new file mode 100644
@@ -0,0 +1,20 @@
+How to Report a Potential Vulnerability?
+========================================
+
+If you would like to report a public issue (for example, one with a released
+CVE number), please report it to the mailing list:
+
+ https://lists.openembedded.org/g/openembedded-devel
+
+If you are dealing with a not-yet released or urgent issue, please send a
+message to one of the maintainers listed in the README. Include as many
+details as possible:
+ - the layer or software module affected
+ - the recipe and its version
+ - any example code, if available
+
+Branches maintained with security fixes
+---------------------------------------
+
+See https://wiki.yoctoproject.org/wiki/Releases for the list of current
+releases. We only accept patches for the LTS releases and the master branch.
new file mode 100644
@@ -0,0 +1,20 @@
+How to Report a Potential Vulnerability?
+========================================
+
+If you would like to report a public issue (for example, one with a released
+CVE number), please report it to the mailing list:
+
+ https://lists.openembedded.org/g/openembedded-devel
+
+If you are dealing with a not-yet released or urgent issue, please send a
+message to one of the maintainers listed in the README. Include as many
+details as possible:
+ - the layer or software module affected
+ - the recipe and its version
+ - any example code, if available
+
+Branches maintained with security fixes
+---------------------------------------
+
+See https://wiki.yoctoproject.org/wiki/Releases for the list of current
+releases. We only accept patches for the LTS releases and the master branch.
new file mode 100644
@@ -0,0 +1,20 @@
+How to Report a Potential Vulnerability?
+========================================
+
+If you would like to report a public issue (for example, one with a released
+CVE number), please report it to the mailing list:
+
+ https://lists.openembedded.org/g/openembedded-devel
+
+If you are dealing with a not-yet released or urgent issue, please send a
+message to one of the maintainers listed in the README. Include as many
+details as possible:
+ - the layer or software module affected
+ - the recipe and its version
+ - any example code, if available
+
+Branches maintained with security fixes
+---------------------------------------
+
+See https://wiki.yoctoproject.org/wiki/Releases for the list of current
+releases. We only accept patches for the LTS releases and the master branch.
new file mode 100644
@@ -0,0 +1,20 @@
+How to Report a Potential Vulnerability?
+========================================
+
+If you would like to report a public issue (for example, one with a released
+CVE number), please report it to the mailing list:
+
+ https://lists.openembedded.org/g/openembedded-devel
+
+If you are dealing with a not-yet released or urgent issue, please send a
+message to one of the maintainers listed in the README. Include as many
+details as possible:
+ - the layer or software module affected
+ - the recipe and its version
+ - any example code, if available
+
+Branches maintained with security fixes
+---------------------------------------
+
+See https://wiki.yoctoproject.org/wiki/Releases for the list of current
+releases. We only accept patches for the LTS releases and the master branch.
new file mode 100644
@@ -0,0 +1,20 @@
+How to Report a Potential Vulnerability?
+========================================
+
+If you would like to report a public issue (for example, one with a released
+CVE number), please report it to the mailing list:
+
+ https://lists.openembedded.org/g/openembedded-devel
+
+If you are dealing with a not-yet released or urgent issue, please send a
+message to one of the maintainers listed in the README. Include as many
+details as possible:
+ - the layer or software module affected
+ - the recipe and its version
+ - any example code, if available
+
+Branches maintained with security fixes
+---------------------------------------
+
+See https://wiki.yoctoproject.org/wiki/Releases for the list of current
+releases. We only accept patches for the LTS releases and the master branch.
new file mode 100644
@@ -0,0 +1,20 @@
+How to Report a Potential Vulnerability?
+========================================
+
+If you would like to report a public issue (for example, one with a released
+CVE number), please report it to the mailing list:
+
+ https://lists.openembedded.org/g/openembedded-devel
+
+If you are dealing with a not-yet released or urgent issue, please send a
+message to one of the maintainers listed in the README. Include as many
+details as possible:
+ - the layer or software module affected
+ - the recipe and its version
+ - any example code, if available
+
+Branches maintained with security fixes
+---------------------------------------
+
+See https://wiki.yoctoproject.org/wiki/Releases for the list of current
+releases. We only accept patches for the LTS releases and the master branch.
new file mode 100644
@@ -0,0 +1,20 @@
+How to Report a Potential Vulnerability?
