Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

Linux Foundation

Comparison and Proposal of Vulnerability Management Approaches in Yocto-Based Linux for the CRA

Linux Foundation via YouTube

Overview

Coursera Spring Sale
40% Off Coursera Plus Annual!
Grab it
Explore vulnerability management strategies for Yocto-based Linux systems in this 42-minute conference talk from the Linux Foundation. Examine the challenges manufacturers face with EU Cyber Resilience Act (CRA) compliance, which requires vulnerability reporting starting September 2026. Compare multiple vulnerability management approaches including cve-check, yocto-vex-check, and third-party tools through practical use cases relevant to CRA-covered manufacturers. Analyze the effectiveness of each method using Software Bills of Materials (SBOMs) and Vulnerability Exploitability eXchange (VEX) documents. Learn about Fujitsu's extensive experience supporting SPDX functionality in the Yocto Project since 2016 and their recent OpenSSF participation to enhance global software supply chain security. Discover the strengths and limitations of current vulnerability management practices in Yocto-based systems and gain insights into selecting the most appropriate approach based on specific manufacturing contexts and regulatory requirements.

Syllabus

Comparison and Proposal of Vulnerability Management Approaches in Yocto-Based... Akihiko Takahashi

Taught by

Linux Foundation

Reviews

Start your review of Comparison and Proposal of Vulnerability Management Approaches in Yocto-Based Linux for the CRA

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.