-
-
Notifications
You must be signed in to change notification settings - Fork 249
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Define policy for identifying security issues in prerequisite software products #3265
Comments
Initial list of software that would be in scope for this for Temurin builds (currently excluding the items supplied with the OS such as
|
Need to verify which of these are now included in the SBOM and whether others would be required. |
I'm going to list the products in this comment as they are identified along with their official page, and a link to any related CVEs as a basis for this:
|
We now have a reasonably complete SBOM, only missing some of the compiler details for non-Linux platforms. It should be noted that zlib, freetype and alsa are all things which are included into the openjdk build, and therefore we should ensure that we follow the advice of the upstream openjdk project where feasible to ensure we remain secure. The other tools are things we have full control over and should aim to monitor those on a regular basis to ensure that our machines are suitably secure, which means we should review the CVEs on a regular basis - either monthly, or on a cycle that matches the quarterly PSU updates of Eclipse Temurin.
|
Once we have determine which components are critical for the build process on each platform we should use this information to determine policies regarding how/when/if to perform updates or mitigate them and start using those policies so that we avoid being exposed via CVEs which may be raised by our customers. We should be proactive in identifying and resolving such issues.
The text was updated successfully, but these errors were encountered: