# Schedule of tracking security issues of Flatcar
This table describes a rough schedule of who should be in charge of regularly tracking security issues for Flatcar, especially tracking issues from upstream projects like Gentoo Linux.
| Week of | Primary | Secondary |
| ---------- | -------- | --------- |
| ~~2022-05-02~~ | ~~Dongsu~~ | ~~Sayan~~ |
| ~~2022-05-09~~ | ~~Sayan~~ | ~~Kai~~ |
| ~~2022-05-16~~ | ~~Dongsu~~ | ~~Mathieu~~ |
| 2022-05-23 | ~~Sayan~~ | ~~Dongsu~~ |
| 2022-05-30 | ~~Kai~~ | ~~Mathieu~~ |
| 2022-06-06 | ~~Mathieu~~ | ~~Kai~~ |
| 2022-06-13 | Kai | Mathieu |
| 2022-06-20 | Sayan | Dongsu |
| 2022-06-27 | Dongsu | Mathieu |
| 2022-07-04 | Mathieu | Kai |
| 2022-07-11 | Kai | Sayan |
| 2022-07-18 | Sayan | Dongsu |
### what to do
Primary person should do so:
* Every day look into upstream security trackers like below:
* [Gentoo security vulnerabilities](https://bugs.gentoo.org/buglist.cgi?bug_status=__open__&component=Vulnerabilities&list_id=6015515&product=Gentoo%20Security). It might be useful to use `gorss` + RSS feed for this.
* [oss-security mailing list](https://oss-security.openwall.org/wiki/mailing-lists/oss-security)
* [Golang announce mailing list](https://groups.google.com/g/golang-announce)
* [Rust security announcements](https://groups.google.com/g/rustlang-security-announcements)
* (optional) [RedHat vulnerabilities](https://bugzilla.redhat.com/buglist.cgi?component=vulnerability&product=Security%20Response&resolution=---)
* If we see any new CVE, then add it to the [CVE spreadsheets](https://docs.google.com/spreadsheets/d/1gAn7JyASTCydfC2ZllUx4qpS2hMTd5TWVykq6AVAf-c/edit#gid=0) (still private), and click the link (above left) to generate new issues. Then we should be able to see a new issue created in [Kinvolk security Github issues](https://github.com/kinvolk/security/issues). (still private)
* If the package of the new CVE is already open in [Kinvolk security Github issues](https://github.com/kinvolk/security/issues), then unfortunately we need to manually edit the existing issue to add the new CVE.