+========================================
+
+If you would like to report a public issue (for example, one with a released
+CVE number), please report it to the mailing list:
+
+ https://lists.openembedded.org/g/openembedded-devel
+
+If you are dealing with a not-yet released or urgent issue, please send a
+message to one of the maintainers listed in the README. Include as many
+details as possible:
+ - the layer or software module affected
+ - the recipe and its version
+ - any example code, if available
+
+Branches maintained with security fixes
+---------------------------------------
+
+See https://wiki.yoctoproject.org/wiki/Releases for the list of current
+releases. We only accept patches for the LTS releases and the master branch.
new file mode 100644
@@ -0,0 +1,20 @@
+How to Report a Potential Vulnerability?
+========================================
+
+If you would like to report a public issue (for example, one with a released
+CVE number), please report it to the mailing list:
+
+ https://lists.openembedded.org/g/openembedded-devel
+
+If you are dealing with a not-yet released or urgent issue, please send a
+message to one of the maintainers listed in the README. Include as many
+details as possible:
+ - the layer or software module affected
+ - the recipe and its version
+ - any example code, if available
+
+Branches maintained with security fixes
+---------------------------------------
+
+See https://wiki.yoctoproject.org/wiki/Releases for the list of current
+releases. We only accept patches for the LTS releases and the master branch.
new file mode 100644
@@ -0,0 +1,20 @@
+How to Report a Potential Vulnerability?
+========================================
+
+If you would like to report a public issue (for example, one with a released
+CVE number), please report it to the mailing list:
+
+ https://lists.openembedded.org/g/openembedded-devel
+
+If you are dealing with a not-yet released or urgent issue, please send a
+message to one of the maintainers listed in the README. Include as many
+details as possible:
+ - the layer or software module affected
+ - the recipe and its version
+ - any example code, if available
+
+Branches maintained with security fixes
+---------------------------------------
+
+See https://wiki.yoctoproject.org/wiki/Releases for the list of current
+releases. We only accept patches for the LTS releases and the master branch.
new file mode 100644
@@ -0,0 +1,20 @@
+How to Report a Potential Vulnerability?
+========================================
+
+If you would like to report a public issue (for example, one with a released
+CVE number), please report it to the mailing list:
+
+ https://lists.openembedded.org/g/openembedded-devel
+
+If you are dealing with a not-yet released or urgent issue, please send a
+message to one of the maintainers listed in the README. Include as many
+details as possible:
+ - the layer or software module affected
+ - the recipe and its version
+ - any example code, if available
+
+Branches maintained with security fixes
+---------------------------------------
+
+See https://wiki.yoctoproject.org/wiki/Releases for the list of current
+releases. We only accept patches for the LTS releases and the master branch.
Signed-off-by: Khem Raj <raj.khem@gmail.com> --- meta-filesystems/SECURITY.md | 20 ++++++++++++++++++++ meta-gnome/SECURITY.md | 20 ++++++++++++++++++++ meta-initramfs/SECURITY.md | 20 ++++++++++++++++++++ meta-multimedia/SECURITY.md | 20 ++++++++++++++++++++ meta-networking/SECURITY.md | 20 ++++++++++++++++++++ meta-oe/SECURITY.md | 20 ++++++++++++++++++++ meta-perl/SECURITY.md | 20 ++++++++++++++++++++ meta-python/SECURITY.md | 20 ++++++++++++++++++++ meta-webserver/SECURITY.md | 20 ++++++++++++++++++++ meta-xfce/SECURITY.md | 20 ++++++++++++++++++++ 10 files changed, 200 insertions(+) create mode 100644 meta-filesystems/SECURITY.md create mode 100644 meta-gnome/SECURITY.md create mode 100644 meta-initramfs/SECURITY.md create mode 100644 meta-multimedia/SECURITY.md create mode 100644 meta-networking/SECURITY.md create mode 100644 meta-oe/SECURITY.md create mode 100644 meta-perl/SECURITY.md create mode 100644 meta-python/SECURITY.md create mode 100644 meta-webserver/SECURITY.md create mode 100644 meta-xfce/SECURITY.md