Mailing list
Fedora Security Response
The Fedora Security Response Team handles security issues within Fedora. The Red Hat security team can be reached by mailing secalert AT SPAMFREE redhat DOT com. Information regarding known public issues can be found on the Security Status page.
Endemic Security Risks
Due to the Fedora Project's use of resources not directly under our control, such as mirrors, Fedora and its users have exposure to additional endemic risks, and takes as many steps as possible mitigate these risks.
- Fedora Updates Policy
Fedora Security Advisories
Fedora Security Tracking Bugs
- To track security vulnerabilities in packages, tracking bugs are used.
List of Embedded Software
- We are maintaining a list of embedded software within various packages. This will help us to quickly identify if a problem in library X can be corrected with updating library X, or if it also requires updating other packages that may contain their own private copies of library X. The embedded software list is used for this purpose.
List of SUID / SGID executables
- We are maintaining a list of SUID / SGID bit equipped executables
within various packages. This will help us to quickly identify privileged binaries. This list is preliminary planned to be prepared for Fedora release of 14 and it will be enhanced later to include list of privileged binaries in also in newer versions of Fedora. The list of SUID SGID executables is used for this purpose.