<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://wiki.yoctoproject.org/wiki/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=SonaSarmadi</id>
	<title>Yocto Project - User contributions [en]</title>
	<link rel="self" type="application/atom+xml" href="https://wiki.yoctoproject.org/wiki/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=SonaSarmadi"/>
	<link rel="alternate" type="text/html" href="https://wiki.yoctoproject.org/wiki/Special:Contributions/SonaSarmadi"/>
	<updated>2026-05-06T05:14:06Z</updated>
	<subtitle>User contributions</subtitle>
	<generator>MediaWiki 1.39.5</generator>
	<entry>
		<id>https://wiki.yoctoproject.org/wiki/index.php?title=How_do_I&amp;diff=21007</id>
		<title>How do I</title>
		<link rel="alternate" type="text/html" href="https://wiki.yoctoproject.org/wiki/index.php?title=How_do_I&amp;diff=21007"/>
		<updated>2016-10-28T09:01:35Z</updated>

		<summary type="html">&lt;p&gt;SonaSarmadi: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Q: How do get the package manager binaries on my target rootfs? ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;A:&#039;&#039;&#039; Make sure your image has IMAGE_FEATURES += &amp;quot;package-management&amp;quot; included.&lt;br /&gt;
&lt;br /&gt;
== Q: How do I create my own source download mirror ? ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;A:&#039;&#039;&#039; &lt;br /&gt;
Make a complete build with these variables set in your &amp;lt;code&amp;gt;conf/local.conf&amp;lt;/code&amp;gt;:&lt;br /&gt;
&lt;br /&gt;
  SOURCE_MIRROR_URL ?= &amp;quot;file://source_mirror/sources/&amp;quot;&lt;br /&gt;
  INHERIT += &amp;quot;own-mirrors&amp;quot; &lt;br /&gt;
  BB_GENERATE_MIRROR_TARBALLS = &amp;quot;1&amp;quot; &lt;br /&gt;
&lt;br /&gt;
After a complete build, copy all *files* (not symlinks) in your download directory to the desired source mirror directory. Test by setting the variables below in &amp;lt;code&amp;gt;conf/local.conf&amp;lt;/code&amp;gt;:&lt;br /&gt;
  &lt;br /&gt;
  SOURCE_MIRROR_URL ?= &amp;quot;file://source_mirror/sources/&amp;quot;&lt;br /&gt;
  INHERIT += &amp;quot;own-mirrors&amp;quot; &lt;br /&gt;
  BB_GENERATE_MIRROR_TARBALLS = &amp;quot;1&amp;quot; &lt;br /&gt;
  BB_NO_NETWORK = &amp;quot;1&amp;quot;&lt;br /&gt;
&lt;br /&gt;
If you are building with &amp;lt;code&amp;gt;BB_NO_NETWORK&amp;lt;/code&amp;gt; and using external layers that are not part of the base Yocto distribution, be aware that recipes which:&lt;br /&gt;
&lt;br /&gt;
# Specify a Git repo as the source, and,&lt;br /&gt;
# Specify the revision to be built using a tag name&lt;br /&gt;
&lt;br /&gt;
will cause your build to abort when Bitbake tries to run &amp;lt;code&amp;gt;git ls-remote&amp;lt;/code&amp;gt; to resolve the tag name and is unable to access the network. So don&#039;t specify &amp;lt;code&amp;gt;SRC_URI&amp;lt;/code&amp;gt; like this:&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;SRC_URI = &amp;quot;git://git.kernel.org/pub/scm/utils/kernel/kmod/kmod.git;protocol=git;tag=v${PV}&amp;quot;&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Instead, use:&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;SRC_URI = &amp;quot;git://git.kernel.org/pub/scm/utils/kernel/kmod/kmod.git;protocol=git&amp;quot;&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 SRCREV = &amp;quot;8885ced062131214448fae056ef453f094303805&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Before putting together your pre-mirror, this command can be used from&lt;br /&gt;
your top-level source directory to identify recipes that might be&lt;br /&gt;
problematic with &amp;lt;code&amp;gt;BB_NO_NETWORK&amp;lt;/code&amp;gt; enabled:&lt;br /&gt;
&lt;br /&gt;
 find -name &amp;quot;*.inc&amp;quot; -o -name &amp;quot;*.bb&amp;quot; | xargs grep -li &amp;quot;git;tag=&amp;quot;&lt;br /&gt;
&lt;br /&gt;
== Q: How do I put Yocto on a hard drive? ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;A:&#039;&#039;&#039; bitbake core-image-sato or core-image-sato-sdk&lt;br /&gt;
&lt;br /&gt;
# have a suitable partition on the disk - say partition #3&lt;br /&gt;
# this partition will show up as sde3 on my host machine and sda3 on the atom&lt;br /&gt;
# mkfs.ext3 /dev/sde3&lt;br /&gt;
# mount /dev/sde3 /mnt/target&lt;br /&gt;
# mount -o loop tmp/deploy/images/core-image-sato-sdk.ext3 /mnt/target-ext3&lt;br /&gt;
# cp -a /mnt/target-ext3/* /mnt/target&lt;br /&gt;
# grub-install --recheck --root-directory=/mnt/target /dev/sde&lt;br /&gt;
&lt;br /&gt;
If grub install passed, copy the following to /mnt/target/boot/grub/grub.cfg&lt;br /&gt;
&lt;br /&gt;
 set default=&amp;quot;0&amp;quot;&lt;br /&gt;
 set timeout=&amp;quot;30&amp;quot;&lt;br /&gt;
 &lt;br /&gt;
 menuentry &#039;Yocto SDK&#039; {&lt;br /&gt;
       insmod part_msdos&lt;br /&gt;
       insmod ext2&lt;br /&gt;
       set root=&#039;(hd0,msdos3)&#039;&lt;br /&gt;
       linux /boot/bzImage root=/dev/sda3&lt;br /&gt;
 }&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Thats it - this should boot.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Q: How do I put my recipe into Yocto? ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;A:&#039;&#039;&#039; Let&#039;s use the Hello World example from Section 3.1.2 of the Yocto Project Reference Manual and expand on it.&lt;br /&gt;
&lt;br /&gt;
* In this example, I&#039;ll start with a new meta layer named &amp;quot;meta-jfa&amp;quot; in the Yocto Project files directory, which is named &amp;quot;poky&amp;quot;.  Then, I will add the new recipe and build the image, which is named &amp;quot;core-image-minimal&amp;quot;.  I will build it using the autotooled package option.  Once built, the image will have the “hello” application.&lt;br /&gt;
&lt;br /&gt;
;Step One&lt;br /&gt;
:Create the following directory structure in the ~/poky directory. I&#039;ll use my initials to denote the layer and recipe name:&lt;br /&gt;
 &lt;br /&gt;
 mkdir meta-jfa&lt;br /&gt;
 mkdir meta-jfa/conf&lt;br /&gt;
 mkdir meta-jfa/recipes-jfa&lt;br /&gt;
 mkdir meta-jfa/recipes-jfa/hello&lt;br /&gt;
&lt;br /&gt;
;Step Two&lt;br /&gt;
:Next, to make sure the recipe gets searched and located, I&#039;ll create the layer.conf file in the meta-jfa/conf directory as follows:&lt;br /&gt;
&lt;br /&gt;
 # We have a conf and classes directory, add to BBPATH &lt;br /&gt;
 BBPATH := &amp;quot;${BBPATH}:${LAYERDIR}&amp;quot; &lt;br /&gt;
 # We have a packages directory, add to BBFILES &lt;br /&gt;
 BBFILES := &amp;quot;${BBFILES} ${LAYERDIR}/recipes-*/*/*.bb \ &lt;br /&gt;
            ${LAYERDIR}/recipes-*/*/*.bbappend&amp;quot; &lt;br /&gt;
 BBFILE_COLLECTIONS += &amp;quot;jfa&amp;quot; &lt;br /&gt;
 BBFILE_PATTERN_jfa := &amp;quot;^${LAYERDIR}/&amp;quot; &lt;br /&gt;
 BBFILE_PRIORITY_jfa := &amp;quot;5&amp;quot;&lt;br /&gt;
&lt;br /&gt;
;Step Three&lt;br /&gt;
:Now I need to put the recipe (.bb) file into the right directory.  So, I will put the file hello_2.7.bb into the meta-jfa/recipes-jfa/hello directory. I picked version 2.7 of the hello program by going to the gnu site for the application (ftp://ftp.gnu.org/gnu/hello/) and downloading it to checkout the version I wanted to include. hello-2.7.tar.gz is the most current. I downloaded it locally and expanded it to look at the license information.  The hello_2.7.bb file contains the following:&lt;br /&gt;
&lt;br /&gt;
 DESCRIPTION = &amp;quot;GNU Helloworld application&amp;quot; &lt;br /&gt;
 SECTION = &amp;quot;examples&amp;quot; &lt;br /&gt;
 LICENSE = &amp;quot;GPLv3+&amp;quot; &lt;br /&gt;
 LIC_FILES_CHKSUM = &amp;quot;file://COPYING;md5=d32239bcb673463ab874e80d47fae504&amp;quot; &lt;br /&gt;
 PR = &amp;quot;r0&amp;quot; &lt;br /&gt;
 SRC_URI = &amp;quot;${GNU_MIRROR}/hello/hello-${PV}.tar.gz&amp;quot; &lt;br /&gt;
 inherit autotools gettext &lt;br /&gt;
:Here is some explanation for a few of the recipe statements:&lt;br /&gt;
:* LIC_FILES_CHKSUM =  is required and, using file location defaults, points to the COPYING file that is part of the tarball that is downloaded from the SRC_URI address. The md5= part of the statement is generated by running “md5sum COPYING” against the COPYING file I downloaded to examine.&lt;br /&gt;
:* ${PV} in the SRC_URI statement is picked up from the part of the recipe file name after the “_”. In this case PV =2.7.&lt;br /&gt;
&lt;br /&gt;
;Step Four&lt;br /&gt;
:The recipe is built, so now I can run it:&lt;br /&gt;
&lt;br /&gt;
 cd ~/poky&lt;br /&gt;
 source oe-init-build-env build-hello.  &lt;br /&gt;
&lt;br /&gt;
;Step Five&lt;br /&gt;
:Before I can use BitBake I need to edit two files.  Sourcing the oe-init-build-env file above leaves me in the build-hello directory.  Before issuing the bitbake command I need to edit the files conf/local.conf and conf/bblayers.conf in that build-hello directory.  The bblayers.conf needs to have the one line added to include the layer you created.&lt;br /&gt;
&lt;br /&gt;
 # LAYER_CONF_VERSION is increased each time build/conf/bblayers.conf &lt;br /&gt;
 # changes incompatibly &lt;br /&gt;
 LCONF_VERSION = &amp;quot;4&amp;quot; &lt;br /&gt;
 BBFILES ?= &amp;quot;&amp;quot; &lt;br /&gt;
 BBLAYERS = &amp;quot; \ &lt;br /&gt;
   /home/jim/poky/meta \ &lt;br /&gt;
   /home/jim/poky/meta-yocto \ &lt;br /&gt;
   /home/jim/poky/meta-jfa \&lt;br /&gt;
 &amp;quot;&lt;br /&gt;
&lt;br /&gt;
;Step Six&lt;br /&gt;
:The conf/local.conf file needs to have the parallel processing lines edited to speed up the baking on multicore systems.  I can do that by uncommenting the BB_NUMBER_THREADS and PARALLEL_MAKE variables.  Generally, I would set them equal to twice the number of cores used by my host machine.  By default, the MACHINE variable is set to qemux86 and for this example is fine.  I need to add a line to include the hello package I am building into the image by adding the following line:&lt;br /&gt;
&lt;br /&gt;
 IMAGE_INSTALL_append = &amp;quot; hello&amp;quot;&lt;br /&gt;
&lt;br /&gt;
;Step Seven&lt;br /&gt;
:Now I can bake it with this command:&lt;br /&gt;
 bitbake core-image-minimal&lt;br /&gt;
;Step Eight&lt;br /&gt;
:Once the image is built, I can test it by starting the QEMU emulator:&lt;br /&gt;
&lt;br /&gt;
 runqemu qemux86&lt;br /&gt;
&lt;br /&gt;
;Step Nine&lt;br /&gt;
:Once the emulator comes up, login as root with no password.  Then, at the prompt, enter &amp;quot;hello&amp;quot; to run your application.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Q: How do I setup Intel&amp;amp;reg; Atom&amp;amp;trade; Processor E6xx based system for media playback? ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;A:&#039;&#039;&#039; To playback media files on an Atom E6xx processor, you need to have the EMGD GFX driver installed.  There is a README on this installation in the meta-crownbay directory. However, the official support for EMGD with accelerated 3D and media decode is scheduled for release 1.2, but is in the git repository now, so you need to start with branch, &amp;quot;master&amp;quot; of both the poky and meta-intel repository. And you will need the Intel Crownbay reference platform for the Atom E6xx processor or similar hardware.&lt;br /&gt;
&lt;br /&gt;
; Step 1&lt;br /&gt;
Follow the Appendix A example in the Yocto Project Development Manual, but instead of editing out the crownbay references and using the crownbay-noemgd, you do the opposite.&lt;br /&gt;
&lt;br /&gt;
One edit you need to add to the Appendix A instructions is for the file ~/poky/meta-intel/meta-mymachine/conf/mymachine.conf.  You need to add the following statement to include audio features needed for the audio part of the videos:&lt;br /&gt;
 MACHINE_FEATURES += &amp;quot;alsa&amp;quot;&lt;br /&gt;
&lt;br /&gt;
; Step 2&lt;br /&gt;
In the Appendix A example a couple of changes are needed to the conf/local.conf and conf/bblayers.conf file edits from the standard example. The bblayers.conf file BBLAYERS statement should look like below, except correct the absolute path to match your system:&lt;br /&gt;
 BBLAYERS ?= &amp;quot; \&lt;br /&gt;
  /home/jim/poky/meta \&lt;br /&gt;
  /home/jim/poky/meta-yocto \&lt;br /&gt;
  /home/jim/poky/meta-intel \&lt;br /&gt;
  /home/jim/poky/meta-intel/meta-mymachine \&lt;br /&gt;
  &amp;quot;&lt;br /&gt;
The local.conf file should have some statements in addition to what the Appendix A used:&lt;br /&gt;
 LICENSE_FLAGS_WHITELIST = &amp;quot;license_emgd-driver-bin_1.10&amp;quot;&lt;br /&gt;
&lt;br /&gt;
 # The 2 statements below allow the playing of MP3 files. &lt;br /&gt;
 # Not specific to videos, but usually included on media use systems.&lt;br /&gt;
 LICENSE_FLAGS_WHITELIST += &amp;quot;commercial&amp;quot;&lt;br /&gt;
 POKY_EXTRA_INSTALL += &amp;quot;gst-fluendo-mp3&amp;quot;&lt;br /&gt;
&lt;br /&gt;
 # add debug development tweaks and test applications, which include amixer, aplay, arecord, etc.&lt;br /&gt;
 EXTRA_IMAGE_FEATURES = &amp;quot;debug-tweaks tools-testapps&amp;quot;&lt;br /&gt;
; Step 3&lt;br /&gt;
After bitbaking the core-image-sato image, I put the .ext3 image on a hard drive per the above How Do I. I also added some h.264, mp4, m4a, and mp3 files to play with before moving the hard drive to the target hardware system.&lt;br /&gt;
&lt;br /&gt;
I used both the Sato GUI Music and Video players to play the files.&lt;br /&gt;
&lt;br /&gt;
That&#039;s all there is to it.&lt;br /&gt;
&lt;br /&gt;
==Q: How do I tweak my build system and BitBake configuration for optimal build time as well as provide some guidance on how to collect build metrics and identify bottlenecks. ? ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;A:&#039;&#039;&#039; You should read the [https://wiki.yoctoproject.org/wiki/Build_Performance Build Performance] wiki page.  It provides general tips, a description of the bb-matrix script used for collecting relevant build metrics, a description of how to enable buildstats to generate build performance log data, and a description of how best to apply parallelism to the build.&lt;br /&gt;
&lt;br /&gt;
==Q: How do I get the networking to function on an Acer Aspire One n450 based netbook when using the meta-n450 BSP? ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;A:&#039;&#039;&#039; While the n450 BSP will boot on the Acer AO532h netbook, the BSP does not enable the Atheros AR5B95 Wireless and AR8132 fast ethernet adapters. The Linux Yocto 3.2 kernel has these drivers, but they are not enabled. All you have to do is to create a Config Fragment file with a .cfg extension in a new directory called &#039;linux-yocto&#039; in the BSP recipes-kernel/linux directory. The new &#039;linux-yocto&#039; directory will be at the same level as the linux-yocto_3.2.bbappend file.  You will also need to add the following statement to the .bbappend file:&lt;br /&gt;
&lt;br /&gt;
SRC_URI += &amp;quot;file://myconfig.cfg&amp;quot;&lt;br /&gt;
&lt;br /&gt;
The recipes-kernel/linux/linux-yocto/myconfig.cfg needs to contain the following 2 lines:&lt;br /&gt;
&lt;br /&gt;
CONFIG_ATH9K_PCI=y&lt;br /&gt;
&lt;br /&gt;
CONFIG_ATL1C=y&lt;br /&gt;
&lt;br /&gt;
==Q: How do I build the build appliance? ==&lt;br /&gt;
&#039;&#039;&#039;A:&#039;&#039;&#039;  Update the MACHINE variable to &amp;quot;qemux86-64&amp;quot; or &amp;quot;qemux86&amp;quot; in your &amp;lt;code&amp;gt;conf/local.conf&amp;lt;/code&amp;gt; :&lt;br /&gt;
&lt;br /&gt;
Then, run this command:&lt;br /&gt;
  # bitbake build-appliance-image&lt;br /&gt;
&lt;br /&gt;
The resulting images (*.vmdk, *.vmx, *.vmxf) will be present in the &amp;quot;tmp/deploy/images&amp;quot; folder&lt;br /&gt;
ie: &lt;br /&gt;
&lt;br /&gt;
  # unzip Yocto_Build_Appliance.zip&lt;br /&gt;
  # cd Yocto_Build_Appliance&lt;br /&gt;
  # ls &lt;br /&gt;
    Yocto_Build_Appliance.vmdk  &lt;br /&gt;
    Yocto_Build_Appliance.vmx  &lt;br /&gt;
    Yocto_Build_Appliance.vmxf&lt;br /&gt;
&lt;br /&gt;
==Q: How do I build an image without GPLv3 Licensed packages ? ==&lt;br /&gt;
&#039;&#039;&#039;A:&#039;&#039;&#039;  Add this line &#039;INCOMPATIBLE_LICENSE = &amp;quot;GPLv3&amp;quot;&#039; in your &amp;lt;code&amp;gt;conf/local.conf&amp;lt;/code&amp;gt; :&lt;br /&gt;
&lt;br /&gt;
Then, build the image:&lt;br /&gt;
  # bitbake &amp;lt;image-name&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Q: How do I ensure that I am using the latest upstream version of the package? ==&lt;br /&gt;
&#039;&#039;&#039;A:&#039;&#039;&#039; Add this line &#039;INHERIT += &amp;quot;distrodata&amp;quot;&#039; in your &amp;lt;code&amp;gt;conf/local.conf&amp;lt;/code&amp;gt; :&lt;br /&gt;
&lt;br /&gt;
After that, run this command in the build directory:&lt;br /&gt;
  # bitbake -c checkpkg &amp;lt;package&amp;gt;&lt;br /&gt;
Then, check the &#039;Version&#039; and &#039;Upver&#039; fields in the below listed file: &lt;br /&gt;
  # gedit tmp/log/checkpkg.csv&lt;br /&gt;
&lt;br /&gt;
If those versions are same, then we have the latest upstream version of package&lt;br /&gt;
&lt;br /&gt;
==Q: How do I get a list of CVEs patched? ==&lt;br /&gt;
&#039;&#039;&#039;A:&#039;&#039;&#039;  cve-check tool is available from 2.2 release (poky/meta/recipes-devtools/cve-check-tool)&lt;br /&gt;
&lt;br /&gt;
To run it just inherit the class in conf/local.conf file:&lt;br /&gt;
&lt;br /&gt;
 # INHERIT += &amp;quot;cve-check&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Source and run:&lt;br /&gt;
 # bitbake -c cve_check openssl   &lt;br /&gt;
 # bitbake core-image-sato   &lt;br /&gt;
 # bitbake -k -c cve_check universe  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Log files are created under &lt;br /&gt;
  unzip/1_6.0-r5/cve/cve.log&lt;br /&gt;
  gnutls/3.5.3-r0/cve/cve.log&lt;br /&gt;
  glibc/2.24-r0/cve/cve.log&lt;br /&gt;
  glibc-initial/2.24-r0/cve/cve.log&lt;br /&gt;
  ...&lt;br /&gt;
&lt;br /&gt;
Example of log file:&lt;br /&gt;
  PACKAGE NAME: perl&lt;br /&gt;
  PACKAGE VERSION: 5.22.1&lt;br /&gt;
  CVE: CVE-2016-1238&lt;br /&gt;
  CVE STATUS: Patched&lt;br /&gt;
  CVE SUMMARY:  ....&lt;br /&gt;
  ....&lt;br /&gt;
  CVSS v2 BASE SCORE: 7.2&lt;br /&gt;
  VECTOR: LOCAL&lt;br /&gt;
  MORE INFORMATION: https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-1238&lt;/div&gt;</summary>
		<author><name>SonaSarmadi</name></author>
	</entry>
	<entry>
		<id>https://wiki.yoctoproject.org/wiki/index.php?title=How_do_I&amp;diff=21006</id>
		<title>How do I</title>
		<link rel="alternate" type="text/html" href="https://wiki.yoctoproject.org/wiki/index.php?title=How_do_I&amp;diff=21006"/>
		<updated>2016-10-28T08:53:38Z</updated>

		<summary type="html">&lt;p&gt;SonaSarmadi: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Q: How do get the package manager binaries on my target rootfs? ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;A:&#039;&#039;&#039; Make sure your image has IMAGE_FEATURES += &amp;quot;package-management&amp;quot; included.&lt;br /&gt;
&lt;br /&gt;
== Q: How do I create my own source download mirror ? ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;A:&#039;&#039;&#039; &lt;br /&gt;
Make a complete build with these variables set in your &amp;lt;code&amp;gt;conf/local.conf&amp;lt;/code&amp;gt;:&lt;br /&gt;
&lt;br /&gt;
  SOURCE_MIRROR_URL ?= &amp;quot;file://source_mirror/sources/&amp;quot;&lt;br /&gt;
  INHERIT += &amp;quot;own-mirrors&amp;quot; &lt;br /&gt;
  BB_GENERATE_MIRROR_TARBALLS = &amp;quot;1&amp;quot; &lt;br /&gt;
&lt;br /&gt;
After a complete build, copy all *files* (not symlinks) in your download directory to the desired source mirror directory. Test by setting the variables below in &amp;lt;code&amp;gt;conf/local.conf&amp;lt;/code&amp;gt;:&lt;br /&gt;
  &lt;br /&gt;
  SOURCE_MIRROR_URL ?= &amp;quot;file://source_mirror/sources/&amp;quot;&lt;br /&gt;
  INHERIT += &amp;quot;own-mirrors&amp;quot; &lt;br /&gt;
  BB_GENERATE_MIRROR_TARBALLS = &amp;quot;1&amp;quot; &lt;br /&gt;
  BB_NO_NETWORK = &amp;quot;1&amp;quot;&lt;br /&gt;
&lt;br /&gt;
If you are building with &amp;lt;code&amp;gt;BB_NO_NETWORK&amp;lt;/code&amp;gt; and using external layers that are not part of the base Yocto distribution, be aware that recipes which:&lt;br /&gt;
&lt;br /&gt;
# Specify a Git repo as the source, and,&lt;br /&gt;
# Specify the revision to be built using a tag name&lt;br /&gt;
&lt;br /&gt;
will cause your build to abort when Bitbake tries to run &amp;lt;code&amp;gt;git ls-remote&amp;lt;/code&amp;gt; to resolve the tag name and is unable to access the network. So don&#039;t specify &amp;lt;code&amp;gt;SRC_URI&amp;lt;/code&amp;gt; like this:&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;SRC_URI = &amp;quot;git://git.kernel.org/pub/scm/utils/kernel/kmod/kmod.git;protocol=git;tag=v${PV}&amp;quot;&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Instead, use:&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;SRC_URI = &amp;quot;git://git.kernel.org/pub/scm/utils/kernel/kmod/kmod.git;protocol=git&amp;quot;&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
 SRCREV = &amp;quot;8885ced062131214448fae056ef453f094303805&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Before putting together your pre-mirror, this command can be used from&lt;br /&gt;
your top-level source directory to identify recipes that might be&lt;br /&gt;
problematic with &amp;lt;code&amp;gt;BB_NO_NETWORK&amp;lt;/code&amp;gt; enabled:&lt;br /&gt;
&lt;br /&gt;
 find -name &amp;quot;*.inc&amp;quot; -o -name &amp;quot;*.bb&amp;quot; | xargs grep -li &amp;quot;git;tag=&amp;quot;&lt;br /&gt;
&lt;br /&gt;
== Q: How do I put Yocto on a hard drive? ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;A:&#039;&#039;&#039; bitbake core-image-sato or core-image-sato-sdk&lt;br /&gt;
&lt;br /&gt;
# have a suitable partition on the disk - say partition #3&lt;br /&gt;
# this partition will show up as sde3 on my host machine and sda3 on the atom&lt;br /&gt;
# mkfs.ext3 /dev/sde3&lt;br /&gt;
# mount /dev/sde3 /mnt/target&lt;br /&gt;
# mount -o loop tmp/deploy/images/core-image-sato-sdk.ext3 /mnt/target-ext3&lt;br /&gt;
# cp -a /mnt/target-ext3/* /mnt/target&lt;br /&gt;
# grub-install --recheck --root-directory=/mnt/target /dev/sde&lt;br /&gt;
&lt;br /&gt;
If grub install passed, copy the following to /mnt/target/boot/grub/grub.cfg&lt;br /&gt;
&lt;br /&gt;
 set default=&amp;quot;0&amp;quot;&lt;br /&gt;
 set timeout=&amp;quot;30&amp;quot;&lt;br /&gt;
 &lt;br /&gt;
 menuentry &#039;Yocto SDK&#039; {&lt;br /&gt;
       insmod part_msdos&lt;br /&gt;
       insmod ext2&lt;br /&gt;
       set root=&#039;(hd0,msdos3)&#039;&lt;br /&gt;
       linux /boot/bzImage root=/dev/sda3&lt;br /&gt;
 }&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Thats it - this should boot.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Q: How do I put my recipe into Yocto? ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;A:&#039;&#039;&#039; Let&#039;s use the Hello World example from Section 3.1.2 of the Yocto Project Reference Manual and expand on it.&lt;br /&gt;
&lt;br /&gt;
* In this example, I&#039;ll start with a new meta layer named &amp;quot;meta-jfa&amp;quot; in the Yocto Project files directory, which is named &amp;quot;poky&amp;quot;.  Then, I will add the new recipe and build the image, which is named &amp;quot;core-image-minimal&amp;quot;.  I will build it using the autotooled package option.  Once built, the image will have the “hello” application.&lt;br /&gt;
&lt;br /&gt;
;Step One&lt;br /&gt;
:Create the following directory structure in the ~/poky directory. I&#039;ll use my initials to denote the layer and recipe name:&lt;br /&gt;
 &lt;br /&gt;
 mkdir meta-jfa&lt;br /&gt;
 mkdir meta-jfa/conf&lt;br /&gt;
 mkdir meta-jfa/recipes-jfa&lt;br /&gt;
 mkdir meta-jfa/recipes-jfa/hello&lt;br /&gt;
&lt;br /&gt;
;Step Two&lt;br /&gt;
:Next, to make sure the recipe gets searched and located, I&#039;ll create the layer.conf file in the meta-jfa/conf directory as follows:&lt;br /&gt;
&lt;br /&gt;
 # We have a conf and classes directory, add to BBPATH &lt;br /&gt;
 BBPATH := &amp;quot;${BBPATH}:${LAYERDIR}&amp;quot; &lt;br /&gt;
 # We have a packages directory, add to BBFILES &lt;br /&gt;
 BBFILES := &amp;quot;${BBFILES} ${LAYERDIR}/recipes-*/*/*.bb \ &lt;br /&gt;
            ${LAYERDIR}/recipes-*/*/*.bbappend&amp;quot; &lt;br /&gt;
 BBFILE_COLLECTIONS += &amp;quot;jfa&amp;quot; &lt;br /&gt;
 BBFILE_PATTERN_jfa := &amp;quot;^${LAYERDIR}/&amp;quot; &lt;br /&gt;
 BBFILE_PRIORITY_jfa := &amp;quot;5&amp;quot;&lt;br /&gt;
&lt;br /&gt;
;Step Three&lt;br /&gt;
:Now I need to put the recipe (.bb) file into the right directory.  So, I will put the file hello_2.7.bb into the meta-jfa/recipes-jfa/hello directory. I picked version 2.7 of the hello program by going to the gnu site for the application (ftp://ftp.gnu.org/gnu/hello/) and downloading it to checkout the version I wanted to include. hello-2.7.tar.gz is the most current. I downloaded it locally and expanded it to look at the license information.  The hello_2.7.bb file contains the following:&lt;br /&gt;
&lt;br /&gt;
 DESCRIPTION = &amp;quot;GNU Helloworld application&amp;quot; &lt;br /&gt;
 SECTION = &amp;quot;examples&amp;quot; &lt;br /&gt;
 LICENSE = &amp;quot;GPLv3+&amp;quot; &lt;br /&gt;
 LIC_FILES_CHKSUM = &amp;quot;file://COPYING;md5=d32239bcb673463ab874e80d47fae504&amp;quot; &lt;br /&gt;
 PR = &amp;quot;r0&amp;quot; &lt;br /&gt;
 SRC_URI = &amp;quot;${GNU_MIRROR}/hello/hello-${PV}.tar.gz&amp;quot; &lt;br /&gt;
 inherit autotools gettext &lt;br /&gt;
:Here is some explanation for a few of the recipe statements:&lt;br /&gt;
:* LIC_FILES_CHKSUM =  is required and, using file location defaults, points to the COPYING file that is part of the tarball that is downloaded from the SRC_URI address. The md5= part of the statement is generated by running “md5sum COPYING” against the COPYING file I downloaded to examine.&lt;br /&gt;
:* ${PV} in the SRC_URI statement is picked up from the part of the recipe file name after the “_”. In this case PV =2.7.&lt;br /&gt;
&lt;br /&gt;
;Step Four&lt;br /&gt;
:The recipe is built, so now I can run it:&lt;br /&gt;
&lt;br /&gt;
 cd ~/poky&lt;br /&gt;
 source oe-init-build-env build-hello.  &lt;br /&gt;
&lt;br /&gt;
;Step Five&lt;br /&gt;
:Before I can use BitBake I need to edit two files.  Sourcing the oe-init-build-env file above leaves me in the build-hello directory.  Before issuing the bitbake command I need to edit the files conf/local.conf and conf/bblayers.conf in that build-hello directory.  The bblayers.conf needs to have the one line added to include the layer you created.&lt;br /&gt;
&lt;br /&gt;
 # LAYER_CONF_VERSION is increased each time build/conf/bblayers.conf &lt;br /&gt;
 # changes incompatibly &lt;br /&gt;
 LCONF_VERSION = &amp;quot;4&amp;quot; &lt;br /&gt;
 BBFILES ?= &amp;quot;&amp;quot; &lt;br /&gt;
 BBLAYERS = &amp;quot; \ &lt;br /&gt;
   /home/jim/poky/meta \ &lt;br /&gt;
   /home/jim/poky/meta-yocto \ &lt;br /&gt;
   /home/jim/poky/meta-jfa \&lt;br /&gt;
 &amp;quot;&lt;br /&gt;
&lt;br /&gt;
;Step Six&lt;br /&gt;
:The conf/local.conf file needs to have the parallel processing lines edited to speed up the baking on multicore systems.  I can do that by uncommenting the BB_NUMBER_THREADS and PARALLEL_MAKE variables.  Generally, I would set them equal to twice the number of cores used by my host machine.  By default, the MACHINE variable is set to qemux86 and for this example is fine.  I need to add a line to include the hello package I am building into the image by adding the following line:&lt;br /&gt;
&lt;br /&gt;
 IMAGE_INSTALL_append = &amp;quot; hello&amp;quot;&lt;br /&gt;
&lt;br /&gt;
;Step Seven&lt;br /&gt;
:Now I can bake it with this command:&lt;br /&gt;
 bitbake core-image-minimal&lt;br /&gt;
;Step Eight&lt;br /&gt;
:Once the image is built, I can test it by starting the QEMU emulator:&lt;br /&gt;
&lt;br /&gt;
 runqemu qemux86&lt;br /&gt;
&lt;br /&gt;
;Step Nine&lt;br /&gt;
:Once the emulator comes up, login as root with no password.  Then, at the prompt, enter &amp;quot;hello&amp;quot; to run your application.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Q: How do I setup Intel&amp;amp;reg; Atom&amp;amp;trade; Processor E6xx based system for media playback? ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;A:&#039;&#039;&#039; To playback media files on an Atom E6xx processor, you need to have the EMGD GFX driver installed.  There is a README on this installation in the meta-crownbay directory. However, the official support for EMGD with accelerated 3D and media decode is scheduled for release 1.2, but is in the git repository now, so you need to start with branch, &amp;quot;master&amp;quot; of both the poky and meta-intel repository. And you will need the Intel Crownbay reference platform for the Atom E6xx processor or similar hardware.&lt;br /&gt;
&lt;br /&gt;
; Step 1&lt;br /&gt;
Follow the Appendix A example in the Yocto Project Development Manual, but instead of editing out the crownbay references and using the crownbay-noemgd, you do the opposite.&lt;br /&gt;
&lt;br /&gt;
One edit you need to add to the Appendix A instructions is for the file ~/poky/meta-intel/meta-mymachine/conf/mymachine.conf.  You need to add the following statement to include audio features needed for the audio part of the videos:&lt;br /&gt;
 MACHINE_FEATURES += &amp;quot;alsa&amp;quot;&lt;br /&gt;
&lt;br /&gt;
; Step 2&lt;br /&gt;
In the Appendix A example a couple of changes are needed to the conf/local.conf and conf/bblayers.conf file edits from the standard example. The bblayers.conf file BBLAYERS statement should look like below, except correct the absolute path to match your system:&lt;br /&gt;
 BBLAYERS ?= &amp;quot; \&lt;br /&gt;
  /home/jim/poky/meta \&lt;br /&gt;
  /home/jim/poky/meta-yocto \&lt;br /&gt;
  /home/jim/poky/meta-intel \&lt;br /&gt;
  /home/jim/poky/meta-intel/meta-mymachine \&lt;br /&gt;
  &amp;quot;&lt;br /&gt;
The local.conf file should have some statements in addition to what the Appendix A used:&lt;br /&gt;
 LICENSE_FLAGS_WHITELIST = &amp;quot;license_emgd-driver-bin_1.10&amp;quot;&lt;br /&gt;
&lt;br /&gt;
 # The 2 statements below allow the playing of MP3 files. &lt;br /&gt;
 # Not specific to videos, but usually included on media use systems.&lt;br /&gt;
 LICENSE_FLAGS_WHITELIST += &amp;quot;commercial&amp;quot;&lt;br /&gt;
 POKY_EXTRA_INSTALL += &amp;quot;gst-fluendo-mp3&amp;quot;&lt;br /&gt;
&lt;br /&gt;
 # add debug development tweaks and test applications, which include amixer, aplay, arecord, etc.&lt;br /&gt;
 EXTRA_IMAGE_FEATURES = &amp;quot;debug-tweaks tools-testapps&amp;quot;&lt;br /&gt;
; Step 3&lt;br /&gt;
After bitbaking the core-image-sato image, I put the .ext3 image on a hard drive per the above How Do I. I also added some h.264, mp4, m4a, and mp3 files to play with before moving the hard drive to the target hardware system.&lt;br /&gt;
&lt;br /&gt;
I used both the Sato GUI Music and Video players to play the files.&lt;br /&gt;
&lt;br /&gt;
That&#039;s all there is to it.&lt;br /&gt;
&lt;br /&gt;
==Q: How do I tweak my build system and BitBake configuration for optimal build time as well as provide some guidance on how to collect build metrics and identify bottlenecks. ? ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;A:&#039;&#039;&#039; You should read the [https://wiki.yoctoproject.org/wiki/Build_Performance Build Performance] wiki page.  It provides general tips, a description of the bb-matrix script used for collecting relevant build metrics, a description of how to enable buildstats to generate build performance log data, and a description of how best to apply parallelism to the build.&lt;br /&gt;
&lt;br /&gt;
==Q: How do I get the networking to function on an Acer Aspire One n450 based netbook when using the meta-n450 BSP? ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;A:&#039;&#039;&#039; While the n450 BSP will boot on the Acer AO532h netbook, the BSP does not enable the Atheros AR5B95 Wireless and AR8132 fast ethernet adapters. The Linux Yocto 3.2 kernel has these drivers, but they are not enabled. All you have to do is to create a Config Fragment file with a .cfg extension in a new directory called &#039;linux-yocto&#039; in the BSP recipes-kernel/linux directory. The new &#039;linux-yocto&#039; directory will be at the same level as the linux-yocto_3.2.bbappend file.  You will also need to add the following statement to the .bbappend file:&lt;br /&gt;
&lt;br /&gt;
SRC_URI += &amp;quot;file://myconfig.cfg&amp;quot;&lt;br /&gt;
&lt;br /&gt;
The recipes-kernel/linux/linux-yocto/myconfig.cfg needs to contain the following 2 lines:&lt;br /&gt;
&lt;br /&gt;
CONFIG_ATH9K_PCI=y&lt;br /&gt;
&lt;br /&gt;
CONFIG_ATL1C=y&lt;br /&gt;
&lt;br /&gt;
==Q: How do I build the build appliance? ==&lt;br /&gt;
&#039;&#039;&#039;A:&#039;&#039;&#039;  Update the MACHINE variable to &amp;quot;qemux86-64&amp;quot; or &amp;quot;qemux86&amp;quot; in your &amp;lt;code&amp;gt;conf/local.conf&amp;lt;/code&amp;gt; :&lt;br /&gt;
&lt;br /&gt;
Then, run this command:&lt;br /&gt;
  # bitbake build-appliance-image&lt;br /&gt;
&lt;br /&gt;
The resulting images (*.vmdk, *.vmx, *.vmxf) will be present in the &amp;quot;tmp/deploy/images&amp;quot; folder&lt;br /&gt;
ie: &lt;br /&gt;
&lt;br /&gt;
  # unzip Yocto_Build_Appliance.zip&lt;br /&gt;
  # cd Yocto_Build_Appliance&lt;br /&gt;
  # ls &lt;br /&gt;
    Yocto_Build_Appliance.vmdk  &lt;br /&gt;
    Yocto_Build_Appliance.vmx  &lt;br /&gt;
    Yocto_Build_Appliance.vmxf&lt;br /&gt;
&lt;br /&gt;
==Q: How do I build an image without GPLv3 Licensed packages ? ==&lt;br /&gt;
&#039;&#039;&#039;A:&#039;&#039;&#039;  Add this line &#039;INCOMPATIBLE_LICENSE = &amp;quot;GPLv3&amp;quot;&#039; in your &amp;lt;code&amp;gt;conf/local.conf&amp;lt;/code&amp;gt; :&lt;br /&gt;
&lt;br /&gt;
Then, build the image:&lt;br /&gt;
  # bitbake &amp;lt;image-name&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Q: How do I ensure that I am using the latest upstream version of the package? ==&lt;br /&gt;
&#039;&#039;&#039;A:&#039;&#039;&#039; Add this line &#039;INHERIT += &amp;quot;distrodata&amp;quot;&#039; in your &amp;lt;code&amp;gt;conf/local.conf&amp;lt;/code&amp;gt; :&lt;br /&gt;
&lt;br /&gt;
After that, run this command in the build directory:&lt;br /&gt;
  # bitbake -c checkpkg &amp;lt;package&amp;gt;&lt;br /&gt;
Then, check the &#039;Version&#039; and &#039;Upver&#039; fields in the below listed file: &lt;br /&gt;
  # gedit tmp/log/checkpkg.csv&lt;br /&gt;
&lt;br /&gt;
If those versions are same, then we have the latest upstream version of package&lt;br /&gt;
&lt;br /&gt;
==Q: How do I get a list of CVEs patched? ==&lt;br /&gt;
&#039;&#039;&#039;A:&#039;&#039;&#039; &amp;gt; cve-check tool is available from 2.2 release (poky/meta/recipes-devtools/cve-check-tool)&lt;br /&gt;
&lt;br /&gt;
To run it just inherit the class in conf/local.conf file:&lt;br /&gt;
&lt;br /&gt;
INHERIT += &amp;quot;cve-check&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Source and run &lt;br /&gt;
# bitbake -c cve_check openssl   &lt;br /&gt;
# bitbake core-image-sato   &lt;br /&gt;
# bitbake -k -c cve_check universe  &lt;br /&gt;
&lt;br /&gt;
EX:&lt;br /&gt;
bitbake -k -c cve_check universe&lt;br /&gt;
&lt;br /&gt;
log files are created under &lt;br /&gt;
unzip/1_6.0-r5/cve/cve.log&lt;br /&gt;
gnutls/3.5.3-r0/cve/cve.log&lt;br /&gt;
glibc/2.24-r0/cve/cve.log&lt;br /&gt;
glibc-initial/2.24-r0/cve/cve.log&lt;br /&gt;
foomatic-filters/4.0.17-r1/cve/cve.log&lt;br /&gt;
bzip2/1.0.6-r5/cve/cve.log&lt;br /&gt;
libxml2/2.9.4-r0/cve/cve.log&lt;br /&gt;
....&lt;br /&gt;
&lt;br /&gt;
Example of log file:&lt;br /&gt;
PACKAGE NAME: perl&lt;br /&gt;
PACKAGE VERSION: 5.22.1&lt;br /&gt;
CVE: CVE-2016-1238&lt;br /&gt;
CVE STATUS: Patched&lt;br /&gt;
CVE SUMMARY:  ....&lt;br /&gt;
....&lt;br /&gt;
CVSS v2 BASE SCORE: 7.2&lt;br /&gt;
VECTOR: LOCAL&lt;br /&gt;
MORE INFORMATION: https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-1238&lt;/div&gt;</summary>
		<author><name>SonaSarmadi</name></author>
	</entry>
	<entry>
		<id>https://wiki.yoctoproject.org/wiki/index.php?title=Security&amp;diff=17330</id>
		<title>Security</title>
		<link rel="alternate" type="text/html" href="https://wiki.yoctoproject.org/wiki/index.php?title=Security&amp;diff=17330"/>
		<updated>2016-01-28T06:38:36Z</updated>

		<summary type="html">&lt;p&gt;SonaSarmadi: /* Workflow of Yocto Project&amp;#039;s bugzilla */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Since the Yocto Project is intended to be flexible and meet the needs of many applications, we leave policy-making decisions around security to our end users. Our goal instead is to ship each release with metadata that follows best practices in that we do not release recipe versions which are known to have significant security vulnerabilities. Generally this is done by upgrading recipes to newer versions that are no longer vulnerable to these issues. &lt;br /&gt;
&lt;br /&gt;
Upgrading recipes to the newer versions in the maintenance branches is not always easy, this is why we provide a patch for the existing version instead if we detect a vulnerability in a package. The patches are added to the recipes, see example below:&lt;br /&gt;
&lt;br /&gt;
  poky/recipes-connectivity/bind/bind_9.9.5.bb&lt;br /&gt;
  &lt;br /&gt;
  SRC_URI = &amp;quot;ftp://ftp.isc.org/isc/bind9/${PV}/${BPN}-${PV}.tar.gz \&lt;br /&gt;
           file://conf.patch \&lt;br /&gt;
           ...&lt;br /&gt;
           file://bind9_9_5-CVE-2014-8500.patch \&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
We are tracking security vulnerabilities in the Yocto Project against the [http://nvd.nist.gov/home.cfm National Vulnerability Database]. &lt;br /&gt;
&lt;br /&gt;
We also track CVEs reported to the oss-security list (Open Source Software Security) http://www.openwall.com/lists/oss-security/&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Yocto Security Team ==&lt;br /&gt;
 &lt;br /&gt;
The purpose of creating a security team in the Yocto project is to discuss, sync and organize security related activities.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The team&#039;s main responsibilities among others are:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
*  Scanning of security forums/mailing list(s) to detect security vulnerabilities reported by community&lt;br /&gt;
*  Responsible for fixing CVEs in the Yocto releases &amp;amp; maintained branches&lt;br /&gt;
*  Evaluation of tools for security tests &lt;br /&gt;
*  Responsible for security related info in the Yocto documentations&lt;br /&gt;
*  Hardening of Yocto release&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;How to Contact Yocto&#039;s security team Securely&#039;&#039;&#039;&lt;br /&gt;
---------------------------------------------&lt;br /&gt;
We have set up two security-related mailing lists:&lt;br /&gt;
*  &#039;&#039;&#039;Public List&#039;&#039;&#039;&lt;br /&gt;
: yocto [dash] security [at] yoctoproject[dot] org&lt;br /&gt;
: This is a public mailing list for anyone to subscribe to. This list is an open list to discuss public security issues/patches.&lt;br /&gt;
&lt;br /&gt;
*  &#039;&#039;&#039;Private List&#039;&#039;&#039;&lt;br /&gt;
: security [at] yoctoprojct [dot] org (Forwards to the following addresses)&lt;br /&gt;
 &lt;br /&gt;
: - &#039;&#039;&#039;sona [dot] sarmadi [at] enea [dot] com&#039;&#039;&#039; &lt;br /&gt;
: - &#039;&#039;&#039;mhalstead [at] linuxfoundation [dot] org&#039;&#039;&#039; &lt;br /&gt;
: For secure communications, please send your messages encrypted to both using the following GPG keys. &lt;br /&gt;
: Remember message headers are not encrypted so do not include sensitive information in the subject line.&lt;br /&gt;
&lt;br /&gt;
: Download public keys: [https://pgp.mit.edu/pks/lookup?op=vindex&amp;amp;search=0x60FFAF3315BD5928 Sona Sarmadi] [https://pgp.mit.edu/pks/lookup?op=vindex&amp;amp;search=0x3373170601861969 Michael Halstead]&lt;br /&gt;
&lt;br /&gt;
Anyone can contribute with security patches as before, but those volunteering to this security team will sync/organize security related activities and take more responsibility.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;What you should do if you find a security vulnerability&#039;&#039;&#039;&lt;br /&gt;
---------------------------------------------&lt;br /&gt;
If you find a security flaw; a crash, an information leakage, or anything that can have a security impact if exploited in any Open Source packages used by the Yocto Project, please report this to the Yocto Security Team. If you prefer to contact the upstream project directly, please send a copy to the security team at Yocto as well.&lt;br /&gt;
If you believe this is sensitive information, please report the vulnerability in a secure way, i.e. encrypt the email and send it to the private list. This ensures that the exploit is not leaked and exploited before a response/fix has been generated.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;What Yocto Security Team does when it receives a security vulnerability&#039;&#039;&#039;&lt;br /&gt;
---------------------------------------------&lt;br /&gt;
The team performs a quick analysis and reports the flaw to the upstream project. Normally the upstream projects analyzes the problem. If they deem that it is a real security problem in their software, the project will  email the linux-distros mailing list and notify all the big Linux distributions/vendors about the existence of this vulnerability/flaw. These mailing lists are normally non-public. The project and people on the linux-distros can then agree on a release date when the flaw should be made public.&lt;br /&gt;
There is also sometimes some coordination for handling patches or backporting of patches etc, or just understanding the problem or what caused it.&lt;br /&gt;
&lt;br /&gt;
When the security issue is finally to be made public, normally upstream project is responsible to contact Mitre (cve.mitre.org) to get a CVE number assigned to it and copy the information to other Opens Source Security mailing lists to inform the whole world of the vulnerability.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;If an upstream project does not respond quickly&#039;&#039;&#039;&lt;br /&gt;
---------------------------------------------&lt;br /&gt;
If an upstream project does not fix the problem the Yocto&#039;s Security Team will contact linux-distros and community and together try to solve the vulnerability as quickly as possible. &lt;br /&gt;
Normally big Linux vendors fix the problem if the problem affects their products.&lt;br /&gt;
Chances are that everyone from the enterprise distros to the commercial Yocto vendors will get fixes done first, but it is nice to have saftey net for issues that really are specific to oe and embedded.&lt;br /&gt;
&lt;br /&gt;
== Branches maintained with security fixes  ==&lt;br /&gt;
See [https://wiki.yoctoproject.org/wiki/Stable_branch_maintenance Stable branches maintenance]for detailed info regarding the policies and maintenance of Stable branch.&lt;br /&gt;
&lt;br /&gt;
Versions in grey are no longer actively maintained with security patches, but well-tested patches may still be accepted for them.)&lt;br /&gt;
&lt;br /&gt;
== Policy for updating package versions for the stable branches ==&lt;br /&gt;
The Yocto project purposely limits updating of packages on oe-stable releases to items that address security problems (e.g. CVE&#039;s). For packages like qemu we avoid updating between from one &amp;quot;dot.dot&amp;quot; to another related &amp;quot;dot.dot&amp;quot; version since it has been seen in the past that even with &amp;quot;simple&amp;quot; updates, things can go wrong and a lot more testing is required to verify compatibility. Better to only add CVE patches to fix specific point problems.&lt;br /&gt;
&lt;br /&gt;
== Kernel security patches ==&lt;br /&gt;
&lt;br /&gt;
Kernel security patches are backported to Linux-yoco kernels regularly from https://www.kernel.org/&lt;br /&gt;
=== Linux-yocto ===&lt;br /&gt;
linux-yocto_3.10 &amp;amp; linux-yocto_3.14 (maintainer: Bruce Ashfield)&lt;br /&gt;
&lt;br /&gt;
=== Vendor kernels ===&lt;br /&gt;
Kernel security patches are also backported to Linux-vendor kernels from https://www.kernel.org/&lt;br /&gt;
 &lt;br /&gt;
* meta-intel (meta-intel uses Linux-yocto)&lt;br /&gt;
* meta-fsl-ppc (meta-freescale@yoctoproject.org)&lt;br /&gt;
* meta-xilinx (meta-xilinx@lists.yoctoproject.org)&lt;br /&gt;
* meta-ti (meta-ti@yoctoproject.org)&lt;br /&gt;
* etc&lt;br /&gt;
&lt;br /&gt;
== How to test ==&lt;br /&gt;
 &lt;br /&gt;
If there is any test case for the vulnerability by the upstream project or community&lt;br /&gt;
 - Run the test to reproduce the problem and verify the correction. &lt;br /&gt;
 - Run the regression test&lt;br /&gt;
&lt;br /&gt;
If there isn’t any test case and it is complicated and time consuming to write a testcase&lt;br /&gt;
 - Run the regressions test&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Regression test&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Build the core image for at least two architectures (preferably one big-endian and one little-endian)&lt;br /&gt;
* Run ptest (for those branches/packages that there is ptest mechanism)&lt;br /&gt;
&lt;br /&gt;
== Patch name convention and commit message ==&lt;br /&gt;
&lt;br /&gt;
Security patches like any Open Source developmen should follow the openembedded&#039;s Guidelines:&lt;br /&gt;
*[http://openembedded.org/wiki/Commit_Patch_Message_Guidelines Commit Patch Message Guidelines]&lt;br /&gt;
*[https://www.kernel.org/doc/Documentation/SecurityBugs kernel security bugs policy] &lt;br /&gt;
&lt;br /&gt;
Note that security patches should have CVE: tag and reference to the CVE identifier both in the patch file/s and the commit message.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Ex upstream patch:&#039;&#039;&#039; &lt;br /&gt;
&lt;br /&gt;
Please change the upstream patch &amp;quot;wscanf-allocates-too-little-memory.patch&amp;quot; to &amp;quot;CVE-2015-1472.patch&amp;quot; (or CVE-2015-1472-wscanf-allocates-too-little-memory.patch). Keep the original commit message and add reference to the CVE and upstream patch.&lt;br /&gt;
 &lt;br /&gt;
    &amp;lt;Keep the original commit message&amp;gt;&lt;br /&gt;
    &lt;br /&gt;
    &lt;br /&gt;
    Upstream-Status: Accepted &amp;lt;or Backport&amp;gt;&lt;br /&gt;
    CVE: CVE-2015-8370   &lt;br /&gt;
    &lt;br /&gt;
    Reference to upstream patch:&lt;br /&gt;
    https://sourceware.org/git/?p=glibc.git;a=patch;h=5bd80bfe9ca0d955bfbbc002781bc7b01b6bcb06&lt;br /&gt;
      &lt;br /&gt;
    Signed-off-by: Joe Developer &amp;lt;joe.developer@example.com&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Ex meta patch:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Please make sure to add the package name in the subject and the reference to the CVE. Example for the commit message: &lt;br /&gt;
&lt;br /&gt;
    bash: CVE-2014-6278 &amp;lt;if there are multiple CVEs list all&amp;gt;&lt;br /&gt;
    &lt;br /&gt;
    &amp;lt;short description&amp;gt;&lt;br /&gt;
    &lt;br /&gt;
    &amp;lt;[YOCTO #xxx] if there is any&amp;gt;&lt;br /&gt;
    &lt;br /&gt;
    References&lt;br /&gt;
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6278&lt;br /&gt;
    https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2014-6278&lt;br /&gt;
    xxxx&lt;br /&gt;
    &lt;br /&gt;
    Signed-off-by: &amp;lt;your email address&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Workflow of Yocto Project&#039;s bugzilla ==&lt;br /&gt;
&lt;br /&gt;
* After sending the patch to the mailing list, set to: &amp;quot;In progress review&amp;quot;&lt;br /&gt;
* Once merged, set to: &amp;quot;Resolved - Fixed&amp;quot;&lt;br /&gt;
&lt;br /&gt;
== Some security related links/useful tools ==&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
* [http://www.cvedetails.com CVE details] &lt;br /&gt;
* [http://www.cvedetails.com/vulnerability-list/vendor_id-33/product_id-47/year-2014/Linux-Linux-Kernel.html  CVE list, Linux kernel 2014]&lt;br /&gt;
* [https://www.yoctoproject.org/blogs/andrei-dinu/2013/meta-security-layer-now-available Meta-security-layer]&lt;br /&gt;
* [http://www.yoctoproject.org/docs/1.7/dev-manual/dev-manual.html#making-images-more-secure Making images more secure]&lt;br /&gt;
* [http://cvechecker.sourceforge.net Cvechecker]&lt;br /&gt;
&lt;br /&gt;
== Security Issues Addressed in Yocto Releases ==&lt;br /&gt;
&#039;&#039;&#039;Yocto 2.0 - Jethero&#039;&#039;&#039; &lt;br /&gt;
https://www.yoctoproject.org/downloads/core/jethro20&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Yocto 1.8.1 - Fido&#039;&#039;&#039; &lt;br /&gt;
https://www.yoctoproject.org/downloads/core/fido181&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Yocto 1.7.1 - Dizzy&#039;&#039;&#039; &lt;br /&gt;
https://www.yoctoproject.org/downloads/core/dizzy171&lt;/div&gt;</summary>
		<author><name>SonaSarmadi</name></author>
	</entry>
	<entry>
		<id>https://wiki.yoctoproject.org/wiki/index.php?title=Security&amp;diff=17329</id>
		<title>Security</title>
		<link rel="alternate" type="text/html" href="https://wiki.yoctoproject.org/wiki/index.php?title=Security&amp;diff=17329"/>
		<updated>2016-01-28T06:36:58Z</updated>

		<summary type="html">&lt;p&gt;SonaSarmadi: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Since the Yocto Project is intended to be flexible and meet the needs of many applications, we leave policy-making decisions around security to our end users. Our goal instead is to ship each release with metadata that follows best practices in that we do not release recipe versions which are known to have significant security vulnerabilities. Generally this is done by upgrading recipes to newer versions that are no longer vulnerable to these issues. &lt;br /&gt;
&lt;br /&gt;
Upgrading recipes to the newer versions in the maintenance branches is not always easy, this is why we provide a patch for the existing version instead if we detect a vulnerability in a package. The patches are added to the recipes, see example below:&lt;br /&gt;
&lt;br /&gt;
  poky/recipes-connectivity/bind/bind_9.9.5.bb&lt;br /&gt;
  &lt;br /&gt;
  SRC_URI = &amp;quot;ftp://ftp.isc.org/isc/bind9/${PV}/${BPN}-${PV}.tar.gz \&lt;br /&gt;
           file://conf.patch \&lt;br /&gt;
           ...&lt;br /&gt;
           file://bind9_9_5-CVE-2014-8500.patch \&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
We are tracking security vulnerabilities in the Yocto Project against the [http://nvd.nist.gov/home.cfm National Vulnerability Database]. &lt;br /&gt;
&lt;br /&gt;
We also track CVEs reported to the oss-security list (Open Source Software Security) http://www.openwall.com/lists/oss-security/&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Yocto Security Team ==&lt;br /&gt;
 &lt;br /&gt;
The purpose of creating a security team in the Yocto project is to discuss, sync and organize security related activities.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The team&#039;s main responsibilities among others are:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
*  Scanning of security forums/mailing list(s) to detect security vulnerabilities reported by community&lt;br /&gt;
*  Responsible for fixing CVEs in the Yocto releases &amp;amp; maintained branches&lt;br /&gt;
*  Evaluation of tools for security tests &lt;br /&gt;
*  Responsible for security related info in the Yocto documentations&lt;br /&gt;
*  Hardening of Yocto release&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;How to Contact Yocto&#039;s security team Securely&#039;&#039;&#039;&lt;br /&gt;
---------------------------------------------&lt;br /&gt;
We have set up two security-related mailing lists:&lt;br /&gt;
*  &#039;&#039;&#039;Public List&#039;&#039;&#039;&lt;br /&gt;
: yocto [dash] security [at] yoctoproject[dot] org&lt;br /&gt;
: This is a public mailing list for anyone to subscribe to. This list is an open list to discuss public security issues/patches.&lt;br /&gt;
&lt;br /&gt;
*  &#039;&#039;&#039;Private List&#039;&#039;&#039;&lt;br /&gt;
: security [at] yoctoprojct [dot] org (Forwards to the following addresses)&lt;br /&gt;
 &lt;br /&gt;
: - &#039;&#039;&#039;sona [dot] sarmadi [at] enea [dot] com&#039;&#039;&#039; &lt;br /&gt;
: - &#039;&#039;&#039;mhalstead [at] linuxfoundation [dot] org&#039;&#039;&#039; &lt;br /&gt;
: For secure communications, please send your messages encrypted to both using the following GPG keys. &lt;br /&gt;
: Remember message headers are not encrypted so do not include sensitive information in the subject line.&lt;br /&gt;
&lt;br /&gt;
: Download public keys: [https://pgp.mit.edu/pks/lookup?op=vindex&amp;amp;search=0x60FFAF3315BD5928 Sona Sarmadi] [https://pgp.mit.edu/pks/lookup?op=vindex&amp;amp;search=0x3373170601861969 Michael Halstead]&lt;br /&gt;
&lt;br /&gt;
Anyone can contribute with security patches as before, but those volunteering to this security team will sync/organize security related activities and take more responsibility.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;What you should do if you find a security vulnerability&#039;&#039;&#039;&lt;br /&gt;
---------------------------------------------&lt;br /&gt;
If you find a security flaw; a crash, an information leakage, or anything that can have a security impact if exploited in any Open Source packages used by the Yocto Project, please report this to the Yocto Security Team. If you prefer to contact the upstream project directly, please send a copy to the security team at Yocto as well.&lt;br /&gt;
If you believe this is sensitive information, please report the vulnerability in a secure way, i.e. encrypt the email and send it to the private list. This ensures that the exploit is not leaked and exploited before a response/fix has been generated.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;What Yocto Security Team does when it receives a security vulnerability&#039;&#039;&#039;&lt;br /&gt;
---------------------------------------------&lt;br /&gt;
The team performs a quick analysis and reports the flaw to the upstream project. Normally the upstream projects analyzes the problem. If they deem that it is a real security problem in their software, the project will  email the linux-distros mailing list and notify all the big Linux distributions/vendors about the existence of this vulnerability/flaw. These mailing lists are normally non-public. The project and people on the linux-distros can then agree on a release date when the flaw should be made public.&lt;br /&gt;
There is also sometimes some coordination for handling patches or backporting of patches etc, or just understanding the problem or what caused it.&lt;br /&gt;
&lt;br /&gt;
When the security issue is finally to be made public, normally upstream project is responsible to contact Mitre (cve.mitre.org) to get a CVE number assigned to it and copy the information to other Opens Source Security mailing lists to inform the whole world of the vulnerability.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;If an upstream project does not respond quickly&#039;&#039;&#039;&lt;br /&gt;
---------------------------------------------&lt;br /&gt;
If an upstream project does not fix the problem the Yocto&#039;s Security Team will contact linux-distros and community and together try to solve the vulnerability as quickly as possible. &lt;br /&gt;
Normally big Linux vendors fix the problem if the problem affects their products.&lt;br /&gt;
Chances are that everyone from the enterprise distros to the commercial Yocto vendors will get fixes done first, but it is nice to have saftey net for issues that really are specific to oe and embedded.&lt;br /&gt;
&lt;br /&gt;
== Branches maintained with security fixes  ==&lt;br /&gt;
See [https://wiki.yoctoproject.org/wiki/Stable_branch_maintenance Stable branches maintenance]for detailed info regarding the policies and maintenance of Stable branch.&lt;br /&gt;
&lt;br /&gt;
Versions in grey are no longer actively maintained with security patches, but well-tested patches may still be accepted for them.)&lt;br /&gt;
&lt;br /&gt;
== Policy for updating package versions for the stable branches ==&lt;br /&gt;
The Yocto project purposely limits updating of packages on oe-stable releases to items that address security problems (e.g. CVE&#039;s). For packages like qemu we avoid updating between from one &amp;quot;dot.dot&amp;quot; to another related &amp;quot;dot.dot&amp;quot; version since it has been seen in the past that even with &amp;quot;simple&amp;quot; updates, things can go wrong and a lot more testing is required to verify compatibility. Better to only add CVE patches to fix specific point problems.&lt;br /&gt;
&lt;br /&gt;
== Kernel security patches ==&lt;br /&gt;
&lt;br /&gt;
Kernel security patches are backported to Linux-yoco kernels regularly from https://www.kernel.org/&lt;br /&gt;
=== Linux-yocto ===&lt;br /&gt;
linux-yocto_3.10 &amp;amp; linux-yocto_3.14 (maintainer: Bruce Ashfield)&lt;br /&gt;
&lt;br /&gt;
=== Vendor kernels ===&lt;br /&gt;
Kernel security patches are also backported to Linux-vendor kernels from https://www.kernel.org/&lt;br /&gt;
 &lt;br /&gt;
* meta-intel (meta-intel uses Linux-yocto)&lt;br /&gt;
* meta-fsl-ppc (meta-freescale@yoctoproject.org)&lt;br /&gt;
* meta-xilinx (meta-xilinx@lists.yoctoproject.org)&lt;br /&gt;
* meta-ti (meta-ti@yoctoproject.org)&lt;br /&gt;
* etc&lt;br /&gt;
&lt;br /&gt;
== How to test ==&lt;br /&gt;
 &lt;br /&gt;
If there is any test case for the vulnerability by the upstream project or community&lt;br /&gt;
 - Run the test to reproduce the problem and verify the correction. &lt;br /&gt;
 - Run the regression test&lt;br /&gt;
&lt;br /&gt;
If there isn’t any test case and it is complicated and time consuming to write a testcase&lt;br /&gt;
 - Run the regressions test&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Regression test&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Build the core image for at least two architectures (preferably one big-endian and one little-endian)&lt;br /&gt;
* Run ptest (for those branches/packages that there is ptest mechanism)&lt;br /&gt;
&lt;br /&gt;
== Patch name convention and commit message ==&lt;br /&gt;
&lt;br /&gt;
Security patches like any Open Source developmen should follow the openembedded&#039;s Guidelines:&lt;br /&gt;
*[http://openembedded.org/wiki/Commit_Patch_Message_Guidelines Commit Patch Message Guidelines]&lt;br /&gt;
*[https://www.kernel.org/doc/Documentation/SecurityBugs kernel security bugs policy] &lt;br /&gt;
&lt;br /&gt;
Note that security patches should have CVE: tag and reference to the CVE identifier both in the patch file/s and the commit message.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Ex upstream patch:&#039;&#039;&#039; &lt;br /&gt;
&lt;br /&gt;
Please change the upstream patch &amp;quot;wscanf-allocates-too-little-memory.patch&amp;quot; to &amp;quot;CVE-2015-1472.patch&amp;quot; (or CVE-2015-1472-wscanf-allocates-too-little-memory.patch). Keep the original commit message and add reference to the CVE and upstream patch.&lt;br /&gt;
 &lt;br /&gt;
    &amp;lt;Keep the original commit message&amp;gt;&lt;br /&gt;
    &lt;br /&gt;
    &lt;br /&gt;
    Upstream-Status: Accepted &amp;lt;or Backport&amp;gt;&lt;br /&gt;
    CVE: CVE-2015-8370   &lt;br /&gt;
    &lt;br /&gt;
    Reference to upstream patch:&lt;br /&gt;
    https://sourceware.org/git/?p=glibc.git;a=patch;h=5bd80bfe9ca0d955bfbbc002781bc7b01b6bcb06&lt;br /&gt;
      &lt;br /&gt;
    Signed-off-by: Joe Developer &amp;lt;joe.developer@example.com&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Ex meta patch:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Please make sure to add the package name in the subject and the reference to the CVE. Example for the commit message: &lt;br /&gt;
&lt;br /&gt;
    bash: CVE-2014-6278 &amp;lt;if there are multiple CVEs list all&amp;gt;&lt;br /&gt;
    &lt;br /&gt;
    &amp;lt;short description&amp;gt;&lt;br /&gt;
    &lt;br /&gt;
    &amp;lt;[YOCTO #xxx] if there is any&amp;gt;&lt;br /&gt;
    &lt;br /&gt;
    References&lt;br /&gt;
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6278&lt;br /&gt;
    https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2014-6278&lt;br /&gt;
    xxxx&lt;br /&gt;
    &lt;br /&gt;
    Signed-off-by: &amp;lt;your email address&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Workflow of Yocto Project&#039;s bugzilla ==&lt;br /&gt;
&lt;br /&gt;
After sending the patch to the mailing list, set to: &amp;quot;In progress review&amp;quot;&lt;br /&gt;
Once merged, set to: &amp;quot;Resolved - Fixed&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
== Some security related links/useful tools ==&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
* [http://www.cvedetails.com CVE details] &lt;br /&gt;
* [http://www.cvedetails.com/vulnerability-list/vendor_id-33/product_id-47/year-2014/Linux-Linux-Kernel.html  CVE list, Linux kernel 2014]&lt;br /&gt;
* [https://www.yoctoproject.org/blogs/andrei-dinu/2013/meta-security-layer-now-available Meta-security-layer]&lt;br /&gt;
* [http://www.yoctoproject.org/docs/1.7/dev-manual/dev-manual.html#making-images-more-secure Making images more secure]&lt;br /&gt;
* [http://cvechecker.sourceforge.net Cvechecker]&lt;br /&gt;
&lt;br /&gt;
== Security Issues Addressed in Yocto Releases ==&lt;br /&gt;
&#039;&#039;&#039;Yocto 2.0 - Jethero&#039;&#039;&#039; &lt;br /&gt;
https://www.yoctoproject.org/downloads/core/jethro20&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Yocto 1.8.1 - Fido&#039;&#039;&#039; &lt;br /&gt;
https://www.yoctoproject.org/downloads/core/fido181&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Yocto 1.7.1 - Dizzy&#039;&#039;&#039; &lt;br /&gt;
https://www.yoctoproject.org/downloads/core/dizzy171&lt;/div&gt;</summary>
		<author><name>SonaSarmadi</name></author>
	</entry>
	<entry>
		<id>https://wiki.yoctoproject.org/wiki/index.php?title=Security&amp;diff=17115</id>
		<title>Security</title>
		<link rel="alternate" type="text/html" href="https://wiki.yoctoproject.org/wiki/index.php?title=Security&amp;diff=17115"/>
		<updated>2016-01-19T11:18:09Z</updated>

		<summary type="html">&lt;p&gt;SonaSarmadi: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Since the Yocto Project is intended to be flexible and meet the needs of many applications, we leave policy-making decisions around security to our end users. Our goal instead is to ship each release with metadata that follows best practices in that we do not release recipe versions which are known to have significant security vulnerabilities. Generally this is done by upgrading recipes to newer versions that are no longer vulnerable to these issues. &lt;br /&gt;
&lt;br /&gt;
Upgrading recipes to the newer versions in the maintenance branches is not always easy, this is why we provide a patch for the existing version instead if we detect a vulnerability in a package. The patches are added to the recipes, see example below:&lt;br /&gt;
&lt;br /&gt;
  poky/recipes-connectivity/bind/bind_9.9.5.bb&lt;br /&gt;
  &lt;br /&gt;
  SRC_URI = &amp;quot;ftp://ftp.isc.org/isc/bind9/${PV}/${BPN}-${PV}.tar.gz \&lt;br /&gt;
           file://conf.patch \&lt;br /&gt;
           ...&lt;br /&gt;
           file://bind9_9_5-CVE-2014-8500.patch \&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
We are tracking security vulnerabilities in the Yocto Project against the [http://nvd.nist.gov/home.cfm National Vulnerability Database]. &lt;br /&gt;
&lt;br /&gt;
We also track CVEs reported to the oss-security list (Open Source Software Security) http://www.openwall.com/lists/oss-security/&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Yocto Security Team ==&lt;br /&gt;
 &lt;br /&gt;
The purpose of creating a security team in the Yocto project is to discuss, sync and organize security related activities.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The team&#039;s main responsibilities among others are:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
*  Scanning of security forums/mailing list(s) to detect security vulnerabilities reported by community&lt;br /&gt;
*  Responsible for fixing CVEs in the Yocto releases &amp;amp; maintained branches&lt;br /&gt;
*  Evaluation of tools for security tests &lt;br /&gt;
*  Responsible for security related info in the Yocto documentations&lt;br /&gt;
*  Hardening of Yocto release&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;How to Contact Yocto&#039;s security team Securely&#039;&#039;&#039;&lt;br /&gt;
---------------------------------------------&lt;br /&gt;
We have set up two security-related mailing lists:&lt;br /&gt;
*  &#039;&#039;&#039;Public List&#039;&#039;&#039;&lt;br /&gt;
: yocto [dash] security [at] yoctoproject[dot] org&lt;br /&gt;
: This is a public mailing list for anyone to subscribe to. This list is an open list to discuss public security issues/patches.&lt;br /&gt;
&lt;br /&gt;
*  &#039;&#039;&#039;Private List&#039;&#039;&#039;&lt;br /&gt;
: security [at] yoctoprojct [dot] org (Forwards to the following addresses)&lt;br /&gt;
 &lt;br /&gt;
: - &#039;&#039;&#039;sona [dot] sarmadi [at] enea [dot] com&#039;&#039;&#039; &lt;br /&gt;
: - &#039;&#039;&#039;mhalstead [at] linuxfoundation [dot] org&#039;&#039;&#039; &lt;br /&gt;
: For secure communications, please send your messages encrypted to both using the following GPG keys. &lt;br /&gt;
: Remember message headers are not encrypted so do not include sensitive information in the subject line.&lt;br /&gt;
&lt;br /&gt;
: Download public keys: [https://pgp.mit.edu/pks/lookup?op=vindex&amp;amp;search=0x60FFAF3315BD5928 Sona Sarmadi] [https://pgp.mit.edu/pks/lookup?op=vindex&amp;amp;search=0x3373170601861969 Michael Halstead]&lt;br /&gt;
&lt;br /&gt;
Anyone can contribute with security patches as before, but those volunteering to this security team will sync/organize security related activities and take more responsibility.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;What you should do if you find a security vulnerability&#039;&#039;&#039;&lt;br /&gt;
---------------------------------------------&lt;br /&gt;
If you find a security flaw; a crash, an information leakage, or anything that can have a security impact if exploited in any Open Source packages used by the Yocto Project, please report this to the Yocto Security Team. If you prefer to contact the upstream project directly, please send a copy to the security team at Yocto as well.&lt;br /&gt;
If you believe this is sensitive information, please report the vulnerability in a secure way, i.e. encrypt the email and send it to the private list. This ensures that the exploit is not leaked and exploited before a response/fix has been generated.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;What Yocto Security Team does when it receives a security vulnerability&#039;&#039;&#039;&lt;br /&gt;
---------------------------------------------&lt;br /&gt;
The team performs a quick analysis and reports the flaw to the upstream project. Normally the upstream projects analyzes the problem. If they deem that it is a real security problem in their software, the project will  email the linux-distros mailing list and notify all the big Linux distributions/vendors about the existence of this vulnerability/flaw. These mailing lists are normally non-public. The project and people on the linux-distros can then agree on a release date when the flaw should be made public.&lt;br /&gt;
There is also sometimes some coordination for handling patches or backporting of patches etc, or just understanding the problem or what caused it.&lt;br /&gt;
&lt;br /&gt;
When the security issue is finally to be made public, normally upstream project is responsible to contact Mitre (cve.mitre.org) to get a CVE number assigned to it and copy the information to other Opens Source Security mailing lists to inform the whole world of the vulnerability.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;If an upstream project does not respond quickly&#039;&#039;&#039;&lt;br /&gt;
---------------------------------------------&lt;br /&gt;
If an upstream project does not fix the problem the Yocto&#039;s Security Team will contact linux-distros and community and together try to solve the vulnerability as quickly as possible. &lt;br /&gt;
Normally big Linux vendors fix the problem if the problem affects their products.&lt;br /&gt;
Chances are that everyone from the enterprise distros to the commercial Yocto vendors will get fixes done first, but it is nice to have saftey net for issues that really are specific to oe and embedded.&lt;br /&gt;
&lt;br /&gt;
== Branches maintained with security fixes  ==&lt;br /&gt;
See [https://wiki.yoctoproject.org/wiki/Stable_branch_maintenance Stable branches maintenance]for detailed info regarding the policies and maintenance of Stable branch.&lt;br /&gt;
&lt;br /&gt;
Versions in grey are no longer actively maintained with security patches, but well-tested patches may still be accepted for them.)&lt;br /&gt;
&lt;br /&gt;
== Policy for updating package versions for the stable branches ==&lt;br /&gt;
The Yocto project purposely limits updating of packages on oe-stable releases to items that address security problems (e.g. CVE&#039;s). For packages like qemu we avoid updating between from one &amp;quot;dot.dot&amp;quot; to another related &amp;quot;dot.dot&amp;quot; version since it has been seen in the past that even with &amp;quot;simple&amp;quot; updates, things can go wrong and a lot more testing is required to verify compatibility. Better to only add CVE patches to fix specific point problems.&lt;br /&gt;
&lt;br /&gt;
== Kernel security patches ==&lt;br /&gt;
&lt;br /&gt;
Kernel security patches are backported to Linux-yoco kernels regularly from https://www.kernel.org/&lt;br /&gt;
=== Linux-yocto ===&lt;br /&gt;
linux-yocto_3.10 &amp;amp; linux-yocto_3.14 (maintainer: Bruce Ashfield)&lt;br /&gt;
&lt;br /&gt;
=== Vendor kernels ===&lt;br /&gt;
Kernel security patches are also backported to Linux-vendor kernels from https://www.kernel.org/&lt;br /&gt;
 &lt;br /&gt;
* meta-intel (meta-intel uses Linux-yocto)&lt;br /&gt;
* meta-fsl-ppc (meta-freescale@yoctoproject.org)&lt;br /&gt;
* meta-xilinx (meta-xilinx@lists.yoctoproject.org)&lt;br /&gt;
* meta-ti (meta-ti@yoctoproject.org)&lt;br /&gt;
* etc&lt;br /&gt;
&lt;br /&gt;
== How to test ==&lt;br /&gt;
 &lt;br /&gt;
If there is any test case for the vulnerability by the upstream project or community&lt;br /&gt;
 - Run the test to reproduce the problem and verify the correction. &lt;br /&gt;
 - Run the regression test&lt;br /&gt;
&lt;br /&gt;
If there isn’t any test case and it is complicated and time consuming to write a testcase&lt;br /&gt;
 - Run the regressions test&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Regression test&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Build the core image for at least two architectures (preferably one big-endian and one little-endian)&lt;br /&gt;
* Run ptest (for those branches/packages that there is ptest mechanism)&lt;br /&gt;
&lt;br /&gt;
== Patch name convention and commit message ==&lt;br /&gt;
&lt;br /&gt;
Security patches like any Open Source developmen should follow the openembedded&#039;s Guidelines:&lt;br /&gt;
*[http://openembedded.org/wiki/Commit_Patch_Message_Guidelines Commit Patch Message Guidelines]&lt;br /&gt;
*[https://www.kernel.org/doc/Documentation/SecurityBugs kernel security bugs policy] &lt;br /&gt;
&lt;br /&gt;
Note that security patches should have CVE: tag and reference to the CVE identifier both in the patch file/s and the commit message.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Ex upstream patch:&#039;&#039;&#039; &lt;br /&gt;
&lt;br /&gt;
Please change the upstream patch &amp;quot;wscanf-allocates-too-little-memory.patch&amp;quot; to &amp;quot;CVE-2015-1472.patch&amp;quot; (or CVE-2015-1472-wscanf-allocates-too-little-memory.patch). Keep the original commit message and add reference to the CVE and upstream patch.&lt;br /&gt;
 &lt;br /&gt;
    &amp;lt;Keep the original commit message&amp;gt;&lt;br /&gt;
    &lt;br /&gt;
    &lt;br /&gt;
    Upstream-Status: Accepted &amp;lt;or Backport&amp;gt;&lt;br /&gt;
    CVE: CVE-2015-8370   &lt;br /&gt;
    &lt;br /&gt;
    Reference to upstream patch:&lt;br /&gt;
    https://sourceware.org/git/?p=glibc.git;a=patch;h=5bd80bfe9ca0d955bfbbc002781bc7b01b6bcb06&lt;br /&gt;
      &lt;br /&gt;
    Signed-off-by: Joe Developer &amp;lt;joe.developer@example.com&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Ex meta patch:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Please make sure to add the package name in the subject and the reference to the CVE. Example for the commit message: &lt;br /&gt;
&lt;br /&gt;
    bash: CVE-2014-6278 &amp;lt;if there are multiple CVEs list all&amp;gt;&lt;br /&gt;
    &lt;br /&gt;
    &amp;lt;short description&amp;gt;&lt;br /&gt;
    &lt;br /&gt;
    &amp;lt;[YOCTO #xxx] if there is any&amp;gt;&lt;br /&gt;
    &lt;br /&gt;
    References&lt;br /&gt;
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6278&lt;br /&gt;
    https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2014-6278&lt;br /&gt;
    xxxx&lt;br /&gt;
    &lt;br /&gt;
    Signed-off-by: &amp;lt;your email address&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Some security related links/useful tools ==&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
* [http://www.cvedetails.com CVE details] &lt;br /&gt;
* [http://www.cvedetails.com/vulnerability-list/vendor_id-33/product_id-47/year-2014/Linux-Linux-Kernel.html  CVE list, Linux kernel 2014]&lt;br /&gt;
* [https://www.yoctoproject.org/blogs/andrei-dinu/2013/meta-security-layer-now-available Meta-security-layer]&lt;br /&gt;
* [http://www.yoctoproject.org/docs/1.7/dev-manual/dev-manual.html#making-images-more-secure Making images more secure]&lt;br /&gt;
* [http://cvechecker.sourceforge.net Cvechecker]&lt;br /&gt;
&lt;br /&gt;
== Security Issues Addressed in Yocto Releases ==&lt;br /&gt;
&#039;&#039;&#039;Yocto 2.0 - Jethero&#039;&#039;&#039; &lt;br /&gt;
https://www.yoctoproject.org/downloads/core/jethro20&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Yocto 1.8.1 - Fido&#039;&#039;&#039; &lt;br /&gt;
https://www.yoctoproject.org/downloads/core/fido181&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Yocto 1.7.1 - Dizzy&#039;&#039;&#039; &lt;br /&gt;
https://www.yoctoproject.org/downloads/core/dizzy171&lt;/div&gt;</summary>
		<author><name>SonaSarmadi</name></author>
	</entry>
	<entry>
		<id>https://wiki.yoctoproject.org/wiki/index.php?title=Security&amp;diff=16993</id>
		<title>Security</title>
		<link rel="alternate" type="text/html" href="https://wiki.yoctoproject.org/wiki/index.php?title=Security&amp;diff=16993"/>
		<updated>2016-01-12T10:18:23Z</updated>

		<summary type="html">&lt;p&gt;SonaSarmadi: /* Patch name convention and commit message */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Since the Yocto Project is intended to be flexible and meet the needs of many applications, we leave policy-making decisions around security to our end users. Our goal instead is to ship each release with metadata that follows best practices in that we do not release recipe versions which are known to have significant security vulnerabilities. Generally this is done by upgrading recipes to newer versions that are no longer vulnerable to these issues. &lt;br /&gt;
&lt;br /&gt;
Upgrading recipes to the newer versions in the maintenance branches is not always easy, this is why we provide a patch for the existing version instead if we detect a vulnerability in a package. The patches are added to the recipes, see example below:&lt;br /&gt;
&lt;br /&gt;
  poky/recipes-connectivity/bind/bind_9.9.5.bb&lt;br /&gt;
  &lt;br /&gt;
  SRC_URI = &amp;quot;ftp://ftp.isc.org/isc/bind9/${PV}/${BPN}-${PV}.tar.gz \&lt;br /&gt;
           file://conf.patch \&lt;br /&gt;
           ...&lt;br /&gt;
           file://bind9_9_5-CVE-2014-8500.patch \&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
We are tracking security vulnerabilities in the Yocto Project against the [http://nvd.nist.gov/home.cfm National Vulnerability Database]. &lt;br /&gt;
&lt;br /&gt;
We also track CVEs reported to the oss-security list (Open Source Software Security) http://www.openwall.com/lists/oss-security/&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Yocto Security Team ==&lt;br /&gt;
 &lt;br /&gt;
The purpose of creating a security team in the Yocto project is to discuss, sync and organize security related activities.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The team&#039;s main responsibilities among others are:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
*  Scanning of security forums/mailing list(s) to detect security vulnerabilities reported by community&lt;br /&gt;
*  Responsible for fixing CVEs in the Yocto releases &amp;amp; maintained branches&lt;br /&gt;
*  Evaluation of tools for security tests &lt;br /&gt;
*  Responsible for security related info in the Yocto documentations&lt;br /&gt;
*  Hardening of Yocto release&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;How to Contact Yocto&#039;s security team Securely&#039;&#039;&#039;&lt;br /&gt;
---------------------------------------------&lt;br /&gt;
We have set up two security-related mailing lists:&lt;br /&gt;
*  &#039;&#039;&#039;Public List&#039;&#039;&#039;&lt;br /&gt;
: yocto [dash] security [at] yoctoproject[dot] org&lt;br /&gt;
: This is a public mailing list for anyone to subscribe to. This list is an open list to discuss public security issues/patches.&lt;br /&gt;
&lt;br /&gt;
*  &#039;&#039;&#039;Private List&#039;&#039;&#039;&lt;br /&gt;
: security [at] yoctoprojct [dot] org (Forwards to the following addresses)&lt;br /&gt;
 &lt;br /&gt;
: - &#039;&#039;&#039;sona [dot] sarmadi [at] enea [dot] com&#039;&#039;&#039; &lt;br /&gt;
: - &#039;&#039;&#039;mhalstead [at] linuxfoundation [dot] org&#039;&#039;&#039; &lt;br /&gt;
: For secure communications, please send your messages encrypted to both using the following GPG keys. &lt;br /&gt;
: Remember message headers are not encrypted so do not include sensitive information in the subject line.&lt;br /&gt;
&lt;br /&gt;
: Download public keys: [https://pgp.mit.edu/pks/lookup?op=vindex&amp;amp;search=0x773EF6EF68716A14 Sona Sarmadi] [https://pgp.mit.edu/pks/lookup?op=vindex&amp;amp;search=0x3373170601861969 Michael Halstead]&lt;br /&gt;
&lt;br /&gt;
Anyone can contribute with security patches as before, but those volunteering to this security team will sync/organize security related activities and take more responsibility.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;What you should do if you find a security vulnerability&#039;&#039;&#039;&lt;br /&gt;
---------------------------------------------&lt;br /&gt;
If you find a security flaw; a crash, an information leakage, or anything that can have a security impact if exploited in any Open Source packages used by the Yocto Project, please report this to the Yocto Security Team. If you prefer to contact the upstream project directly, please send a copy to the security team at Yocto as well.&lt;br /&gt;
If you believe this is sensitive information, please report the vulnerability in a secure way, i.e. encrypt the email and send it to the private list. This ensures that the exploit is not leaked and exploited before a response/fix has been generated.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;What Yocto Security Team does when it receives a security vulnerability&#039;&#039;&#039;&lt;br /&gt;
---------------------------------------------&lt;br /&gt;
The team performs a quick analysis and reports the flaw to the upstream project. Normally the upstream projects analyzes the problem. If they deem that it is a real security problem in their software, the project will  email the linux-distros mailing list and notify all the big Linux distributions/vendors about the existence of this vulnerability/flaw. These mailing lists are normally non-public. The project and people on the linux-distros can then agree on a release date when the flaw should be made public.&lt;br /&gt;
There is also sometimes some coordination for handling patches or backporting of patches etc, or just understanding the problem or what caused it.&lt;br /&gt;
&lt;br /&gt;
When the security issue is finally to be made public, normally upstream project is responsible to contact Mitre (cve.mitre.org) to get a CVE number assigned to it and copy the information to other Opens Source Security mailing lists to inform the whole world of the vulnerability.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;If an upstream project does not respond quickly&#039;&#039;&#039;&lt;br /&gt;
---------------------------------------------&lt;br /&gt;
If an upstream project does not fix the problem the Yocto&#039;s Security Team will contact linux-distros and community and together try to solve the vulnerability as quickly as possible. &lt;br /&gt;
Normally big Linux vendors fix the problem if the problem affects their products.&lt;br /&gt;
Chances are that everyone from the enterprise distros to the commercial Yocto vendors will get fixes done first, but it is nice to have saftey net for issues that really are specific to oe and embedded.&lt;br /&gt;
&lt;br /&gt;
== Branches maintained with security fixes  ==&lt;br /&gt;
See [https://wiki.yoctoproject.org/wiki/Stable_branch_maintenance Stable branches maintenance]for detailed info regarding the policies and maintenance of Stable branch.&lt;br /&gt;
&lt;br /&gt;
Versions in grey are no longer actively maintained with security patches, but well-tested patches may still be accepted for them.)&lt;br /&gt;
&lt;br /&gt;
== Policy for updating package versions for the stable branches ==&lt;br /&gt;
The Yocto project purposely limits updating of packages on oe-stable releases to items that address security problems (e.g. CVE&#039;s). For packages like qemu we avoid updating between from one &amp;quot;dot.dot&amp;quot; to another related &amp;quot;dot.dot&amp;quot; version since it has been seen in the past that even with &amp;quot;simple&amp;quot; updates, things can go wrong and a lot more testing is required to verify compatibility. Better to only add CVE patches to fix specific point problems.&lt;br /&gt;
&lt;br /&gt;
== Kernel security patches ==&lt;br /&gt;
&lt;br /&gt;
Kernel security patches are backported to Linux-yoco kernels regularly from https://www.kernel.org/&lt;br /&gt;
=== Linux-yocto ===&lt;br /&gt;
linux-yocto_3.10 &amp;amp; linux-yocto_3.14 (maintainer: Bruce Ashfield)&lt;br /&gt;
&lt;br /&gt;
=== Vendor kernels ===&lt;br /&gt;
Kernel security patches are also backported to Linux-vendor kernels from https://www.kernel.org/&lt;br /&gt;
 &lt;br /&gt;
* meta-intel (meta-intel uses Linux-yocto)&lt;br /&gt;
* meta-fsl-ppc (meta-freescale@yoctoproject.org)&lt;br /&gt;
* meta-xilinx (meta-xilinx@lists.yoctoproject.org)&lt;br /&gt;
* meta-ti (meta-ti@yoctoproject.org)&lt;br /&gt;
* etc&lt;br /&gt;
&lt;br /&gt;
== How to test ==&lt;br /&gt;
 &lt;br /&gt;
If there is any test case for the vulnerability by the upstream project or community&lt;br /&gt;
 - Run the test to reproduce the problem and verify the correction. &lt;br /&gt;
 - Run the regression test&lt;br /&gt;
&lt;br /&gt;
If there isn’t any test case and it is complicated and time consuming to write a testcase&lt;br /&gt;
 - Run the regressions test&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Regression test&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Build the core image for at least two architectures (preferably one big-endian and one little-endian)&lt;br /&gt;
* Run ptest (for those branches/packages that there is ptest mechanism)&lt;br /&gt;
&lt;br /&gt;
== Patch name convention and commit message ==&lt;br /&gt;
&lt;br /&gt;
Security patches like any Open Source developmen should follow the openembedded&#039;s Guidelines:&lt;br /&gt;
*[http://openembedded.org/wiki/Commit_Patch_Message_Guidelines Commit Patch Message Guidelines]&lt;br /&gt;
*[https://www.kernel.org/doc/Documentation/SecurityBugs kernel security bugs policy] &lt;br /&gt;
&lt;br /&gt;
Note that security patches should have CVE: tag and reference to the CVE identifier both in the patch file/s and the commit message.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Ex upstream patch:&#039;&#039;&#039; &lt;br /&gt;
&lt;br /&gt;
Please change the upstream patch &amp;quot;wscanf-allocates-too-little-memory.patch&amp;quot; to &amp;quot;CVE-2015-1472.patch&amp;quot; (or CVE-2015-1472-wscanf-allocates-too-little-memory.patch). Keep the original commit message and add reference to the CVE and upstream patch.&lt;br /&gt;
 &lt;br /&gt;
    &amp;lt;Keep the original commit message&amp;gt;&lt;br /&gt;
    &lt;br /&gt;
    &lt;br /&gt;
    Upstream-Status: Accepted &amp;lt;or Backport&amp;gt;&lt;br /&gt;
    CVE: CVE-2015-8370   &lt;br /&gt;
    &lt;br /&gt;
    Reference to upstream patch:&lt;br /&gt;
    https://sourceware.org/git/?p=glibc.git;a=patch;h=5bd80bfe9ca0d955bfbbc002781bc7b01b6bcb06&lt;br /&gt;
      &lt;br /&gt;
    Signed-off-by: Joe Developer &amp;lt;joe.developer@example.com&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Ex meta patch:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Please make sure to add the package name in the subject and the reference to the CVE. Example for the commit message: &lt;br /&gt;
&lt;br /&gt;
    bash: CVE-2014-6278 &amp;lt;if there are multiple CVEs list all&amp;gt;&lt;br /&gt;
    &lt;br /&gt;
    &amp;lt;short description&amp;gt;&lt;br /&gt;
    &lt;br /&gt;
    &amp;lt;[YOCTO #xxx] if there is any&amp;gt;&lt;br /&gt;
    &lt;br /&gt;
    References&lt;br /&gt;
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6278&lt;br /&gt;
    https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2014-6278&lt;br /&gt;
    xxxx&lt;br /&gt;
    &lt;br /&gt;
    Signed-off-by: &amp;lt;your email address&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Some security related links/useful tools ==&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
* [http://www.cvedetails.com CVE details] &lt;br /&gt;
* [http://www.cvedetails.com/vulnerability-list/vendor_id-33/product_id-47/year-2014/Linux-Linux-Kernel.html  CVE list, Linux kernel 2014]&lt;br /&gt;
* [https://www.yoctoproject.org/blogs/andrei-dinu/2013/meta-security-layer-now-available Meta-security-layer]&lt;br /&gt;
* [http://www.yoctoproject.org/docs/1.7/dev-manual/dev-manual.html#making-images-more-secure Making images more secure]&lt;br /&gt;
* [http://cvechecker.sourceforge.net Cvechecker]&lt;br /&gt;
&lt;br /&gt;
== Security Issues Addressed in Yocto Releases ==&lt;br /&gt;
&#039;&#039;&#039;Yocto 2.0 - Jethero&#039;&#039;&#039; &lt;br /&gt;
https://www.yoctoproject.org/downloads/core/jethro20&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Yocto 1.8.1 - Fido&#039;&#039;&#039; &lt;br /&gt;
https://www.yoctoproject.org/downloads/core/fido181&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Yocto 1.7.1 - Dizzy&#039;&#039;&#039; &lt;br /&gt;
https://www.yoctoproject.org/downloads/core/dizzy171&lt;/div&gt;</summary>
		<author><name>SonaSarmadi</name></author>
	</entry>
	<entry>
		<id>https://wiki.yoctoproject.org/wiki/index.php?title=Security&amp;diff=16992</id>
		<title>Security</title>
		<link rel="alternate" type="text/html" href="https://wiki.yoctoproject.org/wiki/index.php?title=Security&amp;diff=16992"/>
		<updated>2016-01-12T10:07:44Z</updated>

		<summary type="html">&lt;p&gt;SonaSarmadi: /* Patch name convention and commit message */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Since the Yocto Project is intended to be flexible and meet the needs of many applications, we leave policy-making decisions around security to our end users. Our goal instead is to ship each release with metadata that follows best practices in that we do not release recipe versions which are known to have significant security vulnerabilities. Generally this is done by upgrading recipes to newer versions that are no longer vulnerable to these issues. &lt;br /&gt;
&lt;br /&gt;
Upgrading recipes to the newer versions in the maintenance branches is not always easy, this is why we provide a patch for the existing version instead if we detect a vulnerability in a package. The patches are added to the recipes, see example below:&lt;br /&gt;
&lt;br /&gt;
  poky/recipes-connectivity/bind/bind_9.9.5.bb&lt;br /&gt;
  &lt;br /&gt;
  SRC_URI = &amp;quot;ftp://ftp.isc.org/isc/bind9/${PV}/${BPN}-${PV}.tar.gz \&lt;br /&gt;
           file://conf.patch \&lt;br /&gt;
           ...&lt;br /&gt;
           file://bind9_9_5-CVE-2014-8500.patch \&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
We are tracking security vulnerabilities in the Yocto Project against the [http://nvd.nist.gov/home.cfm National Vulnerability Database]. &lt;br /&gt;
&lt;br /&gt;
We also track CVEs reported to the oss-security list (Open Source Software Security) http://www.openwall.com/lists/oss-security/&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Yocto Security Team ==&lt;br /&gt;
 &lt;br /&gt;
The purpose of creating a security team in the Yocto project is to discuss, sync and organize security related activities.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The team&#039;s main responsibilities among others are:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
*  Scanning of security forums/mailing list(s) to detect security vulnerabilities reported by community&lt;br /&gt;
*  Responsible for fixing CVEs in the Yocto releases &amp;amp; maintained branches&lt;br /&gt;
*  Evaluation of tools for security tests &lt;br /&gt;
*  Responsible for security related info in the Yocto documentations&lt;br /&gt;
*  Hardening of Yocto release&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;How to Contact Yocto&#039;s security team Securely&#039;&#039;&#039;&lt;br /&gt;
---------------------------------------------&lt;br /&gt;
We have set up two security-related mailing lists:&lt;br /&gt;
*  &#039;&#039;&#039;Public List&#039;&#039;&#039;&lt;br /&gt;
: yocto [dash] security [at] yoctoproject[dot] org&lt;br /&gt;
: This is a public mailing list for anyone to subscribe to. This list is an open list to discuss public security issues/patches.&lt;br /&gt;
&lt;br /&gt;
*  &#039;&#039;&#039;Private List&#039;&#039;&#039;&lt;br /&gt;
: security [at] yoctoprojct [dot] org (Forwards to the following addresses)&lt;br /&gt;
 &lt;br /&gt;
: - &#039;&#039;&#039;sona [dot] sarmadi [at] enea [dot] com&#039;&#039;&#039; &lt;br /&gt;
: - &#039;&#039;&#039;mhalstead [at] linuxfoundation [dot] org&#039;&#039;&#039; &lt;br /&gt;
: For secure communications, please send your messages encrypted to both using the following GPG keys. &lt;br /&gt;
: Remember message headers are not encrypted so do not include sensitive information in the subject line.&lt;br /&gt;
&lt;br /&gt;
: Download public keys: [https://pgp.mit.edu/pks/lookup?op=vindex&amp;amp;search=0x773EF6EF68716A14 Sona Sarmadi] [https://pgp.mit.edu/pks/lookup?op=vindex&amp;amp;search=0x3373170601861969 Michael Halstead]&lt;br /&gt;
&lt;br /&gt;
Anyone can contribute with security patches as before, but those volunteering to this security team will sync/organize security related activities and take more responsibility.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;What you should do if you find a security vulnerability&#039;&#039;&#039;&lt;br /&gt;
---------------------------------------------&lt;br /&gt;
If you find a security flaw; a crash, an information leakage, or anything that can have a security impact if exploited in any Open Source packages used by the Yocto Project, please report this to the Yocto Security Team. If you prefer to contact the upstream project directly, please send a copy to the security team at Yocto as well.&lt;br /&gt;
If you believe this is sensitive information, please report the vulnerability in a secure way, i.e. encrypt the email and send it to the private list. This ensures that the exploit is not leaked and exploited before a response/fix has been generated.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;What Yocto Security Team does when it receives a security vulnerability&#039;&#039;&#039;&lt;br /&gt;
---------------------------------------------&lt;br /&gt;
The team performs a quick analysis and reports the flaw to the upstream project. Normally the upstream projects analyzes the problem. If they deem that it is a real security problem in their software, the project will  email the linux-distros mailing list and notify all the big Linux distributions/vendors about the existence of this vulnerability/flaw. These mailing lists are normally non-public. The project and people on the linux-distros can then agree on a release date when the flaw should be made public.&lt;br /&gt;
There is also sometimes some coordination for handling patches or backporting of patches etc, or just understanding the problem or what caused it.&lt;br /&gt;
&lt;br /&gt;
When the security issue is finally to be made public, normally upstream project is responsible to contact Mitre (cve.mitre.org) to get a CVE number assigned to it and copy the information to other Opens Source Security mailing lists to inform the whole world of the vulnerability.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;If an upstream project does not respond quickly&#039;&#039;&#039;&lt;br /&gt;
---------------------------------------------&lt;br /&gt;
If an upstream project does not fix the problem the Yocto&#039;s Security Team will contact linux-distros and community and together try to solve the vulnerability as quickly as possible. &lt;br /&gt;
Normally big Linux vendors fix the problem if the problem affects their products.&lt;br /&gt;
Chances are that everyone from the enterprise distros to the commercial Yocto vendors will get fixes done first, but it is nice to have saftey net for issues that really are specific to oe and embedded.&lt;br /&gt;
&lt;br /&gt;
== Branches maintained with security fixes  ==&lt;br /&gt;
See [https://wiki.yoctoproject.org/wiki/Stable_branch_maintenance Stable branches maintenance]for detailed info regarding the policies and maintenance of Stable branch.&lt;br /&gt;
&lt;br /&gt;
Versions in grey are no longer actively maintained with security patches, but well-tested patches may still be accepted for them.)&lt;br /&gt;
&lt;br /&gt;
== Policy for updating package versions for the stable branches ==&lt;br /&gt;
The Yocto project purposely limits updating of packages on oe-stable releases to items that address security problems (e.g. CVE&#039;s). For packages like qemu we avoid updating between from one &amp;quot;dot.dot&amp;quot; to another related &amp;quot;dot.dot&amp;quot; version since it has been seen in the past that even with &amp;quot;simple&amp;quot; updates, things can go wrong and a lot more testing is required to verify compatibility. Better to only add CVE patches to fix specific point problems.&lt;br /&gt;
&lt;br /&gt;
== Kernel security patches ==&lt;br /&gt;
&lt;br /&gt;
Kernel security patches are backported to Linux-yoco kernels regularly from https://www.kernel.org/&lt;br /&gt;
=== Linux-yocto ===&lt;br /&gt;
linux-yocto_3.10 &amp;amp; linux-yocto_3.14 (maintainer: Bruce Ashfield)&lt;br /&gt;
&lt;br /&gt;
=== Vendor kernels ===&lt;br /&gt;
Kernel security patches are also backported to Linux-vendor kernels from https://www.kernel.org/&lt;br /&gt;
 &lt;br /&gt;
* meta-intel (meta-intel uses Linux-yocto)&lt;br /&gt;
* meta-fsl-ppc (meta-freescale@yoctoproject.org)&lt;br /&gt;
* meta-xilinx (meta-xilinx@lists.yoctoproject.org)&lt;br /&gt;
* meta-ti (meta-ti@yoctoproject.org)&lt;br /&gt;
* etc&lt;br /&gt;
&lt;br /&gt;
== How to test ==&lt;br /&gt;
 &lt;br /&gt;
If there is any test case for the vulnerability by the upstream project or community&lt;br /&gt;
 - Run the test to reproduce the problem and verify the correction. &lt;br /&gt;
 - Run the regression test&lt;br /&gt;
&lt;br /&gt;
If there isn’t any test case and it is complicated and time consuming to write a testcase&lt;br /&gt;
 - Run the regressions test&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Regression test&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Build the core image for at least two architectures (preferably one big-endian and one little-endian)&lt;br /&gt;
* Run ptest (for those branches/packages that there is ptest mechanism)&lt;br /&gt;
&lt;br /&gt;
== Patch name convention and commit message ==&lt;br /&gt;
&lt;br /&gt;
Security patches like any Open Source developmen should follow the openembedded&#039;s Guidelines:&lt;br /&gt;
[http://openembedded.org/wiki/Commit_Patch_Message_Guidelines Commit Patch Message Guidelines]&lt;br /&gt;
[http://www.openembedded.org/wiki/Commit_Patch_Message_Guidelines#CVE_Patches] for security patches&lt;br /&gt;
[https://www.kernel.org/doc/Documentation/SecurityBugs kernel security bugs policy] for the kernel patches. &lt;br /&gt;
&lt;br /&gt;
In addition security patches should have reference to the CVE identifier both in the patch file/s and the commit message.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Ex upstream patch:&#039;&#039;&#039; &lt;br /&gt;
&lt;br /&gt;
Please change the upstream patch &amp;quot;wscanf-allocates-too-little-memory.patch&amp;quot; to &amp;quot;CVE-2015-1472.patch&amp;quot; (or CVE-2015-1472-wscanf-allocates-too-little-memory.patch). Keep the original commit message and add reference to the CVE and upstream patch.&lt;br /&gt;
 &lt;br /&gt;
    &amp;lt;Keep the original commit message&amp;gt;&lt;br /&gt;
    &lt;br /&gt;
    &lt;br /&gt;
    Upstream-Status: Accepted &amp;lt;or Backport&amp;gt;&lt;br /&gt;
    CVE: CVE-2015-8370   &lt;br /&gt;
    &lt;br /&gt;
    Reference to upstream patch:&lt;br /&gt;
    https://sourceware.org/git/?p=glibc.git;a=patch;h=5bd80bfe9ca0d955bfbbc002781bc7b01b6bcb06&lt;br /&gt;
      &lt;br /&gt;
    Signed-off-by: Joe Developer &amp;lt;joe.developer@example.com&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Ex meta patch:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Please make sure to add the package name in the subject and the reference to the CVE. Example for the commit message: &lt;br /&gt;
&lt;br /&gt;
    bash: CVE-2014-6278 &amp;lt;if there are multiple CVEs list all&amp;gt;&lt;br /&gt;
    &lt;br /&gt;
    &amp;lt;short description&amp;gt;&lt;br /&gt;
    &lt;br /&gt;
    &amp;lt;[YOCTO #xxx] if there is any&amp;gt;&lt;br /&gt;
    &lt;br /&gt;
    References&lt;br /&gt;
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6278&lt;br /&gt;
    https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2014-6278&lt;br /&gt;
    xxxx&lt;br /&gt;
    &lt;br /&gt;
    Signed-off-by: &amp;lt;your email address&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Some security related links/useful tools ==&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
* [http://www.cvedetails.com CVE details] &lt;br /&gt;
* [http://www.cvedetails.com/vulnerability-list/vendor_id-33/product_id-47/year-2014/Linux-Linux-Kernel.html  CVE list, Linux kernel 2014]&lt;br /&gt;
* [https://www.yoctoproject.org/blogs/andrei-dinu/2013/meta-security-layer-now-available Meta-security-layer]&lt;br /&gt;
* [http://www.yoctoproject.org/docs/1.7/dev-manual/dev-manual.html#making-images-more-secure Making images more secure]&lt;br /&gt;
* [http://cvechecker.sourceforge.net Cvechecker]&lt;br /&gt;
&lt;br /&gt;
== Security Issues Addressed in Yocto Releases ==&lt;br /&gt;
&#039;&#039;&#039;Yocto 2.0 - Jethero&#039;&#039;&#039; &lt;br /&gt;
https://www.yoctoproject.org/downloads/core/jethro20&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Yocto 1.8.1 - Fido&#039;&#039;&#039; &lt;br /&gt;
https://www.yoctoproject.org/downloads/core/fido181&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Yocto 1.7.1 - Dizzy&#039;&#039;&#039; &lt;br /&gt;
https://www.yoctoproject.org/downloads/core/dizzy171&lt;/div&gt;</summary>
		<author><name>SonaSarmadi</name></author>
	</entry>
	<entry>
		<id>https://wiki.yoctoproject.org/wiki/index.php?title=Security&amp;diff=16876</id>
		<title>Security</title>
		<link rel="alternate" type="text/html" href="https://wiki.yoctoproject.org/wiki/index.php?title=Security&amp;diff=16876"/>
		<updated>2015-12-16T09:05:14Z</updated>

		<summary type="html">&lt;p&gt;SonaSarmadi: /* Patch name convention and commit message */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Since the Yocto Project is intended to be flexible and meet the needs of many applications, we leave policy-making decisions around security to our end users. Our goal instead is to ship each release with metadata that follows best practices in that we do not release recipe versions which are known to have significant security vulnerabilities. Generally this is done by upgrading recipes to newer versions that are no longer vulnerable to these issues. &lt;br /&gt;
&lt;br /&gt;
Upgrading recipes to the newer versions in the maintenance branches is not always easy, this is why we provide a patch for the existing version instead if we detect a vulnerability in a package. The patches are added to the recipes, see example below:&lt;br /&gt;
&lt;br /&gt;
  poky/recipes-connectivity/bind/bind_9.9.5.bb&lt;br /&gt;
  &lt;br /&gt;
  SRC_URI = &amp;quot;ftp://ftp.isc.org/isc/bind9/${PV}/${BPN}-${PV}.tar.gz \&lt;br /&gt;
           file://conf.patch \&lt;br /&gt;
           ...&lt;br /&gt;
           file://bind9_9_5-CVE-2014-8500.patch \&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
We are tracking security vulnerabilities in the Yocto Project against the [http://nvd.nist.gov/home.cfm National Vulnerability Database]. &lt;br /&gt;
&lt;br /&gt;
We also track CVEs reported to the oss-security list (Open Source Software Security) http://www.openwall.com/lists/oss-security/&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Yocto Security Team ==&lt;br /&gt;
 &lt;br /&gt;
The purpose of creating a security team in the Yocto project is to discuss, sync and organize security related activities.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The team&#039;s main responsibilities among others are:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
*  Scanning of security forums/mailing list(s) to detect security vulnerabilities reported by community&lt;br /&gt;
*  Responsible for fixing CVEs in the Yocto releases &amp;amp; maintained branches&lt;br /&gt;
*  Evaluation of tools for security tests &lt;br /&gt;
*  Responsible for security related info in the Yocto documentations&lt;br /&gt;
*  Hardening of Yocto release&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;How to Contact Yocto&#039;s security team Securely&#039;&#039;&#039;&lt;br /&gt;
---------------------------------------------&lt;br /&gt;
We have set up two security-related mailing lists:&lt;br /&gt;
*  &#039;&#039;&#039;Public List&#039;&#039;&#039;&lt;br /&gt;
: yocto [dash] security [at] yoctoproject[dot] org&lt;br /&gt;
: This is a public mailing list for anyone to subscribe to. This list is an open list to discuss public security issues/patches.&lt;br /&gt;
&lt;br /&gt;
*  &#039;&#039;&#039;Private List&#039;&#039;&#039;&lt;br /&gt;
: security [at] yoctoprojct [dot] org (Forwards to the following addresses)&lt;br /&gt;
 &lt;br /&gt;
: - &#039;&#039;&#039;sona [dot] sarmadi [at] enea [dot] com&#039;&#039;&#039; &lt;br /&gt;
: - &#039;&#039;&#039;mhalstead [at] linuxfoundation [dot] org&#039;&#039;&#039; &lt;br /&gt;
: For secure communications, please send your messages encrypted to both using the following GPG keys. &lt;br /&gt;
: Remember message headers are not encrypted so do not include sensitive information in the subject line.&lt;br /&gt;
&lt;br /&gt;
: Download public keys: [https://pgp.mit.edu/pks/lookup?op=vindex&amp;amp;search=0x773EF6EF68716A14 Sona Sarmadi] [https://pgp.mit.edu/pks/lookup?op=vindex&amp;amp;search=0x3373170601861969 Michael Halstead]&lt;br /&gt;
&lt;br /&gt;
Anyone can contribute with security patches as before, but those volunteering to this security team will sync/organize security related activities and take more responsibility.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;What you should do if you find a security vulnerability&#039;&#039;&#039;&lt;br /&gt;
---------------------------------------------&lt;br /&gt;
If you find a security flaw; a crash, an information leakage, or anything that can have a security impact if exploited in any Open Source packages used by the Yocto Project, please report this to the Yocto Security Team. If you prefer to contact the upstream project directly, please send a copy to the security team at Yocto as well.&lt;br /&gt;
If you believe this is sensitive information, please report the vulnerability in a secure way, i.e. encrypt the email and send it to the private list. This ensures that the exploit is not leaked and exploited before a response/fix has been generated.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;What Yocto Security Team does when it receives a security vulnerability&#039;&#039;&#039;&lt;br /&gt;
---------------------------------------------&lt;br /&gt;
The team performs a quick analysis and reports the flaw to the upstream project. Normally the upstream projects analyzes the problem. If they deem that it is a real security problem in their software, the project will  email the linux-distros mailing list and notify all the big Linux distributions/vendors about the existence of this vulnerability/flaw. These mailing lists are normally non-public. The project and people on the linux-distros can then agree on a release date when the flaw should be made public.&lt;br /&gt;
There is also sometimes some coordination for handling patches or backporting of patches etc, or just understanding the problem or what caused it.&lt;br /&gt;
&lt;br /&gt;
When the security issue is finally to be made public, normally upstream project is responsible to contact Mitre (cve.mitre.org) to get a CVE number assigned to it and copy the information to other Opens Source Security mailing lists to inform the whole world of the vulnerability.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;If an upstream project does not respond quickly&#039;&#039;&#039;&lt;br /&gt;
---------------------------------------------&lt;br /&gt;
If an upstream project does not fix the problem the Yocto&#039;s Security Team will contact linux-distros and community and together try to solve the vulnerability as quickly as possible. &lt;br /&gt;
Normally big Linux vendors fix the problem if the problem affects their products.&lt;br /&gt;
Chances are that everyone from the enterprise distros to the commercial Yocto vendors will get fixes done first, but it is nice to have saftey net for issues that really are specific to oe and embedded.&lt;br /&gt;
&lt;br /&gt;
== Branches maintained with security fixes  ==&lt;br /&gt;
See [https://wiki.yoctoproject.org/wiki/Stable_branch_maintenance Stable branches maintenance]for detailed info regarding the policies and maintenance of Stable branch.&lt;br /&gt;
&lt;br /&gt;
Versions in grey are no longer actively maintained with security patches, but well-tested patches may still be accepted for them.)&lt;br /&gt;
&lt;br /&gt;
== Policy for updating package versions for the stable branches ==&lt;br /&gt;
The Yocto project purposely limits updating of packages on oe-stable releases to items that address security problems (e.g. CVE&#039;s). For packages like qemu we avoid updating between from one &amp;quot;dot.dot&amp;quot; to another related &amp;quot;dot.dot&amp;quot; version since it has been seen in the past that even with &amp;quot;simple&amp;quot; updates, things can go wrong and a lot more testing is required to verify compatibility. Better to only add CVE patches to fix specific point problems.&lt;br /&gt;
&lt;br /&gt;
== Kernel security patches ==&lt;br /&gt;
&lt;br /&gt;
Kernel security patches are backported to Linux-yoco kernels regularly from https://www.kernel.org/&lt;br /&gt;
=== Linux-yocto ===&lt;br /&gt;
linux-yocto_3.10 &amp;amp; linux-yocto_3.14 (maintainer: Bruce Ashfield)&lt;br /&gt;
&lt;br /&gt;
=== Vendor kernels ===&lt;br /&gt;
Kernel security patches are also backported to Linux-vendor kernels from https://www.kernel.org/&lt;br /&gt;
 &lt;br /&gt;
* meta-intel (meta-intel uses Linux-yocto)&lt;br /&gt;
* meta-fsl-ppc (meta-freescale@yoctoproject.org)&lt;br /&gt;
* meta-xilinx (meta-xilinx@lists.yoctoproject.org)&lt;br /&gt;
* meta-ti (meta-ti@yoctoproject.org)&lt;br /&gt;
* etc&lt;br /&gt;
&lt;br /&gt;
== How to test ==&lt;br /&gt;
 &lt;br /&gt;
If there is any test case for the vulnerability by the upstream project or community&lt;br /&gt;
 - Run the test to reproduce the problem and verify the correction. &lt;br /&gt;
 - Run the regression test&lt;br /&gt;
&lt;br /&gt;
If there isn’t any test case and it is complicated and time consuming to write a testcase&lt;br /&gt;
 - Run the regressions test&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Regression test&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Build the core image for at least two architectures (preferably one big-endian and one little-endian)&lt;br /&gt;
* Run ptest (for those branches/packages that there is ptest mechanism)&lt;br /&gt;
&lt;br /&gt;
== Patch name convention and commit message ==&lt;br /&gt;
&lt;br /&gt;
Security patches like any Open Source developmen should follow the openembedded&#039;s [http://openembedded.org/wiki/Commit_Patch_Message_Guidelines Commit Patch Message Guidelines] and [https://www.kernel.org/doc/Documentation/SecurityBugs kernel security bugs policy] for the kernel patches. &lt;br /&gt;
&lt;br /&gt;
In addition security patches should have reference to the CVE identifier both in the patch file/s and the commit message.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Ex upstream patch:&#039;&#039;&#039; &lt;br /&gt;
&lt;br /&gt;
Please change the upstream patch &amp;quot;wscanf-allocates-too-little-memory.patch&amp;quot; to &amp;quot;CVE-2015-1472.patch&amp;quot; (or CVE-2015-1472-wscanf-allocates-too-little-memory.patch). Keep the original commit message and add reference to the CVE and upstream patch.&lt;br /&gt;
 &lt;br /&gt;
    &amp;lt;Keep the original commit message&amp;gt;&lt;br /&gt;
    &lt;br /&gt;
    Fixes CVE-2015-1472.&lt;br /&gt;
    Upstream-Status: Backport&lt;br /&gt;
       &lt;br /&gt;
    Reference to upstream patch:&lt;br /&gt;
    The patch is from (Paul Pluzhnikov &amp;lt;ppluzhnikov@google.com&amp;gt;&lt;br /&gt;
    https://sourceware.org/git/?p=glibc.git;a=patch;h=5bd80bfe9ca0d955bfbbc002781bc7b01b6bcb06&lt;br /&gt;
      &lt;br /&gt;
    Signed-off-by: &amp;lt;your email address&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Ex meta patch:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Please make sure to add the package name in the subject and the reference to the CVE. Example for the commit message: &lt;br /&gt;
&lt;br /&gt;
    bash: CVE-2014-6278 &amp;lt;if there are multiple CVEs list all&amp;gt;&lt;br /&gt;
    &lt;br /&gt;
    &amp;lt;short description&amp;gt;&lt;br /&gt;
    &lt;br /&gt;
    &amp;lt;[YOCTO #xxx] if there is any&amp;gt;&lt;br /&gt;
    &lt;br /&gt;
    References&lt;br /&gt;
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6278&lt;br /&gt;
    https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2014-6278&lt;br /&gt;
    xxxx&lt;br /&gt;
    &lt;br /&gt;
    Signed-off-by: &amp;lt;your email address&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Some security related links/useful tools ==&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
* [http://www.cvedetails.com CVE details] &lt;br /&gt;
* [http://www.cvedetails.com/vulnerability-list/vendor_id-33/product_id-47/year-2014/Linux-Linux-Kernel.html  CVE list, Linux kernel 2014]&lt;br /&gt;
* [https://www.yoctoproject.org/blogs/andrei-dinu/2013/meta-security-layer-now-available Meta-security-layer]&lt;br /&gt;
* [http://www.yoctoproject.org/docs/1.7/dev-manual/dev-manual.html#making-images-more-secure Making images more secure]&lt;br /&gt;
* [http://cvechecker.sourceforge.net Cvechecker]&lt;br /&gt;
&lt;br /&gt;
== Security Issues Addressed in Yocto Releases ==&lt;br /&gt;
&#039;&#039;&#039;Yocto 2.0 - Jethero&#039;&#039;&#039; &lt;br /&gt;
https://www.yoctoproject.org/downloads/core/jethro20&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Yocto 1.8.1 - Fido&#039;&#039;&#039; &lt;br /&gt;
https://www.yoctoproject.org/downloads/core/fido181&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Yocto 1.7.1 - Dizzy&#039;&#039;&#039; &lt;br /&gt;
https://www.yoctoproject.org/downloads/core/dizzy171&lt;/div&gt;</summary>
		<author><name>SonaSarmadi</name></author>
	</entry>
	<entry>
		<id>https://wiki.yoctoproject.org/wiki/index.php?title=Security&amp;diff=16875</id>
		<title>Security</title>
		<link rel="alternate" type="text/html" href="https://wiki.yoctoproject.org/wiki/index.php?title=Security&amp;diff=16875"/>
		<updated>2015-12-16T08:49:03Z</updated>

		<summary type="html">&lt;p&gt;SonaSarmadi: /* Patch name convention and commit message */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Since the Yocto Project is intended to be flexible and meet the needs of many applications, we leave policy-making decisions around security to our end users. Our goal instead is to ship each release with metadata that follows best practices in that we do not release recipe versions which are known to have significant security vulnerabilities. Generally this is done by upgrading recipes to newer versions that are no longer vulnerable to these issues. &lt;br /&gt;
&lt;br /&gt;
Upgrading recipes to the newer versions in the maintenance branches is not always easy, this is why we provide a patch for the existing version instead if we detect a vulnerability in a package. The patches are added to the recipes, see example below:&lt;br /&gt;
&lt;br /&gt;
  poky/recipes-connectivity/bind/bind_9.9.5.bb&lt;br /&gt;
  &lt;br /&gt;
  SRC_URI = &amp;quot;ftp://ftp.isc.org/isc/bind9/${PV}/${BPN}-${PV}.tar.gz \&lt;br /&gt;
           file://conf.patch \&lt;br /&gt;
           ...&lt;br /&gt;
           file://bind9_9_5-CVE-2014-8500.patch \&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
We are tracking security vulnerabilities in the Yocto Project against the [http://nvd.nist.gov/home.cfm National Vulnerability Database]. &lt;br /&gt;
&lt;br /&gt;
We also track CVEs reported to the oss-security list (Open Source Software Security) http://www.openwall.com/lists/oss-security/&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Yocto Security Team ==&lt;br /&gt;
 &lt;br /&gt;
The purpose of creating a security team in the Yocto project is to discuss, sync and organize security related activities.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The team&#039;s main responsibilities among others are:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
*  Scanning of security forums/mailing list(s) to detect security vulnerabilities reported by community&lt;br /&gt;
*  Responsible for fixing CVEs in the Yocto releases &amp;amp; maintained branches&lt;br /&gt;
*  Evaluation of tools for security tests &lt;br /&gt;
*  Responsible for security related info in the Yocto documentations&lt;br /&gt;
*  Hardening of Yocto release&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;How to Contact Yocto&#039;s security team Securely&#039;&#039;&#039;&lt;br /&gt;
---------------------------------------------&lt;br /&gt;
We have set up two security-related mailing lists:&lt;br /&gt;
*  &#039;&#039;&#039;Public List&#039;&#039;&#039;&lt;br /&gt;
: yocto [dash] security [at] yoctoproject[dot] org&lt;br /&gt;
: This is a public mailing list for anyone to subscribe to. This list is an open list to discuss public security issues/patches.&lt;br /&gt;
&lt;br /&gt;
*  &#039;&#039;&#039;Private List&#039;&#039;&#039;&lt;br /&gt;
: security [at] yoctoprojct [dot] org (Forwards to the following addresses)&lt;br /&gt;
 &lt;br /&gt;
: - &#039;&#039;&#039;sona [dot] sarmadi [at] enea [dot] com&#039;&#039;&#039; &lt;br /&gt;
: - &#039;&#039;&#039;mhalstead [at] linuxfoundation [dot] org&#039;&#039;&#039; &lt;br /&gt;
: For secure communications, please send your messages encrypted to both using the following GPG keys. &lt;br /&gt;
: Remember message headers are not encrypted so do not include sensitive information in the subject line.&lt;br /&gt;
&lt;br /&gt;
: Download public keys: [https://pgp.mit.edu/pks/lookup?op=vindex&amp;amp;search=0x773EF6EF68716A14 Sona Sarmadi] [https://pgp.mit.edu/pks/lookup?op=vindex&amp;amp;search=0x3373170601861969 Michael Halstead]&lt;br /&gt;
&lt;br /&gt;
Anyone can contribute with security patches as before, but those volunteering to this security team will sync/organize security related activities and take more responsibility.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;What you should do if you find a security vulnerability&#039;&#039;&#039;&lt;br /&gt;
---------------------------------------------&lt;br /&gt;
If you find a security flaw; a crash, an information leakage, or anything that can have a security impact if exploited in any Open Source packages used by the Yocto Project, please report this to the Yocto Security Team. If you prefer to contact the upstream project directly, please send a copy to the security team at Yocto as well.&lt;br /&gt;
If you believe this is sensitive information, please report the vulnerability in a secure way, i.e. encrypt the email and send it to the private list. This ensures that the exploit is not leaked and exploited before a response/fix has been generated.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;What Yocto Security Team does when it receives a security vulnerability&#039;&#039;&#039;&lt;br /&gt;
---------------------------------------------&lt;br /&gt;
The team performs a quick analysis and reports the flaw to the upstream project. Normally the upstream projects analyzes the problem. If they deem that it is a real security problem in their software, the project will  email the linux-distros mailing list and notify all the big Linux distributions/vendors about the existence of this vulnerability/flaw. These mailing lists are normally non-public. The project and people on the linux-distros can then agree on a release date when the flaw should be made public.&lt;br /&gt;
There is also sometimes some coordination for handling patches or backporting of patches etc, or just understanding the problem or what caused it.&lt;br /&gt;
&lt;br /&gt;
When the security issue is finally to be made public, normally upstream project is responsible to contact Mitre (cve.mitre.org) to get a CVE number assigned to it and copy the information to other Opens Source Security mailing lists to inform the whole world of the vulnerability.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;If an upstream project does not respond quickly&#039;&#039;&#039;&lt;br /&gt;
---------------------------------------------&lt;br /&gt;
If an upstream project does not fix the problem the Yocto&#039;s Security Team will contact linux-distros and community and together try to solve the vulnerability as quickly as possible. &lt;br /&gt;
Normally big Linux vendors fix the problem if the problem affects their products.&lt;br /&gt;
Chances are that everyone from the enterprise distros to the commercial Yocto vendors will get fixes done first, but it is nice to have saftey net for issues that really are specific to oe and embedded.&lt;br /&gt;
&lt;br /&gt;
== Branches maintained with security fixes  ==&lt;br /&gt;
See [https://wiki.yoctoproject.org/wiki/Stable_branch_maintenance Stable branches maintenance]for detailed info regarding the policies and maintenance of Stable branch.&lt;br /&gt;
&lt;br /&gt;
Versions in grey are no longer actively maintained with security patches, but well-tested patches may still be accepted for them.)&lt;br /&gt;
&lt;br /&gt;
== Policy for updating package versions for the stable branches ==&lt;br /&gt;
The Yocto project purposely limits updating of packages on oe-stable releases to items that address security problems (e.g. CVE&#039;s). For packages like qemu we avoid updating between from one &amp;quot;dot.dot&amp;quot; to another related &amp;quot;dot.dot&amp;quot; version since it has been seen in the past that even with &amp;quot;simple&amp;quot; updates, things can go wrong and a lot more testing is required to verify compatibility. Better to only add CVE patches to fix specific point problems.&lt;br /&gt;
&lt;br /&gt;
== Kernel security patches ==&lt;br /&gt;
&lt;br /&gt;
Kernel security patches are backported to Linux-yoco kernels regularly from https://www.kernel.org/&lt;br /&gt;
=== Linux-yocto ===&lt;br /&gt;
linux-yocto_3.10 &amp;amp; linux-yocto_3.14 (maintainer: Bruce Ashfield)&lt;br /&gt;
&lt;br /&gt;
=== Vendor kernels ===&lt;br /&gt;
Kernel security patches are also backported to Linux-vendor kernels from https://www.kernel.org/&lt;br /&gt;
 &lt;br /&gt;
* meta-intel (meta-intel uses Linux-yocto)&lt;br /&gt;
* meta-fsl-ppc (meta-freescale@yoctoproject.org)&lt;br /&gt;
* meta-xilinx (meta-xilinx@lists.yoctoproject.org)&lt;br /&gt;
* meta-ti (meta-ti@yoctoproject.org)&lt;br /&gt;
* etc&lt;br /&gt;
&lt;br /&gt;
== How to test ==&lt;br /&gt;
 &lt;br /&gt;
If there is any test case for the vulnerability by the upstream project or community&lt;br /&gt;
 - Run the test to reproduce the problem and verify the correction. &lt;br /&gt;
 - Run the regression test&lt;br /&gt;
&lt;br /&gt;
If there isn’t any test case and it is complicated and time consuming to write a testcase&lt;br /&gt;
 - Run the regressions test&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Regression test&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Build the core image for at least two architectures (preferably one big-endian and one little-endian)&lt;br /&gt;
* Run ptest (for those branches/packages that there is ptest mechanism)&lt;br /&gt;
&lt;br /&gt;
== Patch name convention and commit message ==&lt;br /&gt;
&lt;br /&gt;
Security patches like any Open Source developmen should follow the openembedded&#039;s [http://openembedded.org/wiki/Commit_Patch_Message_Guidelines Commit Patch Message Guidelines] and [https://www.kernel.org/doc/Documentation/SecurityBugs kernel security bugs policy] for the kernel patches. &lt;br /&gt;
&lt;br /&gt;
In addition security patches should have reference to the CVE identifier both in the patch file/s and the commit message.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Ex upstream patch:&#039;&#039;&#039; &lt;br /&gt;
&lt;br /&gt;
Please change the upstream patch &amp;quot;wscanf-allocates-too-little-memory.patch&amp;quot; to &amp;quot;CVE-2015-1472.patch&amp;quot; (or CVE-2015-1472-wscanf-allocates-too-little-memory.patch)&lt;br /&gt;
 &lt;br /&gt;
    &amp;lt;Keep the original commit message&amp;gt;&lt;br /&gt;
    &lt;br /&gt;
    Fixes CVE-2015-1472.&lt;br /&gt;
    Upstream-Status: Backport&lt;br /&gt;
       &lt;br /&gt;
    Reference to upstream patch:&lt;br /&gt;
    The patch is from (Paul Pluzhnikov &amp;lt;ppluzhnikov@google.com&amp;gt;&lt;br /&gt;
    https://sourceware.org/git/?p=glibc.git;a=patch;h=5bd80bfe9ca0d955bfbbc002781bc7b01b6bcb06&lt;br /&gt;
      &lt;br /&gt;
    Signed-off-by: &amp;lt;your email address&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Ex meta patch:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Please make sure to add the package name in the subject and the reference to the CVE. Example for the commit message: &lt;br /&gt;
&lt;br /&gt;
    bash: CVE-2014-6278 &amp;lt;if there are multiple CVEs list all&amp;gt;&lt;br /&gt;
    &lt;br /&gt;
    &amp;lt;short description&amp;gt;&lt;br /&gt;
    &lt;br /&gt;
    &amp;lt;[YOCTO #xxx] if there is any&amp;gt;&lt;br /&gt;
    &lt;br /&gt;
    References&lt;br /&gt;
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6278&lt;br /&gt;
    https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2014-6278&lt;br /&gt;
    xxxx&lt;br /&gt;
    &lt;br /&gt;
    Signed-off-by: &amp;lt;your email address&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Some security related links/useful tools ==&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
* [http://www.cvedetails.com CVE details] &lt;br /&gt;
* [http://www.cvedetails.com/vulnerability-list/vendor_id-33/product_id-47/year-2014/Linux-Linux-Kernel.html  CVE list, Linux kernel 2014]&lt;br /&gt;
* [https://www.yoctoproject.org/blogs/andrei-dinu/2013/meta-security-layer-now-available Meta-security-layer]&lt;br /&gt;
* [http://www.yoctoproject.org/docs/1.7/dev-manual/dev-manual.html#making-images-more-secure Making images more secure]&lt;br /&gt;
* [http://cvechecker.sourceforge.net Cvechecker]&lt;br /&gt;
&lt;br /&gt;
== Security Issues Addressed in Yocto Releases ==&lt;br /&gt;
&#039;&#039;&#039;Yocto 2.0 - Jethero&#039;&#039;&#039; &lt;br /&gt;
https://www.yoctoproject.org/downloads/core/jethro20&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Yocto 1.8.1 - Fido&#039;&#039;&#039; &lt;br /&gt;
https://www.yoctoproject.org/downloads/core/fido181&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Yocto 1.7.1 - Dizzy&#039;&#039;&#039; &lt;br /&gt;
https://www.yoctoproject.org/downloads/core/dizzy171&lt;/div&gt;</summary>
		<author><name>SonaSarmadi</name></author>
	</entry>
	<entry>
		<id>https://wiki.yoctoproject.org/wiki/index.php?title=Security&amp;diff=16874</id>
		<title>Security</title>
		<link rel="alternate" type="text/html" href="https://wiki.yoctoproject.org/wiki/index.php?title=Security&amp;diff=16874"/>
		<updated>2015-12-16T08:48:42Z</updated>

		<summary type="html">&lt;p&gt;SonaSarmadi: /* Patch name convention and commit message */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Since the Yocto Project is intended to be flexible and meet the needs of many applications, we leave policy-making decisions around security to our end users. Our goal instead is to ship each release with metadata that follows best practices in that we do not release recipe versions which are known to have significant security vulnerabilities. Generally this is done by upgrading recipes to newer versions that are no longer vulnerable to these issues. &lt;br /&gt;
&lt;br /&gt;
Upgrading recipes to the newer versions in the maintenance branches is not always easy, this is why we provide a patch for the existing version instead if we detect a vulnerability in a package. The patches are added to the recipes, see example below:&lt;br /&gt;
&lt;br /&gt;
  poky/recipes-connectivity/bind/bind_9.9.5.bb&lt;br /&gt;
  &lt;br /&gt;
  SRC_URI = &amp;quot;ftp://ftp.isc.org/isc/bind9/${PV}/${BPN}-${PV}.tar.gz \&lt;br /&gt;
           file://conf.patch \&lt;br /&gt;
           ...&lt;br /&gt;
           file://bind9_9_5-CVE-2014-8500.patch \&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
We are tracking security vulnerabilities in the Yocto Project against the [http://nvd.nist.gov/home.cfm National Vulnerability Database]. &lt;br /&gt;
&lt;br /&gt;
We also track CVEs reported to the oss-security list (Open Source Software Security) http://www.openwall.com/lists/oss-security/&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Yocto Security Team ==&lt;br /&gt;
 &lt;br /&gt;
The purpose of creating a security team in the Yocto project is to discuss, sync and organize security related activities.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The team&#039;s main responsibilities among others are:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
*  Scanning of security forums/mailing list(s) to detect security vulnerabilities reported by community&lt;br /&gt;
*  Responsible for fixing CVEs in the Yocto releases &amp;amp; maintained branches&lt;br /&gt;
*  Evaluation of tools for security tests &lt;br /&gt;
*  Responsible for security related info in the Yocto documentations&lt;br /&gt;
*  Hardening of Yocto release&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;How to Contact Yocto&#039;s security team Securely&#039;&#039;&#039;&lt;br /&gt;
---------------------------------------------&lt;br /&gt;
We have set up two security-related mailing lists:&lt;br /&gt;
*  &#039;&#039;&#039;Public List&#039;&#039;&#039;&lt;br /&gt;
: yocto [dash] security [at] yoctoproject[dot] org&lt;br /&gt;
: This is a public mailing list for anyone to subscribe to. This list is an open list to discuss public security issues/patches.&lt;br /&gt;
&lt;br /&gt;
*  &#039;&#039;&#039;Private List&#039;&#039;&#039;&lt;br /&gt;
: security [at] yoctoprojct [dot] org (Forwards to the following addresses)&lt;br /&gt;
 &lt;br /&gt;
: - &#039;&#039;&#039;sona [dot] sarmadi [at] enea [dot] com&#039;&#039;&#039; &lt;br /&gt;
: - &#039;&#039;&#039;mhalstead [at] linuxfoundation [dot] org&#039;&#039;&#039; &lt;br /&gt;
: For secure communications, please send your messages encrypted to both using the following GPG keys. &lt;br /&gt;
: Remember message headers are not encrypted so do not include sensitive information in the subject line.&lt;br /&gt;
&lt;br /&gt;
: Download public keys: [https://pgp.mit.edu/pks/lookup?op=vindex&amp;amp;search=0x773EF6EF68716A14 Sona Sarmadi] [https://pgp.mit.edu/pks/lookup?op=vindex&amp;amp;search=0x3373170601861969 Michael Halstead]&lt;br /&gt;
&lt;br /&gt;
Anyone can contribute with security patches as before, but those volunteering to this security team will sync/organize security related activities and take more responsibility.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;What you should do if you find a security vulnerability&#039;&#039;&#039;&lt;br /&gt;
---------------------------------------------&lt;br /&gt;
If you find a security flaw; a crash, an information leakage, or anything that can have a security impact if exploited in any Open Source packages used by the Yocto Project, please report this to the Yocto Security Team. If you prefer to contact the upstream project directly, please send a copy to the security team at Yocto as well.&lt;br /&gt;
If you believe this is sensitive information, please report the vulnerability in a secure way, i.e. encrypt the email and send it to the private list. This ensures that the exploit is not leaked and exploited before a response/fix has been generated.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;What Yocto Security Team does when it receives a security vulnerability&#039;&#039;&#039;&lt;br /&gt;
---------------------------------------------&lt;br /&gt;
The team performs a quick analysis and reports the flaw to the upstream project. Normally the upstream projects analyzes the problem. If they deem that it is a real security problem in their software, the project will  email the linux-distros mailing list and notify all the big Linux distributions/vendors about the existence of this vulnerability/flaw. These mailing lists are normally non-public. The project and people on the linux-distros can then agree on a release date when the flaw should be made public.&lt;br /&gt;
There is also sometimes some coordination for handling patches or backporting of patches etc, or just understanding the problem or what caused it.&lt;br /&gt;
&lt;br /&gt;
When the security issue is finally to be made public, normally upstream project is responsible to contact Mitre (cve.mitre.org) to get a CVE number assigned to it and copy the information to other Opens Source Security mailing lists to inform the whole world of the vulnerability.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;If an upstream project does not respond quickly&#039;&#039;&#039;&lt;br /&gt;
---------------------------------------------&lt;br /&gt;
If an upstream project does not fix the problem the Yocto&#039;s Security Team will contact linux-distros and community and together try to solve the vulnerability as quickly as possible. &lt;br /&gt;
Normally big Linux vendors fix the problem if the problem affects their products.&lt;br /&gt;
Chances are that everyone from the enterprise distros to the commercial Yocto vendors will get fixes done first, but it is nice to have saftey net for issues that really are specific to oe and embedded.&lt;br /&gt;
&lt;br /&gt;
== Branches maintained with security fixes  ==&lt;br /&gt;
See [https://wiki.yoctoproject.org/wiki/Stable_branch_maintenance Stable branches maintenance]for detailed info regarding the policies and maintenance of Stable branch.&lt;br /&gt;
&lt;br /&gt;
Versions in grey are no longer actively maintained with security patches, but well-tested patches may still be accepted for them.)&lt;br /&gt;
&lt;br /&gt;
== Policy for updating package versions for the stable branches ==&lt;br /&gt;
The Yocto project purposely limits updating of packages on oe-stable releases to items that address security problems (e.g. CVE&#039;s). For packages like qemu we avoid updating between from one &amp;quot;dot.dot&amp;quot; to another related &amp;quot;dot.dot&amp;quot; version since it has been seen in the past that even with &amp;quot;simple&amp;quot; updates, things can go wrong and a lot more testing is required to verify compatibility. Better to only add CVE patches to fix specific point problems.&lt;br /&gt;
&lt;br /&gt;
== Kernel security patches ==&lt;br /&gt;
&lt;br /&gt;
Kernel security patches are backported to Linux-yoco kernels regularly from https://www.kernel.org/&lt;br /&gt;
=== Linux-yocto ===&lt;br /&gt;
linux-yocto_3.10 &amp;amp; linux-yocto_3.14 (maintainer: Bruce Ashfield)&lt;br /&gt;
&lt;br /&gt;
=== Vendor kernels ===&lt;br /&gt;
Kernel security patches are also backported to Linux-vendor kernels from https://www.kernel.org/&lt;br /&gt;
 &lt;br /&gt;
* meta-intel (meta-intel uses Linux-yocto)&lt;br /&gt;
* meta-fsl-ppc (meta-freescale@yoctoproject.org)&lt;br /&gt;
* meta-xilinx (meta-xilinx@lists.yoctoproject.org)&lt;br /&gt;
* meta-ti (meta-ti@yoctoproject.org)&lt;br /&gt;
* etc&lt;br /&gt;
&lt;br /&gt;
== How to test ==&lt;br /&gt;
 &lt;br /&gt;
If there is any test case for the vulnerability by the upstream project or community&lt;br /&gt;
 - Run the test to reproduce the problem and verify the correction. &lt;br /&gt;
 - Run the regression test&lt;br /&gt;
&lt;br /&gt;
If there isn’t any test case and it is complicated and time consuming to write a testcase&lt;br /&gt;
 - Run the regressions test&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Regression test&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Build the core image for at least two architectures (preferably one big-endian and one little-endian)&lt;br /&gt;
* Run ptest (for those branches/packages that there is ptest mechanism)&lt;br /&gt;
&lt;br /&gt;
== Patch name convention and commit message ==&lt;br /&gt;
&lt;br /&gt;
Security patches like any Open Source developmen should follow the openembedded&#039;s [http://openembedded.org/wiki/Commit_Patch_Message_Guidelines Commit Patch Message Guidelines] and [https://www.kernel.org/doc/Documentation/SecurityBugs kernel security bugs policy] for the kernel patches. &lt;br /&gt;
&lt;br /&gt;
In addition security patches should have reference to the CVE identifier both in the patch file/s and the commit message.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Ex upstream patch&#039;&#039;&#039; &lt;br /&gt;
&lt;br /&gt;
Please change the upstream patch &amp;quot;wscanf-allocates-too-little-memory.patch&amp;quot; to &amp;quot;CVE-2015-1472.patch&amp;quot; (or CVE-2015-1472-wscanf-allocates-too-little-memory.patch)&lt;br /&gt;
 &lt;br /&gt;
    &amp;lt;Keep the original commit message&amp;gt;&lt;br /&gt;
    &lt;br /&gt;
    Fixes CVE-2015-1472.&lt;br /&gt;
    Upstream-Status: Backport&lt;br /&gt;
       &lt;br /&gt;
    Reference to upstream patch:&lt;br /&gt;
    The patch is from (Paul Pluzhnikov &amp;lt;ppluzhnikov@google.com&amp;gt;&lt;br /&gt;
    https://sourceware.org/git/?p=glibc.git;a=patch;h=5bd80bfe9ca0d955bfbbc002781bc7b01b6bcb06&lt;br /&gt;
      &lt;br /&gt;
    Signed-off-by: &amp;lt;your email address&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Ex meta patch:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Please make sure to add the package name in the subject and the reference to the CVE. Example for the commit message: &lt;br /&gt;
&lt;br /&gt;
    bash: CVE-2014-6278 &amp;lt;if there are multiple CVEs list all&amp;gt;&lt;br /&gt;
    &lt;br /&gt;
    &amp;lt;short description&amp;gt;&lt;br /&gt;
    &lt;br /&gt;
    &amp;lt;[YOCTO #xxx] if there is any&amp;gt;&lt;br /&gt;
    &lt;br /&gt;
    References&lt;br /&gt;
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6278&lt;br /&gt;
    https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2014-6278&lt;br /&gt;
    xxxx&lt;br /&gt;
    &lt;br /&gt;
    Signed-off-by: &amp;lt;your email address&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Some security related links/useful tools ==&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
* [http://www.cvedetails.com CVE details] &lt;br /&gt;
* [http://www.cvedetails.com/vulnerability-list/vendor_id-33/product_id-47/year-2014/Linux-Linux-Kernel.html  CVE list, Linux kernel 2014]&lt;br /&gt;
* [https://www.yoctoproject.org/blogs/andrei-dinu/2013/meta-security-layer-now-available Meta-security-layer]&lt;br /&gt;
* [http://www.yoctoproject.org/docs/1.7/dev-manual/dev-manual.html#making-images-more-secure Making images more secure]&lt;br /&gt;
* [http://cvechecker.sourceforge.net Cvechecker]&lt;br /&gt;
&lt;br /&gt;
== Security Issues Addressed in Yocto Releases ==&lt;br /&gt;
&#039;&#039;&#039;Yocto 2.0 - Jethero&#039;&#039;&#039; &lt;br /&gt;
https://www.yoctoproject.org/downloads/core/jethro20&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Yocto 1.8.1 - Fido&#039;&#039;&#039; &lt;br /&gt;
https://www.yoctoproject.org/downloads/core/fido181&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Yocto 1.7.1 - Dizzy&#039;&#039;&#039; &lt;br /&gt;
https://www.yoctoproject.org/downloads/core/dizzy171&lt;/div&gt;</summary>
		<author><name>SonaSarmadi</name></author>
	</entry>
	<entry>
		<id>https://wiki.yoctoproject.org/wiki/index.php?title=Security&amp;diff=16872</id>
		<title>Security</title>
		<link rel="alternate" type="text/html" href="https://wiki.yoctoproject.org/wiki/index.php?title=Security&amp;diff=16872"/>
		<updated>2015-12-16T08:44:56Z</updated>

		<summary type="html">&lt;p&gt;SonaSarmadi: /* Patch name convention and commit message */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Since the Yocto Project is intended to be flexible and meet the needs of many applications, we leave policy-making decisions around security to our end users. Our goal instead is to ship each release with metadata that follows best practices in that we do not release recipe versions which are known to have significant security vulnerabilities. Generally this is done by upgrading recipes to newer versions that are no longer vulnerable to these issues. &lt;br /&gt;
&lt;br /&gt;
Upgrading recipes to the newer versions in the maintenance branches is not always easy, this is why we provide a patch for the existing version instead if we detect a vulnerability in a package. The patches are added to the recipes, see example below:&lt;br /&gt;
&lt;br /&gt;
  poky/recipes-connectivity/bind/bind_9.9.5.bb&lt;br /&gt;
  &lt;br /&gt;
  SRC_URI = &amp;quot;ftp://ftp.isc.org/isc/bind9/${PV}/${BPN}-${PV}.tar.gz \&lt;br /&gt;
           file://conf.patch \&lt;br /&gt;
           ...&lt;br /&gt;
           file://bind9_9_5-CVE-2014-8500.patch \&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
We are tracking security vulnerabilities in the Yocto Project against the [http://nvd.nist.gov/home.cfm National Vulnerability Database]. &lt;br /&gt;
&lt;br /&gt;
We also track CVEs reported to the oss-security list (Open Source Software Security) http://www.openwall.com/lists/oss-security/&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Yocto Security Team ==&lt;br /&gt;
 &lt;br /&gt;
The purpose of creating a security team in the Yocto project is to discuss, sync and organize security related activities.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The team&#039;s main responsibilities among others are:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
*  Scanning of security forums/mailing list(s) to detect security vulnerabilities reported by community&lt;br /&gt;
*  Responsible for fixing CVEs in the Yocto releases &amp;amp; maintained branches&lt;br /&gt;
*  Evaluation of tools for security tests &lt;br /&gt;
*  Responsible for security related info in the Yocto documentations&lt;br /&gt;
*  Hardening of Yocto release&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;How to Contact Yocto&#039;s security team Securely&#039;&#039;&#039;&lt;br /&gt;
---------------------------------------------&lt;br /&gt;
We have set up two security-related mailing lists:&lt;br /&gt;
*  &#039;&#039;&#039;Public List&#039;&#039;&#039;&lt;br /&gt;
: yocto [dash] security [at] yoctoproject[dot] org&lt;br /&gt;
: This is a public mailing list for anyone to subscribe to. This list is an open list to discuss public security issues/patches.&lt;br /&gt;
&lt;br /&gt;
*  &#039;&#039;&#039;Private List&#039;&#039;&#039;&lt;br /&gt;
: security [at] yoctoprojct [dot] org (Forwards to the following addresses)&lt;br /&gt;
 &lt;br /&gt;
: - &#039;&#039;&#039;sona [dot] sarmadi [at] enea [dot] com&#039;&#039;&#039; &lt;br /&gt;
: - &#039;&#039;&#039;mhalstead [at] linuxfoundation [dot] org&#039;&#039;&#039; &lt;br /&gt;
: For secure communications, please send your messages encrypted to both using the following GPG keys. &lt;br /&gt;
: Remember message headers are not encrypted so do not include sensitive information in the subject line.&lt;br /&gt;
&lt;br /&gt;
: Download public keys: [https://pgp.mit.edu/pks/lookup?op=vindex&amp;amp;search=0x773EF6EF68716A14 Sona Sarmadi] [https://pgp.mit.edu/pks/lookup?op=vindex&amp;amp;search=0x3373170601861969 Michael Halstead]&lt;br /&gt;
&lt;br /&gt;
Anyone can contribute with security patches as before, but those volunteering to this security team will sync/organize security related activities and take more responsibility.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;What you should do if you find a security vulnerability&#039;&#039;&#039;&lt;br /&gt;
---------------------------------------------&lt;br /&gt;
If you find a security flaw; a crash, an information leakage, or anything that can have a security impact if exploited in any Open Source packages used by the Yocto Project, please report this to the Yocto Security Team. If you prefer to contact the upstream project directly, please send a copy to the security team at Yocto as well.&lt;br /&gt;
If you believe this is sensitive information, please report the vulnerability in a secure way, i.e. encrypt the email and send it to the private list. This ensures that the exploit is not leaked and exploited before a response/fix has been generated.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;What Yocto Security Team does when it receives a security vulnerability&#039;&#039;&#039;&lt;br /&gt;
---------------------------------------------&lt;br /&gt;
The team performs a quick analysis and reports the flaw to the upstream project. Normally the upstream projects analyzes the problem. If they deem that it is a real security problem in their software, the project will  email the linux-distros mailing list and notify all the big Linux distributions/vendors about the existence of this vulnerability/flaw. These mailing lists are normally non-public. The project and people on the linux-distros can then agree on a release date when the flaw should be made public.&lt;br /&gt;
There is also sometimes some coordination for handling patches or backporting of patches etc, or just understanding the problem or what caused it.&lt;br /&gt;
&lt;br /&gt;
When the security issue is finally to be made public, normally upstream project is responsible to contact Mitre (cve.mitre.org) to get a CVE number assigned to it and copy the information to other Opens Source Security mailing lists to inform the whole world of the vulnerability.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;If an upstream project does not respond quickly&#039;&#039;&#039;&lt;br /&gt;
---------------------------------------------&lt;br /&gt;
If an upstream project does not fix the problem the Yocto&#039;s Security Team will contact linux-distros and community and together try to solve the vulnerability as quickly as possible. &lt;br /&gt;
Normally big Linux vendors fix the problem if the problem affects their products.&lt;br /&gt;
Chances are that everyone from the enterprise distros to the commercial Yocto vendors will get fixes done first, but it is nice to have saftey net for issues that really are specific to oe and embedded.&lt;br /&gt;
&lt;br /&gt;
== Branches maintained with security fixes  ==&lt;br /&gt;
See [https://wiki.yoctoproject.org/wiki/Stable_branch_maintenance Stable branches maintenance]for detailed info regarding the policies and maintenance of Stable branch.&lt;br /&gt;
&lt;br /&gt;
Versions in grey are no longer actively maintained with security patches, but well-tested patches may still be accepted for them.)&lt;br /&gt;
&lt;br /&gt;
== Policy for updating package versions for the stable branches ==&lt;br /&gt;
The Yocto project purposely limits updating of packages on oe-stable releases to items that address security problems (e.g. CVE&#039;s). For packages like qemu we avoid updating between from one &amp;quot;dot.dot&amp;quot; to another related &amp;quot;dot.dot&amp;quot; version since it has been seen in the past that even with &amp;quot;simple&amp;quot; updates, things can go wrong and a lot more testing is required to verify compatibility. Better to only add CVE patches to fix specific point problems.&lt;br /&gt;
&lt;br /&gt;
== Kernel security patches ==&lt;br /&gt;
&lt;br /&gt;
Kernel security patches are backported to Linux-yoco kernels regularly from https://www.kernel.org/&lt;br /&gt;
=== Linux-yocto ===&lt;br /&gt;
linux-yocto_3.10 &amp;amp; linux-yocto_3.14 (maintainer: Bruce Ashfield)&lt;br /&gt;
&lt;br /&gt;
=== Vendor kernels ===&lt;br /&gt;
Kernel security patches are also backported to Linux-vendor kernels from https://www.kernel.org/&lt;br /&gt;
 &lt;br /&gt;
* meta-intel (meta-intel uses Linux-yocto)&lt;br /&gt;
* meta-fsl-ppc (meta-freescale@yoctoproject.org)&lt;br /&gt;
* meta-xilinx (meta-xilinx@lists.yoctoproject.org)&lt;br /&gt;
* meta-ti (meta-ti@yoctoproject.org)&lt;br /&gt;
* etc&lt;br /&gt;
&lt;br /&gt;
== How to test ==&lt;br /&gt;
 &lt;br /&gt;
If there is any test case for the vulnerability by the upstream project or community&lt;br /&gt;
 - Run the test to reproduce the problem and verify the correction. &lt;br /&gt;
 - Run the regression test&lt;br /&gt;
&lt;br /&gt;
If there isn’t any test case and it is complicated and time consuming to write a testcase&lt;br /&gt;
 - Run the regressions test&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Regression test&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Build the core image for at least two architectures (preferably one big-endian and one little-endian)&lt;br /&gt;
* Run ptest (for those branches/packages that there is ptest mechanism)&lt;br /&gt;
&lt;br /&gt;
== Patch name convention and commit message ==&lt;br /&gt;
&lt;br /&gt;
Security patches like any Open Source developmen should follow the openembedded&#039;s [http://openembedded.org/wiki/Commit_Patch_Message_Guidelines Commit Patch Message Guidelines] and [https://www.kernel.org/doc/Documentation/SecurityBugs kernel security bugs policy] for the kernel patches. &lt;br /&gt;
&lt;br /&gt;
In addition security patches should have reference to the CVE identifier both in the patch file/s and the commit message.&lt;br /&gt;
&lt;br /&gt;
Ex: Change the upstream patch &amp;quot;wscanf-allocates-too-little-memory.patch&amp;quot; to &amp;quot;CVE-2015-1472.patch&amp;quot; (or CVE-2015-1472-wscanf-allocates-too-little-memory.patch)&lt;br /&gt;
 &lt;br /&gt;
    &amp;lt;Keep the original commit message&amp;gt;&lt;br /&gt;
    &lt;br /&gt;
    Fixes CVE-2015-1472.&lt;br /&gt;
    Upstream-Status: Backport&lt;br /&gt;
       &lt;br /&gt;
    Reference to upstream patch:&lt;br /&gt;
    The patch is from (Paul Pluzhnikov &amp;lt;ppluzhnikov@google.com&amp;gt;&lt;br /&gt;
    https://sourceware.org/git/?p=glibc.git;a=patch;h=5bd80bfe9ca0d955bfbbc002781bc7b01b6bcb06&lt;br /&gt;
      &lt;br /&gt;
    Signed-off-by:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Ex: meta patch&lt;br /&gt;
Please make sure to add the package name in the subject and the reference to the CVE. Example for the commit message: &lt;br /&gt;
&lt;br /&gt;
    bash: CVE-2014-6278 &amp;lt;if there are multiple CVEs list all&amp;gt;&lt;br /&gt;
    &lt;br /&gt;
    &amp;lt;short description&amp;gt;&lt;br /&gt;
    &lt;br /&gt;
    &amp;lt;[YOCTO #xxx] if there is any&amp;gt;&lt;br /&gt;
    &lt;br /&gt;
    References&lt;br /&gt;
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6278&lt;br /&gt;
    https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2014-6278&lt;br /&gt;
    xxxx&lt;br /&gt;
    &lt;br /&gt;
    Signed-off-by:&lt;br /&gt;
&lt;br /&gt;
== Some security related links/useful tools ==&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
* [http://www.cvedetails.com CVE details] &lt;br /&gt;
* [http://www.cvedetails.com/vulnerability-list/vendor_id-33/product_id-47/year-2014/Linux-Linux-Kernel.html  CVE list, Linux kernel 2014]&lt;br /&gt;
* [https://www.yoctoproject.org/blogs/andrei-dinu/2013/meta-security-layer-now-available Meta-security-layer]&lt;br /&gt;
* [http://www.yoctoproject.org/docs/1.7/dev-manual/dev-manual.html#making-images-more-secure Making images more secure]&lt;br /&gt;
* [http://cvechecker.sourceforge.net Cvechecker]&lt;br /&gt;
&lt;br /&gt;
== Security Issues Addressed in Yocto Releases ==&lt;br /&gt;
&#039;&#039;&#039;Yocto 2.0 - Jethero&#039;&#039;&#039; &lt;br /&gt;
https://www.yoctoproject.org/downloads/core/jethro20&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Yocto 1.8.1 - Fido&#039;&#039;&#039; &lt;br /&gt;
https://www.yoctoproject.org/downloads/core/fido181&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Yocto 1.7.1 - Dizzy&#039;&#039;&#039; &lt;br /&gt;
https://www.yoctoproject.org/downloads/core/dizzy171&lt;/div&gt;</summary>
		<author><name>SonaSarmadi</name></author>
	</entry>
	<entry>
		<id>https://wiki.yoctoproject.org/wiki/index.php?title=Security&amp;diff=16871</id>
		<title>Security</title>
		<link rel="alternate" type="text/html" href="https://wiki.yoctoproject.org/wiki/index.php?title=Security&amp;diff=16871"/>
		<updated>2015-12-16T08:44:15Z</updated>

		<summary type="html">&lt;p&gt;SonaSarmadi: /* Patch name convention and commit message */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Since the Yocto Project is intended to be flexible and meet the needs of many applications, we leave policy-making decisions around security to our end users. Our goal instead is to ship each release with metadata that follows best practices in that we do not release recipe versions which are known to have significant security vulnerabilities. Generally this is done by upgrading recipes to newer versions that are no longer vulnerable to these issues. &lt;br /&gt;
&lt;br /&gt;
Upgrading recipes to the newer versions in the maintenance branches is not always easy, this is why we provide a patch for the existing version instead if we detect a vulnerability in a package. The patches are added to the recipes, see example below:&lt;br /&gt;
&lt;br /&gt;
  poky/recipes-connectivity/bind/bind_9.9.5.bb&lt;br /&gt;
  &lt;br /&gt;
  SRC_URI = &amp;quot;ftp://ftp.isc.org/isc/bind9/${PV}/${BPN}-${PV}.tar.gz \&lt;br /&gt;
           file://conf.patch \&lt;br /&gt;
           ...&lt;br /&gt;
           file://bind9_9_5-CVE-2014-8500.patch \&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
We are tracking security vulnerabilities in the Yocto Project against the [http://nvd.nist.gov/home.cfm National Vulnerability Database]. &lt;br /&gt;
&lt;br /&gt;
We also track CVEs reported to the oss-security list (Open Source Software Security) http://www.openwall.com/lists/oss-security/&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Yocto Security Team ==&lt;br /&gt;
 &lt;br /&gt;
The purpose of creating a security team in the Yocto project is to discuss, sync and organize security related activities.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The team&#039;s main responsibilities among others are:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
*  Scanning of security forums/mailing list(s) to detect security vulnerabilities reported by community&lt;br /&gt;
*  Responsible for fixing CVEs in the Yocto releases &amp;amp; maintained branches&lt;br /&gt;
*  Evaluation of tools for security tests &lt;br /&gt;
*  Responsible for security related info in the Yocto documentations&lt;br /&gt;
*  Hardening of Yocto release&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;How to Contact Yocto&#039;s security team Securely&#039;&#039;&#039;&lt;br /&gt;
---------------------------------------------&lt;br /&gt;
We have set up two security-related mailing lists:&lt;br /&gt;
*  &#039;&#039;&#039;Public List&#039;&#039;&#039;&lt;br /&gt;
: yocto [dash] security [at] yoctoproject[dot] org&lt;br /&gt;
: This is a public mailing list for anyone to subscribe to. This list is an open list to discuss public security issues/patches.&lt;br /&gt;
&lt;br /&gt;
*  &#039;&#039;&#039;Private List&#039;&#039;&#039;&lt;br /&gt;
: security [at] yoctoprojct [dot] org (Forwards to the following addresses)&lt;br /&gt;
 &lt;br /&gt;
: - &#039;&#039;&#039;sona [dot] sarmadi [at] enea [dot] com&#039;&#039;&#039; &lt;br /&gt;
: - &#039;&#039;&#039;mhalstead [at] linuxfoundation [dot] org&#039;&#039;&#039; &lt;br /&gt;
: For secure communications, please send your messages encrypted to both using the following GPG keys. &lt;br /&gt;
: Remember message headers are not encrypted so do not include sensitive information in the subject line.&lt;br /&gt;
&lt;br /&gt;
: Download public keys: [https://pgp.mit.edu/pks/lookup?op=vindex&amp;amp;search=0x773EF6EF68716A14 Sona Sarmadi] [https://pgp.mit.edu/pks/lookup?op=vindex&amp;amp;search=0x3373170601861969 Michael Halstead]&lt;br /&gt;
&lt;br /&gt;
Anyone can contribute with security patches as before, but those volunteering to this security team will sync/organize security related activities and take more responsibility.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;What you should do if you find a security vulnerability&#039;&#039;&#039;&lt;br /&gt;
---------------------------------------------&lt;br /&gt;
If you find a security flaw; a crash, an information leakage, or anything that can have a security impact if exploited in any Open Source packages used by the Yocto Project, please report this to the Yocto Security Team. If you prefer to contact the upstream project directly, please send a copy to the security team at Yocto as well.&lt;br /&gt;
If you believe this is sensitive information, please report the vulnerability in a secure way, i.e. encrypt the email and send it to the private list. This ensures that the exploit is not leaked and exploited before a response/fix has been generated.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;What Yocto Security Team does when it receives a security vulnerability&#039;&#039;&#039;&lt;br /&gt;
---------------------------------------------&lt;br /&gt;
The team performs a quick analysis and reports the flaw to the upstream project. Normally the upstream projects analyzes the problem. If they deem that it is a real security problem in their software, the project will  email the linux-distros mailing list and notify all the big Linux distributions/vendors about the existence of this vulnerability/flaw. These mailing lists are normally non-public. The project and people on the linux-distros can then agree on a release date when the flaw should be made public.&lt;br /&gt;
There is also sometimes some coordination for handling patches or backporting of patches etc, or just understanding the problem or what caused it.&lt;br /&gt;
&lt;br /&gt;
When the security issue is finally to be made public, normally upstream project is responsible to contact Mitre (cve.mitre.org) to get a CVE number assigned to it and copy the information to other Opens Source Security mailing lists to inform the whole world of the vulnerability.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;If an upstream project does not respond quickly&#039;&#039;&#039;&lt;br /&gt;
---------------------------------------------&lt;br /&gt;
If an upstream project does not fix the problem the Yocto&#039;s Security Team will contact linux-distros and community and together try to solve the vulnerability as quickly as possible. &lt;br /&gt;
Normally big Linux vendors fix the problem if the problem affects their products.&lt;br /&gt;
Chances are that everyone from the enterprise distros to the commercial Yocto vendors will get fixes done first, but it is nice to have saftey net for issues that really are specific to oe and embedded.&lt;br /&gt;
&lt;br /&gt;
== Branches maintained with security fixes  ==&lt;br /&gt;
See [https://wiki.yoctoproject.org/wiki/Stable_branch_maintenance Stable branches maintenance]for detailed info regarding the policies and maintenance of Stable branch.&lt;br /&gt;
&lt;br /&gt;
Versions in grey are no longer actively maintained with security patches, but well-tested patches may still be accepted for them.)&lt;br /&gt;
&lt;br /&gt;
== Policy for updating package versions for the stable branches ==&lt;br /&gt;
The Yocto project purposely limits updating of packages on oe-stable releases to items that address security problems (e.g. CVE&#039;s). For packages like qemu we avoid updating between from one &amp;quot;dot.dot&amp;quot; to another related &amp;quot;dot.dot&amp;quot; version since it has been seen in the past that even with &amp;quot;simple&amp;quot; updates, things can go wrong and a lot more testing is required to verify compatibility. Better to only add CVE patches to fix specific point problems.&lt;br /&gt;
&lt;br /&gt;
== Kernel security patches ==&lt;br /&gt;
&lt;br /&gt;
Kernel security patches are backported to Linux-yoco kernels regularly from https://www.kernel.org/&lt;br /&gt;
=== Linux-yocto ===&lt;br /&gt;
linux-yocto_3.10 &amp;amp; linux-yocto_3.14 (maintainer: Bruce Ashfield)&lt;br /&gt;
&lt;br /&gt;
=== Vendor kernels ===&lt;br /&gt;
Kernel security patches are also backported to Linux-vendor kernels from https://www.kernel.org/&lt;br /&gt;
 &lt;br /&gt;
* meta-intel (meta-intel uses Linux-yocto)&lt;br /&gt;
* meta-fsl-ppc (meta-freescale@yoctoproject.org)&lt;br /&gt;
* meta-xilinx (meta-xilinx@lists.yoctoproject.org)&lt;br /&gt;
* meta-ti (meta-ti@yoctoproject.org)&lt;br /&gt;
* etc&lt;br /&gt;
&lt;br /&gt;
== How to test ==&lt;br /&gt;
 &lt;br /&gt;
If there is any test case for the vulnerability by the upstream project or community&lt;br /&gt;
 - Run the test to reproduce the problem and verify the correction. &lt;br /&gt;
 - Run the regression test&lt;br /&gt;
&lt;br /&gt;
If there isn’t any test case and it is complicated and time consuming to write a testcase&lt;br /&gt;
 - Run the regressions test&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Regression test&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Build the core image for at least two architectures (preferably one big-endian and one little-endian)&lt;br /&gt;
* Run ptest (for those branches/packages that there is ptest mechanism)&lt;br /&gt;
&lt;br /&gt;
== Patch name convention and commit message ==&lt;br /&gt;
&lt;br /&gt;
Security patches like any Open Source developmen should follow the openembedded&#039;s [http://openembedded.org/wiki/Commit_Patch_Message_Guidelines Commit Patch Message Guidelines] and [https://www.kernel.org/doc/Documentation/SecurityBugs kernel security bugs policy] for the kernel patches. &lt;br /&gt;
&lt;br /&gt;
In addition security patches should have reference to the CVE identifier both in the patch file/s and the commit message.&lt;br /&gt;
&lt;br /&gt;
Ex: Change the upstream patch &amp;quot;wscanf-allocates-too-little-memory.patch&amp;quot; to &amp;quot;CVE-2015-1472.patch&amp;quot; (or CVE-2015-1472-wscanf-allocates-too-little-memory.patch)&lt;br /&gt;
 &lt;br /&gt;
    &amp;lt;Keep the original commit message&amp;gt;&lt;br /&gt;
&lt;br /&gt;
    Fixes CVE-2015-1472.&lt;br /&gt;
    Upstream-Status: Backport&lt;br /&gt;
       &lt;br /&gt;
    Reference to upstream patch:&lt;br /&gt;
    The patch is from (Paul Pluzhnikov &amp;lt;ppluzhnikov@google.com&amp;gt;&lt;br /&gt;
    https://sourceware.org/git/?p=glibc.git;a=patch;h=5bd80bfe9ca0d955bfbbc002781bc7b01b6bcb06&lt;br /&gt;
      &lt;br /&gt;
    Signed-off-by:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Ex: meta patch&lt;br /&gt;
Please make sure to add the package name in the subject and the reference to the CVE. Example for the commit message: &lt;br /&gt;
&lt;br /&gt;
    bash: CVE-2014-6278 &amp;lt;if there are multiple CVEs list all&amp;gt;&lt;br /&gt;
    &lt;br /&gt;
    &amp;lt;short description&amp;gt;&lt;br /&gt;
    &lt;br /&gt;
    &amp;lt;[YOCTO #xxx] if there is any&amp;gt;&lt;br /&gt;
    &lt;br /&gt;
    References&lt;br /&gt;
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6278&lt;br /&gt;
    https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2014-6278&lt;br /&gt;
    xxxx&lt;br /&gt;
    &lt;br /&gt;
    Signed-off-by:&lt;br /&gt;
&lt;br /&gt;
== Some security related links/useful tools ==&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
* [http://www.cvedetails.com CVE details] &lt;br /&gt;
* [http://www.cvedetails.com/vulnerability-list/vendor_id-33/product_id-47/year-2014/Linux-Linux-Kernel.html  CVE list, Linux kernel 2014]&lt;br /&gt;
* [https://www.yoctoproject.org/blogs/andrei-dinu/2013/meta-security-layer-now-available Meta-security-layer]&lt;br /&gt;
* [http://www.yoctoproject.org/docs/1.7/dev-manual/dev-manual.html#making-images-more-secure Making images more secure]&lt;br /&gt;
* [http://cvechecker.sourceforge.net Cvechecker]&lt;br /&gt;
&lt;br /&gt;
== Security Issues Addressed in Yocto Releases ==&lt;br /&gt;
&#039;&#039;&#039;Yocto 2.0 - Jethero&#039;&#039;&#039; &lt;br /&gt;
https://www.yoctoproject.org/downloads/core/jethro20&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Yocto 1.8.1 - Fido&#039;&#039;&#039; &lt;br /&gt;
https://www.yoctoproject.org/downloads/core/fido181&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Yocto 1.7.1 - Dizzy&#039;&#039;&#039; &lt;br /&gt;
https://www.yoctoproject.org/downloads/core/dizzy171&lt;/div&gt;</summary>
		<author><name>SonaSarmadi</name></author>
	</entry>
	<entry>
		<id>https://wiki.yoctoproject.org/wiki/index.php?title=Security&amp;diff=16870</id>
		<title>Security</title>
		<link rel="alternate" type="text/html" href="https://wiki.yoctoproject.org/wiki/index.php?title=Security&amp;diff=16870"/>
		<updated>2015-12-16T08:43:14Z</updated>

		<summary type="html">&lt;p&gt;SonaSarmadi: /* Patch name convention and commit message */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Since the Yocto Project is intended to be flexible and meet the needs of many applications, we leave policy-making decisions around security to our end users. Our goal instead is to ship each release with metadata that follows best practices in that we do not release recipe versions which are known to have significant security vulnerabilities. Generally this is done by upgrading recipes to newer versions that are no longer vulnerable to these issues. &lt;br /&gt;
&lt;br /&gt;
Upgrading recipes to the newer versions in the maintenance branches is not always easy, this is why we provide a patch for the existing version instead if we detect a vulnerability in a package. The patches are added to the recipes, see example below:&lt;br /&gt;
&lt;br /&gt;
  poky/recipes-connectivity/bind/bind_9.9.5.bb&lt;br /&gt;
  &lt;br /&gt;
  SRC_URI = &amp;quot;ftp://ftp.isc.org/isc/bind9/${PV}/${BPN}-${PV}.tar.gz \&lt;br /&gt;
           file://conf.patch \&lt;br /&gt;
           ...&lt;br /&gt;
           file://bind9_9_5-CVE-2014-8500.patch \&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
We are tracking security vulnerabilities in the Yocto Project against the [http://nvd.nist.gov/home.cfm National Vulnerability Database]. &lt;br /&gt;
&lt;br /&gt;
We also track CVEs reported to the oss-security list (Open Source Software Security) http://www.openwall.com/lists/oss-security/&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Yocto Security Team ==&lt;br /&gt;
 &lt;br /&gt;
The purpose of creating a security team in the Yocto project is to discuss, sync and organize security related activities.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The team&#039;s main responsibilities among others are:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
*  Scanning of security forums/mailing list(s) to detect security vulnerabilities reported by community&lt;br /&gt;
*  Responsible for fixing CVEs in the Yocto releases &amp;amp; maintained branches&lt;br /&gt;
*  Evaluation of tools for security tests &lt;br /&gt;
*  Responsible for security related info in the Yocto documentations&lt;br /&gt;
*  Hardening of Yocto release&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;How to Contact Yocto&#039;s security team Securely&#039;&#039;&#039;&lt;br /&gt;
---------------------------------------------&lt;br /&gt;
We have set up two security-related mailing lists:&lt;br /&gt;
*  &#039;&#039;&#039;Public List&#039;&#039;&#039;&lt;br /&gt;
: yocto [dash] security [at] yoctoproject[dot] org&lt;br /&gt;
: This is a public mailing list for anyone to subscribe to. This list is an open list to discuss public security issues/patches.&lt;br /&gt;
&lt;br /&gt;
*  &#039;&#039;&#039;Private List&#039;&#039;&#039;&lt;br /&gt;
: security [at] yoctoprojct [dot] org (Forwards to the following addresses)&lt;br /&gt;
 &lt;br /&gt;
: - &#039;&#039;&#039;sona [dot] sarmadi [at] enea [dot] com&#039;&#039;&#039; &lt;br /&gt;
: - &#039;&#039;&#039;mhalstead [at] linuxfoundation [dot] org&#039;&#039;&#039; &lt;br /&gt;
: For secure communications, please send your messages encrypted to both using the following GPG keys. &lt;br /&gt;
: Remember message headers are not encrypted so do not include sensitive information in the subject line.&lt;br /&gt;
&lt;br /&gt;
: Download public keys: [https://pgp.mit.edu/pks/lookup?op=vindex&amp;amp;search=0x773EF6EF68716A14 Sona Sarmadi] [https://pgp.mit.edu/pks/lookup?op=vindex&amp;amp;search=0x3373170601861969 Michael Halstead]&lt;br /&gt;
&lt;br /&gt;
Anyone can contribute with security patches as before, but those volunteering to this security team will sync/organize security related activities and take more responsibility.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;What you should do if you find a security vulnerability&#039;&#039;&#039;&lt;br /&gt;
---------------------------------------------&lt;br /&gt;
If you find a security flaw; a crash, an information leakage, or anything that can have a security impact if exploited in any Open Source packages used by the Yocto Project, please report this to the Yocto Security Team. If you prefer to contact the upstream project directly, please send a copy to the security team at Yocto as well.&lt;br /&gt;
If you believe this is sensitive information, please report the vulnerability in a secure way, i.e. encrypt the email and send it to the private list. This ensures that the exploit is not leaked and exploited before a response/fix has been generated.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;What Yocto Security Team does when it receives a security vulnerability&#039;&#039;&#039;&lt;br /&gt;
---------------------------------------------&lt;br /&gt;
The team performs a quick analysis and reports the flaw to the upstream project. Normally the upstream projects analyzes the problem. If they deem that it is a real security problem in their software, the project will  email the linux-distros mailing list and notify all the big Linux distributions/vendors about the existence of this vulnerability/flaw. These mailing lists are normally non-public. The project and people on the linux-distros can then agree on a release date when the flaw should be made public.&lt;br /&gt;
There is also sometimes some coordination for handling patches or backporting of patches etc, or just understanding the problem or what caused it.&lt;br /&gt;
&lt;br /&gt;
When the security issue is finally to be made public, normally upstream project is responsible to contact Mitre (cve.mitre.org) to get a CVE number assigned to it and copy the information to other Opens Source Security mailing lists to inform the whole world of the vulnerability.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;If an upstream project does not respond quickly&#039;&#039;&#039;&lt;br /&gt;
---------------------------------------------&lt;br /&gt;
If an upstream project does not fix the problem the Yocto&#039;s Security Team will contact linux-distros and community and together try to solve the vulnerability as quickly as possible. &lt;br /&gt;
Normally big Linux vendors fix the problem if the problem affects their products.&lt;br /&gt;
Chances are that everyone from the enterprise distros to the commercial Yocto vendors will get fixes done first, but it is nice to have saftey net for issues that really are specific to oe and embedded.&lt;br /&gt;
&lt;br /&gt;
== Branches maintained with security fixes  ==&lt;br /&gt;
See [https://wiki.yoctoproject.org/wiki/Stable_branch_maintenance Stable branches maintenance]for detailed info regarding the policies and maintenance of Stable branch.&lt;br /&gt;
&lt;br /&gt;
Versions in grey are no longer actively maintained with security patches, but well-tested patches may still be accepted for them.)&lt;br /&gt;
&lt;br /&gt;
== Policy for updating package versions for the stable branches ==&lt;br /&gt;
The Yocto project purposely limits updating of packages on oe-stable releases to items that address security problems (e.g. CVE&#039;s). For packages like qemu we avoid updating between from one &amp;quot;dot.dot&amp;quot; to another related &amp;quot;dot.dot&amp;quot; version since it has been seen in the past that even with &amp;quot;simple&amp;quot; updates, things can go wrong and a lot more testing is required to verify compatibility. Better to only add CVE patches to fix specific point problems.&lt;br /&gt;
&lt;br /&gt;
== Kernel security patches ==&lt;br /&gt;
&lt;br /&gt;
Kernel security patches are backported to Linux-yoco kernels regularly from https://www.kernel.org/&lt;br /&gt;
=== Linux-yocto ===&lt;br /&gt;
linux-yocto_3.10 &amp;amp; linux-yocto_3.14 (maintainer: Bruce Ashfield)&lt;br /&gt;
&lt;br /&gt;
=== Vendor kernels ===&lt;br /&gt;
Kernel security patches are also backported to Linux-vendor kernels from https://www.kernel.org/&lt;br /&gt;
 &lt;br /&gt;
* meta-intel (meta-intel uses Linux-yocto)&lt;br /&gt;
* meta-fsl-ppc (meta-freescale@yoctoproject.org)&lt;br /&gt;
* meta-xilinx (meta-xilinx@lists.yoctoproject.org)&lt;br /&gt;
* meta-ti (meta-ti@yoctoproject.org)&lt;br /&gt;
* etc&lt;br /&gt;
&lt;br /&gt;
== How to test ==&lt;br /&gt;
 &lt;br /&gt;
If there is any test case for the vulnerability by the upstream project or community&lt;br /&gt;
 - Run the test to reproduce the problem and verify the correction. &lt;br /&gt;
 - Run the regression test&lt;br /&gt;
&lt;br /&gt;
If there isn’t any test case and it is complicated and time consuming to write a testcase&lt;br /&gt;
 - Run the regressions test&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Regression test&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Build the core image for at least two architectures (preferably one big-endian and one little-endian)&lt;br /&gt;
* Run ptest (for those branches/packages that there is ptest mechanism)&lt;br /&gt;
&lt;br /&gt;
== Patch name convention and commit message ==&lt;br /&gt;
&lt;br /&gt;
Security patches like any Open Source developmen should follow the openembedded&#039;s [http://openembedded.org/wiki/Commit_Patch_Message_Guidelines Commit Patch Message Guidelines] and [https://www.kernel.org/doc/Documentation/SecurityBugs kernel security bugs policy] for the kernel patches. &lt;br /&gt;
&lt;br /&gt;
In addition security patches should have reference to the CVE identifier both in the patch file/s and the commit message.&lt;br /&gt;
&lt;br /&gt;
Ex: Change the upstream patch &amp;quot;wscanf-allocates-too-little-memory.patch&amp;quot; to &amp;quot;CVE-2015-1472.patch&amp;quot; (or CVE-2015-1472-wscanf-allocates-too-little-memory.patch)&lt;br /&gt;
 &lt;br /&gt;
    Fixes CVE-2015-1472.&lt;br /&gt;
    Upstream-Status: Backport&lt;br /&gt;
       &lt;br /&gt;
    Reference to upstream patch:&lt;br /&gt;
    The patch is from (Paul Pluzhnikov &amp;lt;ppluzhnikov@google.com&amp;gt;&lt;br /&gt;
    https://sourceware.org/git/?p=glibc.git;a=patch;h=5bd80bfe9ca0d955bfbbc002781bc7b01b6bcb06&lt;br /&gt;
      &lt;br /&gt;
    Signed-off-by:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Ex: meta patch&lt;br /&gt;
Please make sure to add the package name in the subject and the reference to the CVE. Example for the commit message: &lt;br /&gt;
&lt;br /&gt;
    bash: CVE-2014-6278 &amp;lt;if there are multiple CVEs list all&amp;gt;&lt;br /&gt;
    &lt;br /&gt;
    &amp;lt;short description&amp;gt;&lt;br /&gt;
    &lt;br /&gt;
    &amp;lt;[YOCTO #xxx] if there is any&amp;gt;&lt;br /&gt;
    &lt;br /&gt;
    References&lt;br /&gt;
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6278&lt;br /&gt;
    https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2014-6278&lt;br /&gt;
    xxxx&lt;br /&gt;
    &lt;br /&gt;
    Signed-off-by:&lt;br /&gt;
&lt;br /&gt;
== Some security related links/useful tools ==&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
* [http://www.cvedetails.com CVE details] &lt;br /&gt;
* [http://www.cvedetails.com/vulnerability-list/vendor_id-33/product_id-47/year-2014/Linux-Linux-Kernel.html  CVE list, Linux kernel 2014]&lt;br /&gt;
* [https://www.yoctoproject.org/blogs/andrei-dinu/2013/meta-security-layer-now-available Meta-security-layer]&lt;br /&gt;
* [http://www.yoctoproject.org/docs/1.7/dev-manual/dev-manual.html#making-images-more-secure Making images more secure]&lt;br /&gt;
* [http://cvechecker.sourceforge.net Cvechecker]&lt;br /&gt;
&lt;br /&gt;
== Security Issues Addressed in Yocto Releases ==&lt;br /&gt;
&#039;&#039;&#039;Yocto 2.0 - Jethero&#039;&#039;&#039; &lt;br /&gt;
https://www.yoctoproject.org/downloads/core/jethro20&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Yocto 1.8.1 - Fido&#039;&#039;&#039; &lt;br /&gt;
https://www.yoctoproject.org/downloads/core/fido181&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Yocto 1.7.1 - Dizzy&#039;&#039;&#039; &lt;br /&gt;
https://www.yoctoproject.org/downloads/core/dizzy171&lt;/div&gt;</summary>
		<author><name>SonaSarmadi</name></author>
	</entry>
	<entry>
		<id>https://wiki.yoctoproject.org/wiki/index.php?title=Security&amp;diff=16869</id>
		<title>Security</title>
		<link rel="alternate" type="text/html" href="https://wiki.yoctoproject.org/wiki/index.php?title=Security&amp;diff=16869"/>
		<updated>2015-12-16T08:41:41Z</updated>

		<summary type="html">&lt;p&gt;SonaSarmadi: /* Patch name convention and commit message */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Since the Yocto Project is intended to be flexible and meet the needs of many applications, we leave policy-making decisions around security to our end users. Our goal instead is to ship each release with metadata that follows best practices in that we do not release recipe versions which are known to have significant security vulnerabilities. Generally this is done by upgrading recipes to newer versions that are no longer vulnerable to these issues. &lt;br /&gt;
&lt;br /&gt;
Upgrading recipes to the newer versions in the maintenance branches is not always easy, this is why we provide a patch for the existing version instead if we detect a vulnerability in a package. The patches are added to the recipes, see example below:&lt;br /&gt;
&lt;br /&gt;
  poky/recipes-connectivity/bind/bind_9.9.5.bb&lt;br /&gt;
  &lt;br /&gt;
  SRC_URI = &amp;quot;ftp://ftp.isc.org/isc/bind9/${PV}/${BPN}-${PV}.tar.gz \&lt;br /&gt;
           file://conf.patch \&lt;br /&gt;
           ...&lt;br /&gt;
           file://bind9_9_5-CVE-2014-8500.patch \&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
We are tracking security vulnerabilities in the Yocto Project against the [http://nvd.nist.gov/home.cfm National Vulnerability Database]. &lt;br /&gt;
&lt;br /&gt;
We also track CVEs reported to the oss-security list (Open Source Software Security) http://www.openwall.com/lists/oss-security/&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Yocto Security Team ==&lt;br /&gt;
 &lt;br /&gt;
The purpose of creating a security team in the Yocto project is to discuss, sync and organize security related activities.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The team&#039;s main responsibilities among others are:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
*  Scanning of security forums/mailing list(s) to detect security vulnerabilities reported by community&lt;br /&gt;
*  Responsible for fixing CVEs in the Yocto releases &amp;amp; maintained branches&lt;br /&gt;
*  Evaluation of tools for security tests &lt;br /&gt;
*  Responsible for security related info in the Yocto documentations&lt;br /&gt;
*  Hardening of Yocto release&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;How to Contact Yocto&#039;s security team Securely&#039;&#039;&#039;&lt;br /&gt;
---------------------------------------------&lt;br /&gt;
We have set up two security-related mailing lists:&lt;br /&gt;
*  &#039;&#039;&#039;Public List&#039;&#039;&#039;&lt;br /&gt;
: yocto [dash] security [at] yoctoproject[dot] org&lt;br /&gt;
: This is a public mailing list for anyone to subscribe to. This list is an open list to discuss public security issues/patches.&lt;br /&gt;
&lt;br /&gt;
*  &#039;&#039;&#039;Private List&#039;&#039;&#039;&lt;br /&gt;
: security [at] yoctoprojct [dot] org (Forwards to the following addresses)&lt;br /&gt;
 &lt;br /&gt;
: - &#039;&#039;&#039;sona [dot] sarmadi [at] enea [dot] com&#039;&#039;&#039; &lt;br /&gt;
: - &#039;&#039;&#039;mhalstead [at] linuxfoundation [dot] org&#039;&#039;&#039; &lt;br /&gt;
: For secure communications, please send your messages encrypted to both using the following GPG keys. &lt;br /&gt;
: Remember message headers are not encrypted so do not include sensitive information in the subject line.&lt;br /&gt;
&lt;br /&gt;
: Download public keys: [https://pgp.mit.edu/pks/lookup?op=vindex&amp;amp;search=0x773EF6EF68716A14 Sona Sarmadi] [https://pgp.mit.edu/pks/lookup?op=vindex&amp;amp;search=0x3373170601861969 Michael Halstead]&lt;br /&gt;
&lt;br /&gt;
Anyone can contribute with security patches as before, but those volunteering to this security team will sync/organize security related activities and take more responsibility.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;What you should do if you find a security vulnerability&#039;&#039;&#039;&lt;br /&gt;
---------------------------------------------&lt;br /&gt;
If you find a security flaw; a crash, an information leakage, or anything that can have a security impact if exploited in any Open Source packages used by the Yocto Project, please report this to the Yocto Security Team. If you prefer to contact the upstream project directly, please send a copy to the security team at Yocto as well.&lt;br /&gt;
If you believe this is sensitive information, please report the vulnerability in a secure way, i.e. encrypt the email and send it to the private list. This ensures that the exploit is not leaked and exploited before a response/fix has been generated.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;What Yocto Security Team does when it receives a security vulnerability&#039;&#039;&#039;&lt;br /&gt;
---------------------------------------------&lt;br /&gt;
The team performs a quick analysis and reports the flaw to the upstream project. Normally the upstream projects analyzes the problem. If they deem that it is a real security problem in their software, the project will  email the linux-distros mailing list and notify all the big Linux distributions/vendors about the existence of this vulnerability/flaw. These mailing lists are normally non-public. The project and people on the linux-distros can then agree on a release date when the flaw should be made public.&lt;br /&gt;
There is also sometimes some coordination for handling patches or backporting of patches etc, or just understanding the problem or what caused it.&lt;br /&gt;
&lt;br /&gt;
When the security issue is finally to be made public, normally upstream project is responsible to contact Mitre (cve.mitre.org) to get a CVE number assigned to it and copy the information to other Opens Source Security mailing lists to inform the whole world of the vulnerability.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;If an upstream project does not respond quickly&#039;&#039;&#039;&lt;br /&gt;
---------------------------------------------&lt;br /&gt;
If an upstream project does not fix the problem the Yocto&#039;s Security Team will contact linux-distros and community and together try to solve the vulnerability as quickly as possible. &lt;br /&gt;
Normally big Linux vendors fix the problem if the problem affects their products.&lt;br /&gt;
Chances are that everyone from the enterprise distros to the commercial Yocto vendors will get fixes done first, but it is nice to have saftey net for issues that really are specific to oe and embedded.&lt;br /&gt;
&lt;br /&gt;
== Branches maintained with security fixes  ==&lt;br /&gt;
See [https://wiki.yoctoproject.org/wiki/Stable_branch_maintenance Stable branches maintenance]for detailed info regarding the policies and maintenance of Stable branch.&lt;br /&gt;
&lt;br /&gt;
Versions in grey are no longer actively maintained with security patches, but well-tested patches may still be accepted for them.)&lt;br /&gt;
&lt;br /&gt;
== Policy for updating package versions for the stable branches ==&lt;br /&gt;
The Yocto project purposely limits updating of packages on oe-stable releases to items that address security problems (e.g. CVE&#039;s). For packages like qemu we avoid updating between from one &amp;quot;dot.dot&amp;quot; to another related &amp;quot;dot.dot&amp;quot; version since it has been seen in the past that even with &amp;quot;simple&amp;quot; updates, things can go wrong and a lot more testing is required to verify compatibility. Better to only add CVE patches to fix specific point problems.&lt;br /&gt;
&lt;br /&gt;
== Kernel security patches ==&lt;br /&gt;
&lt;br /&gt;
Kernel security patches are backported to Linux-yoco kernels regularly from https://www.kernel.org/&lt;br /&gt;
=== Linux-yocto ===&lt;br /&gt;
linux-yocto_3.10 &amp;amp; linux-yocto_3.14 (maintainer: Bruce Ashfield)&lt;br /&gt;
&lt;br /&gt;
=== Vendor kernels ===&lt;br /&gt;
Kernel security patches are also backported to Linux-vendor kernels from https://www.kernel.org/&lt;br /&gt;
 &lt;br /&gt;
* meta-intel (meta-intel uses Linux-yocto)&lt;br /&gt;
* meta-fsl-ppc (meta-freescale@yoctoproject.org)&lt;br /&gt;
* meta-xilinx (meta-xilinx@lists.yoctoproject.org)&lt;br /&gt;
* meta-ti (meta-ti@yoctoproject.org)&lt;br /&gt;
* etc&lt;br /&gt;
&lt;br /&gt;
== How to test ==&lt;br /&gt;
 &lt;br /&gt;
If there is any test case for the vulnerability by the upstream project or community&lt;br /&gt;
 - Run the test to reproduce the problem and verify the correction. &lt;br /&gt;
 - Run the regression test&lt;br /&gt;
&lt;br /&gt;
If there isn’t any test case and it is complicated and time consuming to write a testcase&lt;br /&gt;
 - Run the regressions test&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Regression test&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Build the core image for at least two architectures (preferably one big-endian and one little-endian)&lt;br /&gt;
* Run ptest (for those branches/packages that there is ptest mechanism)&lt;br /&gt;
&lt;br /&gt;
== Patch name convention and commit message ==&lt;br /&gt;
&lt;br /&gt;
Security patches like any Open Source developmen should follow the openembedded&#039;s [http://openembedded.org/wiki/Commit_Patch_Message_Guidelines Commit Patch Message Guidelines] and [https://www.kernel.org/doc/Documentation/SecurityBugs kernel security bugs policy] for the kernel patches. &lt;br /&gt;
&lt;br /&gt;
In addition security patches should have reference to the CVE identifier both in the patch file/s and the commit message.&lt;br /&gt;
&lt;br /&gt;
Ex: Upstream patch CVE-2015-1472.patch (or CVE-2015-1472-wscanf-allocates-too-little-memory.patch)&lt;br /&gt;
 &lt;br /&gt;
    Fixes CVE-2015-1472.&lt;br /&gt;
    Upstream-Status: Backport&lt;br /&gt;
       &lt;br /&gt;
    Reference to upstream patch:&lt;br /&gt;
    The patch is from (Paul Pluzhnikov &amp;lt;ppluzhnikov@google.com&amp;gt;&lt;br /&gt;
    https://sourceware.org/git/?p=glibc.git;a=patch;h=5bd80bfe9ca0d955bfbbc002781bc7b01b6bcb06&lt;br /&gt;
      &lt;br /&gt;
    Signed-off-by:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Ex: meta patch&lt;br /&gt;
Please make sure to add the package name in the subject and the reference to the CVE. Example for the commit message: &lt;br /&gt;
&lt;br /&gt;
    bash: CVE-2014-6278 &amp;lt;if there are multiple CVEs list all&amp;gt;&lt;br /&gt;
    &lt;br /&gt;
    &amp;lt;short description&amp;gt;&lt;br /&gt;
    &lt;br /&gt;
    &amp;lt;[YOCTO #xxx] if there is any&amp;gt;&lt;br /&gt;
    &lt;br /&gt;
    References&lt;br /&gt;
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6278&lt;br /&gt;
    https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2014-6278&lt;br /&gt;
    xxxx&lt;br /&gt;
    &lt;br /&gt;
    Signed-off-by:&lt;br /&gt;
&lt;br /&gt;
== Some security related links/useful tools ==&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
* [http://www.cvedetails.com CVE details] &lt;br /&gt;
* [http://www.cvedetails.com/vulnerability-list/vendor_id-33/product_id-47/year-2014/Linux-Linux-Kernel.html  CVE list, Linux kernel 2014]&lt;br /&gt;
* [https://www.yoctoproject.org/blogs/andrei-dinu/2013/meta-security-layer-now-available Meta-security-layer]&lt;br /&gt;
* [http://www.yoctoproject.org/docs/1.7/dev-manual/dev-manual.html#making-images-more-secure Making images more secure]&lt;br /&gt;
* [http://cvechecker.sourceforge.net Cvechecker]&lt;br /&gt;
&lt;br /&gt;
== Security Issues Addressed in Yocto Releases ==&lt;br /&gt;
&#039;&#039;&#039;Yocto 2.0 - Jethero&#039;&#039;&#039; &lt;br /&gt;
https://www.yoctoproject.org/downloads/core/jethro20&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Yocto 1.8.1 - Fido&#039;&#039;&#039; &lt;br /&gt;
https://www.yoctoproject.org/downloads/core/fido181&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Yocto 1.7.1 - Dizzy&#039;&#039;&#039; &lt;br /&gt;
https://www.yoctoproject.org/downloads/core/dizzy171&lt;/div&gt;</summary>
		<author><name>SonaSarmadi</name></author>
	</entry>
	<entry>
		<id>https://wiki.yoctoproject.org/wiki/index.php?title=Security&amp;diff=16868</id>
		<title>Security</title>
		<link rel="alternate" type="text/html" href="https://wiki.yoctoproject.org/wiki/index.php?title=Security&amp;diff=16868"/>
		<updated>2015-12-16T08:06:03Z</updated>

		<summary type="html">&lt;p&gt;SonaSarmadi: /* Patch name convention and commit message */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Since the Yocto Project is intended to be flexible and meet the needs of many applications, we leave policy-making decisions around security to our end users. Our goal instead is to ship each release with metadata that follows best practices in that we do not release recipe versions which are known to have significant security vulnerabilities. Generally this is done by upgrading recipes to newer versions that are no longer vulnerable to these issues. &lt;br /&gt;
&lt;br /&gt;
Upgrading recipes to the newer versions in the maintenance branches is not always easy, this is why we provide a patch for the existing version instead if we detect a vulnerability in a package. The patches are added to the recipes, see example below:&lt;br /&gt;
&lt;br /&gt;
  poky/recipes-connectivity/bind/bind_9.9.5.bb&lt;br /&gt;
  &lt;br /&gt;
  SRC_URI = &amp;quot;ftp://ftp.isc.org/isc/bind9/${PV}/${BPN}-${PV}.tar.gz \&lt;br /&gt;
           file://conf.patch \&lt;br /&gt;
           ...&lt;br /&gt;
           file://bind9_9_5-CVE-2014-8500.patch \&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
We are tracking security vulnerabilities in the Yocto Project against the [http://nvd.nist.gov/home.cfm National Vulnerability Database]. &lt;br /&gt;
&lt;br /&gt;
We also track CVEs reported to the oss-security list (Open Source Software Security) http://www.openwall.com/lists/oss-security/&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Yocto Security Team ==&lt;br /&gt;
 &lt;br /&gt;
The purpose of creating a security team in the Yocto project is to discuss, sync and organize security related activities.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The team&#039;s main responsibilities among others are:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
*  Scanning of security forums/mailing list(s) to detect security vulnerabilities reported by community&lt;br /&gt;
*  Responsible for fixing CVEs in the Yocto releases &amp;amp; maintained branches&lt;br /&gt;
*  Evaluation of tools for security tests &lt;br /&gt;
*  Responsible for security related info in the Yocto documentations&lt;br /&gt;
*  Hardening of Yocto release&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;How to Contact Yocto&#039;s security team Securely&#039;&#039;&#039;&lt;br /&gt;
---------------------------------------------&lt;br /&gt;
We have set up two security-related mailing lists:&lt;br /&gt;
*  &#039;&#039;&#039;Public List&#039;&#039;&#039;&lt;br /&gt;
: yocto [dash] security [at] yoctoproject[dot] org&lt;br /&gt;
: This is a public mailing list for anyone to subscribe to. This list is an open list to discuss public security issues/patches.&lt;br /&gt;
&lt;br /&gt;
*  &#039;&#039;&#039;Private List&#039;&#039;&#039;&lt;br /&gt;
: security [at] yoctoprojct [dot] org (Forwards to the following addresses)&lt;br /&gt;
 &lt;br /&gt;
: - &#039;&#039;&#039;sona [dot] sarmadi [at] enea [dot] com&#039;&#039;&#039; &lt;br /&gt;
: - &#039;&#039;&#039;mhalstead [at] linuxfoundation [dot] org&#039;&#039;&#039; &lt;br /&gt;
: For secure communications, please send your messages encrypted to both using the following GPG keys. &lt;br /&gt;
: Remember message headers are not encrypted so do not include sensitive information in the subject line.&lt;br /&gt;
&lt;br /&gt;
: Download public keys: [https://pgp.mit.edu/pks/lookup?op=vindex&amp;amp;search=0x773EF6EF68716A14 Sona Sarmadi] [https://pgp.mit.edu/pks/lookup?op=vindex&amp;amp;search=0x3373170601861969 Michael Halstead]&lt;br /&gt;
&lt;br /&gt;
Anyone can contribute with security patches as before, but those volunteering to this security team will sync/organize security related activities and take more responsibility.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;What you should do if you find a security vulnerability&#039;&#039;&#039;&lt;br /&gt;
---------------------------------------------&lt;br /&gt;
If you find a security flaw; a crash, an information leakage, or anything that can have a security impact if exploited in any Open Source packages used by the Yocto Project, please report this to the Yocto Security Team. If you prefer to contact the upstream project directly, please send a copy to the security team at Yocto as well.&lt;br /&gt;
If you believe this is sensitive information, please report the vulnerability in a secure way, i.e. encrypt the email and send it to the private list. This ensures that the exploit is not leaked and exploited before a response/fix has been generated.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;What Yocto Security Team does when it receives a security vulnerability&#039;&#039;&#039;&lt;br /&gt;
---------------------------------------------&lt;br /&gt;
The team performs a quick analysis and reports the flaw to the upstream project. Normally the upstream projects analyzes the problem. If they deem that it is a real security problem in their software, the project will  email the linux-distros mailing list and notify all the big Linux distributions/vendors about the existence of this vulnerability/flaw. These mailing lists are normally non-public. The project and people on the linux-distros can then agree on a release date when the flaw should be made public.&lt;br /&gt;
There is also sometimes some coordination for handling patches or backporting of patches etc, or just understanding the problem or what caused it.&lt;br /&gt;
&lt;br /&gt;
When the security issue is finally to be made public, normally upstream project is responsible to contact Mitre (cve.mitre.org) to get a CVE number assigned to it and copy the information to other Opens Source Security mailing lists to inform the whole world of the vulnerability.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;If an upstream project does not respond quickly&#039;&#039;&#039;&lt;br /&gt;
---------------------------------------------&lt;br /&gt;
If an upstream project does not fix the problem the Yocto&#039;s Security Team will contact linux-distros and community and together try to solve the vulnerability as quickly as possible. &lt;br /&gt;
Normally big Linux vendors fix the problem if the problem affects their products.&lt;br /&gt;
Chances are that everyone from the enterprise distros to the commercial Yocto vendors will get fixes done first, but it is nice to have saftey net for issues that really are specific to oe and embedded.&lt;br /&gt;
&lt;br /&gt;
== Branches maintained with security fixes  ==&lt;br /&gt;
See [https://wiki.yoctoproject.org/wiki/Stable_branch_maintenance Stable branches maintenance]for detailed info regarding the policies and maintenance of Stable branch.&lt;br /&gt;
&lt;br /&gt;
Versions in grey are no longer actively maintained with security patches, but well-tested patches may still be accepted for them.)&lt;br /&gt;
&lt;br /&gt;
== Policy for updating package versions for the stable branches ==&lt;br /&gt;
The Yocto project purposely limits updating of packages on oe-stable releases to items that address security problems (e.g. CVE&#039;s). For packages like qemu we avoid updating between from one &amp;quot;dot.dot&amp;quot; to another related &amp;quot;dot.dot&amp;quot; version since it has been seen in the past that even with &amp;quot;simple&amp;quot; updates, things can go wrong and a lot more testing is required to verify compatibility. Better to only add CVE patches to fix specific point problems.&lt;br /&gt;
&lt;br /&gt;
== Kernel security patches ==&lt;br /&gt;
&lt;br /&gt;
Kernel security patches are backported to Linux-yoco kernels regularly from https://www.kernel.org/&lt;br /&gt;
=== Linux-yocto ===&lt;br /&gt;
linux-yocto_3.10 &amp;amp; linux-yocto_3.14 (maintainer: Bruce Ashfield)&lt;br /&gt;
&lt;br /&gt;
=== Vendor kernels ===&lt;br /&gt;
Kernel security patches are also backported to Linux-vendor kernels from https://www.kernel.org/&lt;br /&gt;
 &lt;br /&gt;
* meta-intel (meta-intel uses Linux-yocto)&lt;br /&gt;
* meta-fsl-ppc (meta-freescale@yoctoproject.org)&lt;br /&gt;
* meta-xilinx (meta-xilinx@lists.yoctoproject.org)&lt;br /&gt;
* meta-ti (meta-ti@yoctoproject.org)&lt;br /&gt;
* etc&lt;br /&gt;
&lt;br /&gt;
== How to test ==&lt;br /&gt;
 &lt;br /&gt;
If there is any test case for the vulnerability by the upstream project or community&lt;br /&gt;
 - Run the test to reproduce the problem and verify the correction. &lt;br /&gt;
 - Run the regression test&lt;br /&gt;
&lt;br /&gt;
If there isn’t any test case and it is complicated and time consuming to write a testcase&lt;br /&gt;
 - Run the regressions test&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Regression test&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Build the core image for at least two architectures (preferably one big-endian and one little-endian)&lt;br /&gt;
* Run ptest (for those branches/packages that there is ptest mechanism)&lt;br /&gt;
&lt;br /&gt;
== Patch name convention and commit message ==&lt;br /&gt;
Security patches like any Open Source developmen should follow the openembedded&#039;s [http://openembedded.org/wiki/Commit_Patch_Message_Guidelines Commit Patch Message Guidelines] and [https://www.kernel.org/doc/Documentation/SecurityBugs kernel security bugs policy] for the kernel patches. &lt;br /&gt;
In addition security patches should have reference to the CVE identifier both in the patch file/s and the commit message.&lt;br /&gt;
&lt;br /&gt;
Please make sure to add the package name in the subject and the reference to the CVE. Example for the commit message: &lt;br /&gt;
&lt;br /&gt;
    bash: CVE-2014-6278&lt;br /&gt;
    &lt;br /&gt;
    &amp;lt;short description&amp;gt;&lt;br /&gt;
    &lt;br /&gt;
    &amp;lt;[YOCTO #xxx] if there is any&amp;gt;&lt;br /&gt;
    &lt;br /&gt;
    References&lt;br /&gt;
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6278&lt;br /&gt;
    https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2014-6278&lt;br /&gt;
    xxxx&lt;br /&gt;
    &lt;br /&gt;
    Signed-off-by:&lt;br /&gt;
&lt;br /&gt;
== Some security related links/useful tools ==&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
* [http://www.cvedetails.com CVE details] &lt;br /&gt;
* [http://www.cvedetails.com/vulnerability-list/vendor_id-33/product_id-47/year-2014/Linux-Linux-Kernel.html  CVE list, Linux kernel 2014]&lt;br /&gt;
* [https://www.yoctoproject.org/blogs/andrei-dinu/2013/meta-security-layer-now-available Meta-security-layer]&lt;br /&gt;
* [http://www.yoctoproject.org/docs/1.7/dev-manual/dev-manual.html#making-images-more-secure Making images more secure]&lt;br /&gt;
* [http://cvechecker.sourceforge.net Cvechecker]&lt;br /&gt;
&lt;br /&gt;
== Security Issues Addressed in Yocto Releases ==&lt;br /&gt;
&#039;&#039;&#039;Yocto 2.0 - Jethero&#039;&#039;&#039; &lt;br /&gt;
https://www.yoctoproject.org/downloads/core/jethro20&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Yocto 1.8.1 - Fido&#039;&#039;&#039; &lt;br /&gt;
https://www.yoctoproject.org/downloads/core/fido181&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Yocto 1.7.1 - Dizzy&#039;&#039;&#039; &lt;br /&gt;
https://www.yoctoproject.org/downloads/core/dizzy171&lt;/div&gt;</summary>
		<author><name>SonaSarmadi</name></author>
	</entry>
	<entry>
		<id>https://wiki.yoctoproject.org/wiki/index.php?title=Security&amp;diff=16867</id>
		<title>Security</title>
		<link rel="alternate" type="text/html" href="https://wiki.yoctoproject.org/wiki/index.php?title=Security&amp;diff=16867"/>
		<updated>2015-12-16T07:40:10Z</updated>

		<summary type="html">&lt;p&gt;SonaSarmadi: /* Security Issues Addressed in Yocto Releases */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Since the Yocto Project is intended to be flexible and meet the needs of many applications, we leave policy-making decisions around security to our end users. Our goal instead is to ship each release with metadata that follows best practices in that we do not release recipe versions which are known to have significant security vulnerabilities. Generally this is done by upgrading recipes to newer versions that are no longer vulnerable to these issues. &lt;br /&gt;
&lt;br /&gt;
Upgrading recipes to the newer versions in the maintenance branches is not always easy, this is why we provide a patch for the existing version instead if we detect a vulnerability in a package. The patches are added to the recipes, see example below:&lt;br /&gt;
&lt;br /&gt;
  poky/recipes-connectivity/bind/bind_9.9.5.bb&lt;br /&gt;
  &lt;br /&gt;
  SRC_URI = &amp;quot;ftp://ftp.isc.org/isc/bind9/${PV}/${BPN}-${PV}.tar.gz \&lt;br /&gt;
           file://conf.patch \&lt;br /&gt;
           ...&lt;br /&gt;
           file://bind9_9_5-CVE-2014-8500.patch \&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
We are tracking security vulnerabilities in the Yocto Project against the [http://nvd.nist.gov/home.cfm National Vulnerability Database]. &lt;br /&gt;
&lt;br /&gt;
We also track CVEs reported to the oss-security list (Open Source Software Security) http://www.openwall.com/lists/oss-security/&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Yocto Security Team ==&lt;br /&gt;
 &lt;br /&gt;
The purpose of creating a security team in the Yocto project is to discuss, sync and organize security related activities.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The team&#039;s main responsibilities among others are:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
*  Scanning of security forums/mailing list(s) to detect security vulnerabilities reported by community&lt;br /&gt;
*  Responsible for fixing CVEs in the Yocto releases &amp;amp; maintained branches&lt;br /&gt;
*  Evaluation of tools for security tests &lt;br /&gt;
*  Responsible for security related info in the Yocto documentations&lt;br /&gt;
*  Hardening of Yocto release&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;How to Contact Yocto&#039;s security team Securely&#039;&#039;&#039;&lt;br /&gt;
---------------------------------------------&lt;br /&gt;
We have set up two security-related mailing lists:&lt;br /&gt;
*  &#039;&#039;&#039;Public List&#039;&#039;&#039;&lt;br /&gt;
: yocto [dash] security [at] yoctoproject[dot] org&lt;br /&gt;
: This is a public mailing list for anyone to subscribe to. This list is an open list to discuss public security issues/patches.&lt;br /&gt;
&lt;br /&gt;
*  &#039;&#039;&#039;Private List&#039;&#039;&#039;&lt;br /&gt;
: security [at] yoctoprojct [dot] org (Forwards to the following addresses)&lt;br /&gt;
 &lt;br /&gt;
: - &#039;&#039;&#039;sona [dot] sarmadi [at] enea [dot] com&#039;&#039;&#039; &lt;br /&gt;
: - &#039;&#039;&#039;mhalstead [at] linuxfoundation [dot] org&#039;&#039;&#039; &lt;br /&gt;
: For secure communications, please send your messages encrypted to both using the following GPG keys. &lt;br /&gt;
: Remember message headers are not encrypted so do not include sensitive information in the subject line.&lt;br /&gt;
&lt;br /&gt;
: Download public keys: [https://pgp.mit.edu/pks/lookup?op=vindex&amp;amp;search=0x773EF6EF68716A14 Sona Sarmadi] [https://pgp.mit.edu/pks/lookup?op=vindex&amp;amp;search=0x3373170601861969 Michael Halstead]&lt;br /&gt;
&lt;br /&gt;
Anyone can contribute with security patches as before, but those volunteering to this security team will sync/organize security related activities and take more responsibility.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;What you should do if you find a security vulnerability&#039;&#039;&#039;&lt;br /&gt;
---------------------------------------------&lt;br /&gt;
If you find a security flaw; a crash, an information leakage, or anything that can have a security impact if exploited in any Open Source packages used by the Yocto Project, please report this to the Yocto Security Team. If you prefer to contact the upstream project directly, please send a copy to the security team at Yocto as well.&lt;br /&gt;
If you believe this is sensitive information, please report the vulnerability in a secure way, i.e. encrypt the email and send it to the private list. This ensures that the exploit is not leaked and exploited before a response/fix has been generated.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;What Yocto Security Team does when it receives a security vulnerability&#039;&#039;&#039;&lt;br /&gt;
---------------------------------------------&lt;br /&gt;
The team performs a quick analysis and reports the flaw to the upstream project. Normally the upstream projects analyzes the problem. If they deem that it is a real security problem in their software, the project will  email the linux-distros mailing list and notify all the big Linux distributions/vendors about the existence of this vulnerability/flaw. These mailing lists are normally non-public. The project and people on the linux-distros can then agree on a release date when the flaw should be made public.&lt;br /&gt;
There is also sometimes some coordination for handling patches or backporting of patches etc, or just understanding the problem or what caused it.&lt;br /&gt;
&lt;br /&gt;
When the security issue is finally to be made public, normally upstream project is responsible to contact Mitre (cve.mitre.org) to get a CVE number assigned to it and copy the information to other Opens Source Security mailing lists to inform the whole world of the vulnerability.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;If an upstream project does not respond quickly&#039;&#039;&#039;&lt;br /&gt;
---------------------------------------------&lt;br /&gt;
If an upstream project does not fix the problem the Yocto&#039;s Security Team will contact linux-distros and community and together try to solve the vulnerability as quickly as possible. &lt;br /&gt;
Normally big Linux vendors fix the problem if the problem affects their products.&lt;br /&gt;
Chances are that everyone from the enterprise distros to the commercial Yocto vendors will get fixes done first, but it is nice to have saftey net for issues that really are specific to oe and embedded.&lt;br /&gt;
&lt;br /&gt;
== Branches maintained with security fixes  ==&lt;br /&gt;
See [https://wiki.yoctoproject.org/wiki/Stable_branch_maintenance Stable branches maintenance]for detailed info regarding the policies and maintenance of Stable branch.&lt;br /&gt;
&lt;br /&gt;
Versions in grey are no longer actively maintained with security patches, but well-tested patches may still be accepted for them.)&lt;br /&gt;
&lt;br /&gt;
== Policy for updating package versions for the stable branches ==&lt;br /&gt;
The Yocto project purposely limits updating of packages on oe-stable releases to items that address security problems (e.g. CVE&#039;s). For packages like qemu we avoid updating between from one &amp;quot;dot.dot&amp;quot; to another related &amp;quot;dot.dot&amp;quot; version since it has been seen in the past that even with &amp;quot;simple&amp;quot; updates, things can go wrong and a lot more testing is required to verify compatibility. Better to only add CVE patches to fix specific point problems.&lt;br /&gt;
&lt;br /&gt;
== Kernel security patches ==&lt;br /&gt;
&lt;br /&gt;
Kernel security patches are backported to Linux-yoco kernels regularly from https://www.kernel.org/&lt;br /&gt;
=== Linux-yocto ===&lt;br /&gt;
linux-yocto_3.10 &amp;amp; linux-yocto_3.14 (maintainer: Bruce Ashfield)&lt;br /&gt;
&lt;br /&gt;
=== Vendor kernels ===&lt;br /&gt;
Kernel security patches are also backported to Linux-vendor kernels from https://www.kernel.org/&lt;br /&gt;
 &lt;br /&gt;
* meta-intel (meta-intel uses Linux-yocto)&lt;br /&gt;
* meta-fsl-ppc (meta-freescale@yoctoproject.org)&lt;br /&gt;
* meta-xilinx (meta-xilinx@lists.yoctoproject.org)&lt;br /&gt;
* meta-ti (meta-ti@yoctoproject.org)&lt;br /&gt;
* etc&lt;br /&gt;
&lt;br /&gt;
== How to test ==&lt;br /&gt;
 &lt;br /&gt;
If there is any test case for the vulnerability by the upstream project or community&lt;br /&gt;
 - Run the test to reproduce the problem and verify the correction. &lt;br /&gt;
 - Run the regression test&lt;br /&gt;
&lt;br /&gt;
If there isn’t any test case and it is complicated and time consuming to write a testcase&lt;br /&gt;
 - Run the regressions test&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Regression test&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Build the core image for at least two architectures (preferably one big-endian and one little-endian)&lt;br /&gt;
* Run ptest (for those branches/packages that there is ptest mechanism)&lt;br /&gt;
&lt;br /&gt;
== Patch name convention and commit message ==&lt;br /&gt;
Security patches like any Open Source developmen should follow the openembedded&#039;s [http://openembedded.org/wiki/Commit_Patch_Message_Guidelines Commit Patch Message Guidelines] and [https://www.kernel.org/doc/Documentation/SecurityBugs kernel security bugs policy] for the kernel patches. &lt;br /&gt;
In addition security patches should have reference to the CVE identifier both in the patch file/s and the commit message.&lt;br /&gt;
&lt;br /&gt;
Please make sure to add the package name in the subject and the reference to the CVE. Example for the commit message: &lt;br /&gt;
&lt;br /&gt;
    bash: CVE-2014-6278&lt;br /&gt;
    &lt;br /&gt;
    &amp;lt;short description&amp;gt;&lt;br /&gt;
    &lt;br /&gt;
    &amp;lt;[YOCTO #xxx] if there is any&amp;gt;&lt;br /&gt;
    &lt;br /&gt;
    References&lt;br /&gt;
    E.g. [https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6278 link to CVE] or other useful info/blog/advisory.&lt;br /&gt;
    &lt;br /&gt;
    Signed-off-by:&lt;br /&gt;
&lt;br /&gt;
== Some security related links/useful tools ==&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
* [http://www.cvedetails.com CVE details] &lt;br /&gt;
* [http://www.cvedetails.com/vulnerability-list/vendor_id-33/product_id-47/year-2014/Linux-Linux-Kernel.html  CVE list, Linux kernel 2014]&lt;br /&gt;
* [https://www.yoctoproject.org/blogs/andrei-dinu/2013/meta-security-layer-now-available Meta-security-layer]&lt;br /&gt;
* [http://www.yoctoproject.org/docs/1.7/dev-manual/dev-manual.html#making-images-more-secure Making images more secure]&lt;br /&gt;
* [http://cvechecker.sourceforge.net Cvechecker]&lt;br /&gt;
&lt;br /&gt;
== Security Issues Addressed in Yocto Releases ==&lt;br /&gt;
&#039;&#039;&#039;Yocto 2.0 - Jethero&#039;&#039;&#039; &lt;br /&gt;
https://www.yoctoproject.org/downloads/core/jethro20&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Yocto 1.8.1 - Fido&#039;&#039;&#039; &lt;br /&gt;
https://www.yoctoproject.org/downloads/core/fido181&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Yocto 1.7.1 - Dizzy&#039;&#039;&#039; &lt;br /&gt;
https://www.yoctoproject.org/downloads/core/dizzy171&lt;/div&gt;</summary>
		<author><name>SonaSarmadi</name></author>
	</entry>
	<entry>
		<id>https://wiki.yoctoproject.org/wiki/index.php?title=Security&amp;diff=16866</id>
		<title>Security</title>
		<link rel="alternate" type="text/html" href="https://wiki.yoctoproject.org/wiki/index.php?title=Security&amp;diff=16866"/>
		<updated>2015-12-16T07:35:30Z</updated>

		<summary type="html">&lt;p&gt;SonaSarmadi: /* Branches maintained with security fixes */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Since the Yocto Project is intended to be flexible and meet the needs of many applications, we leave policy-making decisions around security to our end users. Our goal instead is to ship each release with metadata that follows best practices in that we do not release recipe versions which are known to have significant security vulnerabilities. Generally this is done by upgrading recipes to newer versions that are no longer vulnerable to these issues. &lt;br /&gt;
&lt;br /&gt;
Upgrading recipes to the newer versions in the maintenance branches is not always easy, this is why we provide a patch for the existing version instead if we detect a vulnerability in a package. The patches are added to the recipes, see example below:&lt;br /&gt;
&lt;br /&gt;
  poky/recipes-connectivity/bind/bind_9.9.5.bb&lt;br /&gt;
  &lt;br /&gt;
  SRC_URI = &amp;quot;ftp://ftp.isc.org/isc/bind9/${PV}/${BPN}-${PV}.tar.gz \&lt;br /&gt;
           file://conf.patch \&lt;br /&gt;
           ...&lt;br /&gt;
           file://bind9_9_5-CVE-2014-8500.patch \&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
We are tracking security vulnerabilities in the Yocto Project against the [http://nvd.nist.gov/home.cfm National Vulnerability Database]. &lt;br /&gt;
&lt;br /&gt;
We also track CVEs reported to the oss-security list (Open Source Software Security) http://www.openwall.com/lists/oss-security/&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Yocto Security Team ==&lt;br /&gt;
 &lt;br /&gt;
The purpose of creating a security team in the Yocto project is to discuss, sync and organize security related activities.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The team&#039;s main responsibilities among others are:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
*  Scanning of security forums/mailing list(s) to detect security vulnerabilities reported by community&lt;br /&gt;
*  Responsible for fixing CVEs in the Yocto releases &amp;amp; maintained branches&lt;br /&gt;
*  Evaluation of tools for security tests &lt;br /&gt;
*  Responsible for security related info in the Yocto documentations&lt;br /&gt;
*  Hardening of Yocto release&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;How to Contact Yocto&#039;s security team Securely&#039;&#039;&#039;&lt;br /&gt;
---------------------------------------------&lt;br /&gt;
We have set up two security-related mailing lists:&lt;br /&gt;
*  &#039;&#039;&#039;Public List&#039;&#039;&#039;&lt;br /&gt;
: yocto [dash] security [at] yoctoproject[dot] org&lt;br /&gt;
: This is a public mailing list for anyone to subscribe to. This list is an open list to discuss public security issues/patches.&lt;br /&gt;
&lt;br /&gt;
*  &#039;&#039;&#039;Private List&#039;&#039;&#039;&lt;br /&gt;
: security [at] yoctoprojct [dot] org (Forwards to the following addresses)&lt;br /&gt;
 &lt;br /&gt;
: - &#039;&#039;&#039;sona [dot] sarmadi [at] enea [dot] com&#039;&#039;&#039; &lt;br /&gt;
: - &#039;&#039;&#039;mhalstead [at] linuxfoundation [dot] org&#039;&#039;&#039; &lt;br /&gt;
: For secure communications, please send your messages encrypted to both using the following GPG keys. &lt;br /&gt;
: Remember message headers are not encrypted so do not include sensitive information in the subject line.&lt;br /&gt;
&lt;br /&gt;
: Download public keys: [https://pgp.mit.edu/pks/lookup?op=vindex&amp;amp;search=0x773EF6EF68716A14 Sona Sarmadi] [https://pgp.mit.edu/pks/lookup?op=vindex&amp;amp;search=0x3373170601861969 Michael Halstead]&lt;br /&gt;
&lt;br /&gt;
Anyone can contribute with security patches as before, but those volunteering to this security team will sync/organize security related activities and take more responsibility.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;What you should do if you find a security vulnerability&#039;&#039;&#039;&lt;br /&gt;
---------------------------------------------&lt;br /&gt;
If you find a security flaw; a crash, an information leakage, or anything that can have a security impact if exploited in any Open Source packages used by the Yocto Project, please report this to the Yocto Security Team. If you prefer to contact the upstream project directly, please send a copy to the security team at Yocto as well.&lt;br /&gt;
If you believe this is sensitive information, please report the vulnerability in a secure way, i.e. encrypt the email and send it to the private list. This ensures that the exploit is not leaked and exploited before a response/fix has been generated.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;What Yocto Security Team does when it receives a security vulnerability&#039;&#039;&#039;&lt;br /&gt;
---------------------------------------------&lt;br /&gt;
The team performs a quick analysis and reports the flaw to the upstream project. Normally the upstream projects analyzes the problem. If they deem that it is a real security problem in their software, the project will  email the linux-distros mailing list and notify all the big Linux distributions/vendors about the existence of this vulnerability/flaw. These mailing lists are normally non-public. The project and people on the linux-distros can then agree on a release date when the flaw should be made public.&lt;br /&gt;
There is also sometimes some coordination for handling patches or backporting of patches etc, or just understanding the problem or what caused it.&lt;br /&gt;
&lt;br /&gt;
When the security issue is finally to be made public, normally upstream project is responsible to contact Mitre (cve.mitre.org) to get a CVE number assigned to it and copy the information to other Opens Source Security mailing lists to inform the whole world of the vulnerability.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;If an upstream project does not respond quickly&#039;&#039;&#039;&lt;br /&gt;
---------------------------------------------&lt;br /&gt;
If an upstream project does not fix the problem the Yocto&#039;s Security Team will contact linux-distros and community and together try to solve the vulnerability as quickly as possible. &lt;br /&gt;
Normally big Linux vendors fix the problem if the problem affects their products.&lt;br /&gt;
Chances are that everyone from the enterprise distros to the commercial Yocto vendors will get fixes done first, but it is nice to have saftey net for issues that really are specific to oe and embedded.&lt;br /&gt;
&lt;br /&gt;
== Branches maintained with security fixes  ==&lt;br /&gt;
See [https://wiki.yoctoproject.org/wiki/Stable_branch_maintenance Stable branches maintenance]for detailed info regarding the policies and maintenance of Stable branch.&lt;br /&gt;
&lt;br /&gt;
Versions in grey are no longer actively maintained with security patches, but well-tested patches may still be accepted for them.)&lt;br /&gt;
&lt;br /&gt;
== Policy for updating package versions for the stable branches ==&lt;br /&gt;
The Yocto project purposely limits updating of packages on oe-stable releases to items that address security problems (e.g. CVE&#039;s). For packages like qemu we avoid updating between from one &amp;quot;dot.dot&amp;quot; to another related &amp;quot;dot.dot&amp;quot; version since it has been seen in the past that even with &amp;quot;simple&amp;quot; updates, things can go wrong and a lot more testing is required to verify compatibility. Better to only add CVE patches to fix specific point problems.&lt;br /&gt;
&lt;br /&gt;
== Kernel security patches ==&lt;br /&gt;
&lt;br /&gt;
Kernel security patches are backported to Linux-yoco kernels regularly from https://www.kernel.org/&lt;br /&gt;
=== Linux-yocto ===&lt;br /&gt;
linux-yocto_3.10 &amp;amp; linux-yocto_3.14 (maintainer: Bruce Ashfield)&lt;br /&gt;
&lt;br /&gt;
=== Vendor kernels ===&lt;br /&gt;
Kernel security patches are also backported to Linux-vendor kernels from https://www.kernel.org/&lt;br /&gt;
 &lt;br /&gt;
* meta-intel (meta-intel uses Linux-yocto)&lt;br /&gt;
* meta-fsl-ppc (meta-freescale@yoctoproject.org)&lt;br /&gt;
* meta-xilinx (meta-xilinx@lists.yoctoproject.org)&lt;br /&gt;
* meta-ti (meta-ti@yoctoproject.org)&lt;br /&gt;
* etc&lt;br /&gt;
&lt;br /&gt;
== How to test ==&lt;br /&gt;
 &lt;br /&gt;
If there is any test case for the vulnerability by the upstream project or community&lt;br /&gt;
 - Run the test to reproduce the problem and verify the correction. &lt;br /&gt;
 - Run the regression test&lt;br /&gt;
&lt;br /&gt;
If there isn’t any test case and it is complicated and time consuming to write a testcase&lt;br /&gt;
 - Run the regressions test&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Regression test&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Build the core image for at least two architectures (preferably one big-endian and one little-endian)&lt;br /&gt;
* Run ptest (for those branches/packages that there is ptest mechanism)&lt;br /&gt;
&lt;br /&gt;
== Patch name convention and commit message ==&lt;br /&gt;
Security patches like any Open Source developmen should follow the openembedded&#039;s [http://openembedded.org/wiki/Commit_Patch_Message_Guidelines Commit Patch Message Guidelines] and [https://www.kernel.org/doc/Documentation/SecurityBugs kernel security bugs policy] for the kernel patches. &lt;br /&gt;
In addition security patches should have reference to the CVE identifier both in the patch file/s and the commit message.&lt;br /&gt;
&lt;br /&gt;
Please make sure to add the package name in the subject and the reference to the CVE. Example for the commit message: &lt;br /&gt;
&lt;br /&gt;
    bash: CVE-2014-6278&lt;br /&gt;
    &lt;br /&gt;
    &amp;lt;short description&amp;gt;&lt;br /&gt;
    &lt;br /&gt;
    &amp;lt;[YOCTO #xxx] if there is any&amp;gt;&lt;br /&gt;
    &lt;br /&gt;
    References&lt;br /&gt;
    E.g. [https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6278 link to CVE] or other useful info/blog/advisory.&lt;br /&gt;
    &lt;br /&gt;
    Signed-off-by:&lt;br /&gt;
&lt;br /&gt;
== Some security related links/useful tools ==&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
* [http://www.cvedetails.com CVE details] &lt;br /&gt;
* [http://www.cvedetails.com/vulnerability-list/vendor_id-33/product_id-47/year-2014/Linux-Linux-Kernel.html  CVE list, Linux kernel 2014]&lt;br /&gt;
* [https://www.yoctoproject.org/blogs/andrei-dinu/2013/meta-security-layer-now-available Meta-security-layer]&lt;br /&gt;
* [http://www.yoctoproject.org/docs/1.7/dev-manual/dev-manual.html#making-images-more-secure Making images more secure]&lt;br /&gt;
* [http://cvechecker.sourceforge.net Cvechecker]&lt;br /&gt;
&lt;br /&gt;
== Security Issues Addressed in Yocto Releases ==&lt;br /&gt;
&#039;&#039;&#039;Yocto 1.7.1 - Dizzy&#039;&#039;&#039; &lt;br /&gt;
https://www.yoctoproject.org/downloads/core/dizzy171&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Yocto 1.7 - Dizzy&#039;&#039;&#039; &lt;br /&gt;
https://www.yoctoproject.org/downloads/core/dizzy17&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Yocto 1.6 - Daisy&#039;&#039;&#039; &lt;br /&gt;
https://www.yoctoproject.org/downloads/core/daisy16&lt;/div&gt;</summary>
		<author><name>SonaSarmadi</name></author>
	</entry>
	<entry>
		<id>https://wiki.yoctoproject.org/wiki/index.php?title=Security&amp;diff=14503</id>
		<title>Security</title>
		<link rel="alternate" type="text/html" href="https://wiki.yoctoproject.org/wiki/index.php?title=Security&amp;diff=14503"/>
		<updated>2015-04-27T10:06:52Z</updated>

		<summary type="html">&lt;p&gt;SonaSarmadi: /* Patch name convention and commit message */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Since the Yocto Project is intended to be flexible and meet the needs of many applications, we leave policy-making decisions around security to our end users. Our goal instead is to ship each release with metadata that follows best practices in that we do not release recipe versions which are known to have significant security vulnerabilities. Generally this is done by upgrading recipes to newer versions that are no longer vulnerable to these issues. &lt;br /&gt;
&lt;br /&gt;
Upgrading recipes to the newer versions in the maintenance branches is not always easy, this is why we provide a patch for the existing version instead if we detect a vulnerability in a package. The patches are added to the recipes, see example below:&lt;br /&gt;
&lt;br /&gt;
  poky/recipes-connectivity/bind/bind_9.9.5.bb&lt;br /&gt;
  &lt;br /&gt;
  SRC_URI = &amp;quot;ftp://ftp.isc.org/isc/bind9/${PV}/${BPN}-${PV}.tar.gz \&lt;br /&gt;
           file://conf.patch \&lt;br /&gt;
           ...&lt;br /&gt;
           file://bind9_9_5-CVE-2014-8500.patch \&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
We are tracking security vulnerabilities in the Yocto Project against the [http://nvd.nist.gov/home.cfm National Vulnerability Database]. &lt;br /&gt;
&lt;br /&gt;
We also track CVEs reported to the oss-security list (Open Source Software Security) http://www.openwall.com/lists/oss-security/&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Yocto Security Team ==&lt;br /&gt;
 &lt;br /&gt;
The purpose of creating a security team in the Yocto project is to discuss, sync and organize security related activities.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The team&#039;s main responsibilities among others are:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
*  Scanning of security forums/mailing list(s) to detect security vulnerabilities reported by community&lt;br /&gt;
*  Responsible for fixing CVEs in the Yocto releases &amp;amp; maintained branches&lt;br /&gt;
*  Evaluation of tools for security tests &lt;br /&gt;
*  Responsible for security related info in the Yocto documentations&lt;br /&gt;
*  Hardening of Yocto release&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;How to Contact Yocto&#039;s security team Securely&#039;&#039;&#039;&lt;br /&gt;
---------------------------------------------&lt;br /&gt;
We have set up two security-related mailing lists:&lt;br /&gt;
*  &#039;&#039;&#039;Public List&#039;&#039;&#039;&lt;br /&gt;
: yocto [dash] security [at] yoctoproject[dot] org&lt;br /&gt;
: This is a public mailing list for anyone to subscribe to. This list is an open list to discuss public security issues/patches.&lt;br /&gt;
&lt;br /&gt;
*  &#039;&#039;&#039;Private List&#039;&#039;&#039;&lt;br /&gt;
: security [at] yoctoprojct [dot] org (Forwards to the following addresses)&lt;br /&gt;
 &lt;br /&gt;
: - &#039;&#039;&#039;sona [dot] sarmadi [at] enea [dot] com&#039;&#039;&#039; &lt;br /&gt;
: - &#039;&#039;&#039;mhalstead [at] linuxfoundation [dot] org&#039;&#039;&#039; &lt;br /&gt;
: For secure communications, please send your messages encrypted to both using the following GPG keys. &lt;br /&gt;
: Remember message headers are not encrypted so do not include sensitive information in the subject line.&lt;br /&gt;
&lt;br /&gt;
: Download public keys: [https://pgp.mit.edu/pks/lookup?op=vindex&amp;amp;search=0x773EF6EF68716A14 Sona Sarmadi] [https://pgp.mit.edu/pks/lookup?op=vindex&amp;amp;search=0x3373170601861969 Michael Halstead]&lt;br /&gt;
&lt;br /&gt;
Anyone can contribute with security patches as before, but those volunteering to this security team will sync/organize security related activities and take more responsibility.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;What you should do if you find a security vulnerability&#039;&#039;&#039;&lt;br /&gt;
---------------------------------------------&lt;br /&gt;
If you find a security flaw; a crash, an information leakage, or anything that can have a security impact if exploited in any Open Source packages used by the Yocto Project, please report this to the Yocto Security Team. If you prefer to contact the upstream project directly, please send a copy to the security team at Yocto as well.&lt;br /&gt;
If you believe this is sensitive information, please report the vulnerability in a secure way, i.e. encrypt the email and send it to the private list. This ensures that the exploit is not leaked and exploited before a response/fix has been generated.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;What Yocto Security Team does when it receives a security vulnerability&#039;&#039;&#039;&lt;br /&gt;
---------------------------------------------&lt;br /&gt;
The team performs a quick analysis and reports the flaw to the upstream project. Normally the upstream projects analyzes the problem. If they deem that it is a real security problem in their software, the project will  email the linux-distros mailing list and notify all the big Linux distributions/vendors about the existence of this vulnerability/flaw. These mailing lists are normally non-public. The project and people on the linux-distros can then agree on a release date when the flaw should be made public.&lt;br /&gt;
There is also sometimes some coordination for handling patches or backporting of patches etc, or just understanding the problem or what caused it.&lt;br /&gt;
&lt;br /&gt;
When the security issue is finally to be made public, normally upstream project is responsible to contact Mitre (cve.mitre.org) to get a CVE number assigned to it and copy the information to other Opens Source Security mailing lists to inform the whole world of the vulnerability.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;If an upstream project does not respond quickly&#039;&#039;&#039;&lt;br /&gt;
---------------------------------------------&lt;br /&gt;
If an upstream project does not fix the problem the Yocto&#039;s Security Team will contact linux-distros and community and together try to solve the vulnerability as quickly as possible. &lt;br /&gt;
Normally big Linux vendors fix the problem if the problem affects their products.&lt;br /&gt;
Chances are that everyone from the enterprise distros to the commercial Yocto vendors will get fixes done first, but it is nice to have saftey net for issues that really are specific to oe and embedded.&lt;br /&gt;
&lt;br /&gt;
== Branches maintained with security fixes  ==&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! Major version&lt;br /&gt;
! Current Version&lt;br /&gt;
! Branch name&lt;br /&gt;
! BitBake version&lt;br /&gt;
! Maintainer&lt;br /&gt;
|-&lt;br /&gt;
|1.7&lt;br /&gt;
|1.7&lt;br /&gt;
|dizzy&lt;br /&gt;
|1.24&lt;br /&gt;
|Armin Kuster &amp;lt;akuster808@gmail.com&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
|1.6&lt;br /&gt;
|1.6.1&lt;br /&gt;
|daisy&lt;br /&gt;
|1.22&lt;br /&gt;
|Saul Wold &amp;lt;sgw@linux.intel.com&amp;gt;&lt;br /&gt;
|- style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|1.5&lt;br /&gt;
|1.5.3&lt;br /&gt;
|dora&lt;br /&gt;
|1.20&lt;br /&gt;
|Robert Yang &amp;lt;liezhi.yang@windriver.com&amp;gt;&lt;br /&gt;
|- style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|1.4&lt;br /&gt;
|1.4.3[https://lists.yoctoproject.org/pipermail/yocto/2014-July/020699.html *]&lt;br /&gt;
|dylan&lt;br /&gt;
|1.18&lt;br /&gt;
|Paul Eggleton &amp;lt;paul.eggleton@linux.intel.com&amp;gt;&lt;br /&gt;
|- style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|1.3&lt;br /&gt;
|1.3.2&lt;br /&gt;
|danny&lt;br /&gt;
|1.16&lt;br /&gt;
|Ross Burton &amp;lt;ross.burton@intel.com&amp;gt;&lt;br /&gt;
|- style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Security patches (CVEs) is backported to all branches above (if at all possible). &lt;br /&gt;
Versions in grey are no longer actively maintained, but well-tested security patches may still be accepted for them.) &lt;br /&gt;
&lt;br /&gt;
See [https://wiki.yoctoproject.org/wiki/Stable_branch_maintenance Stable branches maintenance]for detailed info regarding the policies and maintenance of Stable branch&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Policy for updating package versions for the stable branches ==&lt;br /&gt;
The Yocto project purposely limits updating of packages on oe-stable releases to items that address security problems (e.g. CVE&#039;s). For packages like qemu we avoid updating between from one &amp;quot;dot.dot&amp;quot; to another related &amp;quot;dot.dot&amp;quot; version since it has been seen in the past that even with &amp;quot;simple&amp;quot; updates, things can go wrong and a lot more testing is required to verify compatibility. Better to only add CVE patches to fix specific point problems.&lt;br /&gt;
&lt;br /&gt;
== Kernel security patches ==&lt;br /&gt;
&lt;br /&gt;
Kernel security patches are backported to Linux-yoco kernels regularly from https://www.kernel.org/&lt;br /&gt;
=== Linux-yocto ===&lt;br /&gt;
linux-yocto_3.10 &amp;amp; linux-yocto_3.14 (maintainer: Bruce Ashfield)&lt;br /&gt;
&lt;br /&gt;
=== Vendor kernels ===&lt;br /&gt;
Kernel security patches are also backported to Linux-vendor kernels from https://www.kernel.org/&lt;br /&gt;
 &lt;br /&gt;
* meta-intel (meta-intel uses Linux-yocto)&lt;br /&gt;
* meta-fsl-ppc (meta-freescale@yoctoproject.org)&lt;br /&gt;
* meta-xilinx (meta-xilinx@lists.yoctoproject.org)&lt;br /&gt;
* meta-ti (meta-ti@yoctoproject.org)&lt;br /&gt;
* etc&lt;br /&gt;
&lt;br /&gt;
== How to test ==&lt;br /&gt;
 &lt;br /&gt;
If there is any test case for the vulnerability by the upstream project or community&lt;br /&gt;
 - Run the test to reproduce the problem and verify the correction. &lt;br /&gt;
 - Run the regression test&lt;br /&gt;
&lt;br /&gt;
If there isn’t any test case and it is complicated and time consuming to write a testcase&lt;br /&gt;
 - Run the regressions test&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Regression test&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Build the core image for at least two architectures (preferably one big-endian and one little-endian)&lt;br /&gt;
* Run ptest (for those branches/packages that there is ptest mechanism)&lt;br /&gt;
&lt;br /&gt;
== Patch name convention and commit message ==&lt;br /&gt;
Security patches like any Open Source developmen should follow the openembedded&#039;s [http://openembedded.org/wiki/Commit_Patch_Message_Guidelines Commit Patch Message Guidelines] and [https://www.kernel.org/doc/Documentation/SecurityBugs kernel security bugs policy] for the kernel patches. &lt;br /&gt;
In addition security patches should have reference to the CVE identifier both in the patch file/s and the commit message.&lt;br /&gt;
&lt;br /&gt;
Please make sure to add the package name in the subject and the reference to the CVE. Example for the commit message: &lt;br /&gt;
&lt;br /&gt;
    bash: CVE-2014-6278&lt;br /&gt;
    &lt;br /&gt;
    &amp;lt;short description&amp;gt;&lt;br /&gt;
    &lt;br /&gt;
    &amp;lt;[YOCTO #xxx] if there is any&amp;gt;&lt;br /&gt;
    &lt;br /&gt;
    References&lt;br /&gt;
    E.g. [https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6278 link to CVE] or other useful info/blog/advisory.&lt;br /&gt;
    &lt;br /&gt;
    Signed-off-by:&lt;br /&gt;
&lt;br /&gt;
== Some security related links/useful tools ==&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
* [http://www.cvedetails.com CVE details] &lt;br /&gt;
* [http://www.cvedetails.com/vulnerability-list/vendor_id-33/product_id-47/year-2014/Linux-Linux-Kernel.html  CVE list, Linux kernel 2014]&lt;br /&gt;
* [https://www.yoctoproject.org/blogs/andrei-dinu/2013/meta-security-layer-now-available Meta-security-layer]&lt;br /&gt;
* [http://www.yoctoproject.org/docs/1.7/dev-manual/dev-manual.html#making-images-more-secure Making images more secure]&lt;br /&gt;
* [http://cvechecker.sourceforge.net Cvechecker]&lt;br /&gt;
&lt;br /&gt;
== Security Issues Addressed in Yocto Releases ==&lt;br /&gt;
&#039;&#039;&#039;Yocto 1.7.1 - Dizzy&#039;&#039;&#039; &lt;br /&gt;
https://www.yoctoproject.org/downloads/core/dizzy171&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Yocto 1.7 - Dizzy&#039;&#039;&#039; &lt;br /&gt;
https://www.yoctoproject.org/downloads/core/dizzy17&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Yocto 1.6 - Daisy&#039;&#039;&#039; &lt;br /&gt;
https://www.yoctoproject.org/downloads/core/daisy16&lt;/div&gt;</summary>
		<author><name>SonaSarmadi</name></author>
	</entry>
	<entry>
		<id>https://wiki.yoctoproject.org/wiki/index.php?title=Security&amp;diff=14502</id>
		<title>Security</title>
		<link rel="alternate" type="text/html" href="https://wiki.yoctoproject.org/wiki/index.php?title=Security&amp;diff=14502"/>
		<updated>2015-04-27T05:35:08Z</updated>

		<summary type="html">&lt;p&gt;SonaSarmadi: /* Patch name convention and commit message */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Since the Yocto Project is intended to be flexible and meet the needs of many applications, we leave policy-making decisions around security to our end users. Our goal instead is to ship each release with metadata that follows best practices in that we do not release recipe versions which are known to have significant security vulnerabilities. Generally this is done by upgrading recipes to newer versions that are no longer vulnerable to these issues. &lt;br /&gt;
&lt;br /&gt;
Upgrading recipes to the newer versions in the maintenance branches is not always easy, this is why we provide a patch for the existing version instead if we detect a vulnerability in a package. The patches are added to the recipes, see example below:&lt;br /&gt;
&lt;br /&gt;
  poky/recipes-connectivity/bind/bind_9.9.5.bb&lt;br /&gt;
  &lt;br /&gt;
  SRC_URI = &amp;quot;ftp://ftp.isc.org/isc/bind9/${PV}/${BPN}-${PV}.tar.gz \&lt;br /&gt;
           file://conf.patch \&lt;br /&gt;
           ...&lt;br /&gt;
           file://bind9_9_5-CVE-2014-8500.patch \&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
We are tracking security vulnerabilities in the Yocto Project against the [http://nvd.nist.gov/home.cfm National Vulnerability Database]. &lt;br /&gt;
&lt;br /&gt;
We also track CVEs reported to the oss-security list (Open Source Software Security) http://www.openwall.com/lists/oss-security/&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Yocto Security Team ==&lt;br /&gt;
 &lt;br /&gt;
The purpose of creating a security team in the Yocto project is to discuss, sync and organize security related activities.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The team&#039;s main responsibilities among others are:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
*  Scanning of security forums/mailing list(s) to detect security vulnerabilities reported by community&lt;br /&gt;
*  Responsible for fixing CVEs in the Yocto releases &amp;amp; maintained branches&lt;br /&gt;
*  Evaluation of tools for security tests &lt;br /&gt;
*  Responsible for security related info in the Yocto documentations&lt;br /&gt;
*  Hardening of Yocto release&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;How to Contact Yocto&#039;s security team Securely&#039;&#039;&#039;&lt;br /&gt;
---------------------------------------------&lt;br /&gt;
We have set up two security-related mailing lists:&lt;br /&gt;
*  &#039;&#039;&#039;Public List&#039;&#039;&#039;&lt;br /&gt;
: yocto [dash] security [at] yoctoproject[dot] org&lt;br /&gt;
: This is a public mailing list for anyone to subscribe to. This list is an open list to discuss public security issues/patches.&lt;br /&gt;
&lt;br /&gt;
*  &#039;&#039;&#039;Private List&#039;&#039;&#039;&lt;br /&gt;
: security [at] yoctoprojct [dot] org (Forwards to the following addresses)&lt;br /&gt;
 &lt;br /&gt;
: - &#039;&#039;&#039;sona [dot] sarmadi [at] enea [dot] com&#039;&#039;&#039; &lt;br /&gt;
: - &#039;&#039;&#039;mhalstead [at] linuxfoundation [dot] org&#039;&#039;&#039; &lt;br /&gt;
: For secure communications, please send your messages encrypted to both using the following GPG keys. &lt;br /&gt;
: Remember message headers are not encrypted so do not include sensitive information in the subject line.&lt;br /&gt;
&lt;br /&gt;
: Download public keys: [https://pgp.mit.edu/pks/lookup?op=vindex&amp;amp;search=0x773EF6EF68716A14 Sona Sarmadi] [https://pgp.mit.edu/pks/lookup?op=vindex&amp;amp;search=0x3373170601861969 Michael Halstead]&lt;br /&gt;
&lt;br /&gt;
Anyone can contribute with security patches as before, but those volunteering to this security team will sync/organize security related activities and take more responsibility.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;What you should do if you find a security vulnerability&#039;&#039;&#039;&lt;br /&gt;
---------------------------------------------&lt;br /&gt;
If you find a security flaw; a crash, an information leakage, or anything that can have a security impact if exploited in any Open Source packages used by the Yocto Project, please report this to the Yocto Security Team. If you prefer to contact the upstream project directly, please send a copy to the security team at Yocto as well.&lt;br /&gt;
If you believe this is sensitive information, please report the vulnerability in a secure way, i.e. encrypt the email and send it to the private list. This ensures that the exploit is not leaked and exploited before a response/fix has been generated.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;What Yocto Security Team does when it receives a security vulnerability&#039;&#039;&#039;&lt;br /&gt;
---------------------------------------------&lt;br /&gt;
The team performs a quick analysis and reports the flaw to the upstream project. Normally the upstream projects analyzes the problem. If they deem that it is a real security problem in their software, the project will  email the linux-distros mailing list and notify all the big Linux distributions/vendors about the existence of this vulnerability/flaw. These mailing lists are normally non-public. The project and people on the linux-distros can then agree on a release date when the flaw should be made public.&lt;br /&gt;
There is also sometimes some coordination for handling patches or backporting of patches etc, or just understanding the problem or what caused it.&lt;br /&gt;
&lt;br /&gt;
When the security issue is finally to be made public, normally upstream project is responsible to contact Mitre (cve.mitre.org) to get a CVE number assigned to it and copy the information to other Opens Source Security mailing lists to inform the whole world of the vulnerability.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;If an upstream project does not respond quickly&#039;&#039;&#039;&lt;br /&gt;
---------------------------------------------&lt;br /&gt;
If an upstream project does not fix the problem the Yocto&#039;s Security Team will contact linux-distros and community and together try to solve the vulnerability as quickly as possible. &lt;br /&gt;
Normally big Linux vendors fix the problem if the problem affects their products.&lt;br /&gt;
Chances are that everyone from the enterprise distros to the commercial Yocto vendors will get fixes done first, but it is nice to have saftey net for issues that really are specific to oe and embedded.&lt;br /&gt;
&lt;br /&gt;
== Branches maintained with security fixes  ==&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! Major version&lt;br /&gt;
! Current Version&lt;br /&gt;
! Branch name&lt;br /&gt;
! BitBake version&lt;br /&gt;
! Maintainer&lt;br /&gt;
|-&lt;br /&gt;
|1.7&lt;br /&gt;
|1.7&lt;br /&gt;
|dizzy&lt;br /&gt;
|1.24&lt;br /&gt;
|Armin Kuster &amp;lt;akuster808@gmail.com&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
|1.6&lt;br /&gt;
|1.6.1&lt;br /&gt;
|daisy&lt;br /&gt;
|1.22&lt;br /&gt;
|Saul Wold &amp;lt;sgw@linux.intel.com&amp;gt;&lt;br /&gt;
|- style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|1.5&lt;br /&gt;
|1.5.3&lt;br /&gt;
|dora&lt;br /&gt;
|1.20&lt;br /&gt;
|Robert Yang &amp;lt;liezhi.yang@windriver.com&amp;gt;&lt;br /&gt;
|- style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|1.4&lt;br /&gt;
|1.4.3[https://lists.yoctoproject.org/pipermail/yocto/2014-July/020699.html *]&lt;br /&gt;
|dylan&lt;br /&gt;
|1.18&lt;br /&gt;
|Paul Eggleton &amp;lt;paul.eggleton@linux.intel.com&amp;gt;&lt;br /&gt;
|- style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|1.3&lt;br /&gt;
|1.3.2&lt;br /&gt;
|danny&lt;br /&gt;
|1.16&lt;br /&gt;
|Ross Burton &amp;lt;ross.burton@intel.com&amp;gt;&lt;br /&gt;
|- style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Security patches (CVEs) is backported to all branches above (if at all possible). &lt;br /&gt;
Versions in grey are no longer actively maintained, but well-tested security patches may still be accepted for them.) &lt;br /&gt;
&lt;br /&gt;
See [https://wiki.yoctoproject.org/wiki/Stable_branch_maintenance Stable branches maintenance]for detailed info regarding the policies and maintenance of Stable branch&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Policy for updating package versions for the stable branches ==&lt;br /&gt;
The Yocto project purposely limits updating of packages on oe-stable releases to items that address security problems (e.g. CVE&#039;s). For packages like qemu we avoid updating between from one &amp;quot;dot.dot&amp;quot; to another related &amp;quot;dot.dot&amp;quot; version since it has been seen in the past that even with &amp;quot;simple&amp;quot; updates, things can go wrong and a lot more testing is required to verify compatibility. Better to only add CVE patches to fix specific point problems.&lt;br /&gt;
&lt;br /&gt;
== Kernel security patches ==&lt;br /&gt;
&lt;br /&gt;
Kernel security patches are backported to Linux-yoco kernels regularly from https://www.kernel.org/&lt;br /&gt;
=== Linux-yocto ===&lt;br /&gt;
linux-yocto_3.10 &amp;amp; linux-yocto_3.14 (maintainer: Bruce Ashfield)&lt;br /&gt;
&lt;br /&gt;
=== Vendor kernels ===&lt;br /&gt;
Kernel security patches are also backported to Linux-vendor kernels from https://www.kernel.org/&lt;br /&gt;
 &lt;br /&gt;
* meta-intel (meta-intel uses Linux-yocto)&lt;br /&gt;
* meta-fsl-ppc (meta-freescale@yoctoproject.org)&lt;br /&gt;
* meta-xilinx (meta-xilinx@lists.yoctoproject.org)&lt;br /&gt;
* meta-ti (meta-ti@yoctoproject.org)&lt;br /&gt;
* etc&lt;br /&gt;
&lt;br /&gt;
== How to test ==&lt;br /&gt;
 &lt;br /&gt;
If there is any test case for the vulnerability by the upstream project or community&lt;br /&gt;
 - Run the test to reproduce the problem and verify the correction. &lt;br /&gt;
 - Run the regression test&lt;br /&gt;
&lt;br /&gt;
If there isn’t any test case and it is complicated and time consuming to write a testcase&lt;br /&gt;
 - Run the regressions test&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Regression test&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Build the core image for at least two architectures (preferably one big-endian and one little-endian)&lt;br /&gt;
* Run ptest (for those branches/packages that there is ptest mechanism)&lt;br /&gt;
&lt;br /&gt;
== Patch name convention and commit message ==&lt;br /&gt;
Security patches like any Open Source developmen should follow the openembedded&#039;s [http://openembedded.org/wiki/Commit_Patch_Message_Guidelines Commit Patch Message Guidelines]. &lt;br /&gt;
In addition security patches should have reference to the CVE identifier both in the patch file/s and the commit message.&lt;br /&gt;
&lt;br /&gt;
Please make sure to add the package name in the subject and the reference to the CVE. Example for the commit message: &lt;br /&gt;
&lt;br /&gt;
    bash: CVE-2014-6278&lt;br /&gt;
    &lt;br /&gt;
    &amp;lt;short description&amp;gt;&lt;br /&gt;
    &lt;br /&gt;
    &amp;lt;[YOCTO #xxx] if there is any&amp;gt;&lt;br /&gt;
    &lt;br /&gt;
    References&lt;br /&gt;
    E.g. [https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6278 link to CVE] or other useful info/blog/advisory.&lt;br /&gt;
    &lt;br /&gt;
    Signed-off-by:&lt;br /&gt;
&lt;br /&gt;
== Some security related links/useful tools ==&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
* [http://www.cvedetails.com CVE details] &lt;br /&gt;
* [http://www.cvedetails.com/vulnerability-list/vendor_id-33/product_id-47/year-2014/Linux-Linux-Kernel.html  CVE list, Linux kernel 2014]&lt;br /&gt;
* [https://www.yoctoproject.org/blogs/andrei-dinu/2013/meta-security-layer-now-available Meta-security-layer]&lt;br /&gt;
* [http://www.yoctoproject.org/docs/1.7/dev-manual/dev-manual.html#making-images-more-secure Making images more secure]&lt;br /&gt;
* [http://cvechecker.sourceforge.net Cvechecker]&lt;br /&gt;
&lt;br /&gt;
== Security Issues Addressed in Yocto Releases ==&lt;br /&gt;
&#039;&#039;&#039;Yocto 1.7.1 - Dizzy&#039;&#039;&#039; &lt;br /&gt;
https://www.yoctoproject.org/downloads/core/dizzy171&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Yocto 1.7 - Dizzy&#039;&#039;&#039; &lt;br /&gt;
https://www.yoctoproject.org/downloads/core/dizzy17&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Yocto 1.6 - Daisy&#039;&#039;&#039; &lt;br /&gt;
https://www.yoctoproject.org/downloads/core/daisy16&lt;/div&gt;</summary>
		<author><name>SonaSarmadi</name></author>
	</entry>
	<entry>
		<id>https://wiki.yoctoproject.org/wiki/index.php?title=Security&amp;diff=14497</id>
		<title>Security</title>
		<link rel="alternate" type="text/html" href="https://wiki.yoctoproject.org/wiki/index.php?title=Security&amp;diff=14497"/>
		<updated>2015-04-22T12:31:08Z</updated>

		<summary type="html">&lt;p&gt;SonaSarmadi: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Since the Yocto Project is intended to be flexible and meet the needs of many applications, we leave policy-making decisions around security to our end users. Our goal instead is to ship each release with metadata that follows best practices in that we do not release recipe versions which are known to have significant security vulnerabilities. Generally this is done by upgrading recipes to newer versions that are no longer vulnerable to these issues. &lt;br /&gt;
&lt;br /&gt;
Upgrading recipes to the newer versions in the maintenance branches is not always easy, this is why we provide a patch for the existing version instead if we detect a vulnerability in a package. The patches are added to the recipes, see example below:&lt;br /&gt;
&lt;br /&gt;
  poky/recipes-connectivity/bind/bind_9.9.5.bb&lt;br /&gt;
  &lt;br /&gt;
  SRC_URI = &amp;quot;ftp://ftp.isc.org/isc/bind9/${PV}/${BPN}-${PV}.tar.gz \&lt;br /&gt;
           file://conf.patch \&lt;br /&gt;
           ...&lt;br /&gt;
           file://bind9_9_5-CVE-2014-8500.patch \&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
We are tracking security vulnerabilities in the Yocto Project against the [http://nvd.nist.gov/home.cfm National Vulnerability Database]. &lt;br /&gt;
&lt;br /&gt;
We also track CVEs reported to the oss-security list (Open Source Software Security) http://www.openwall.com/lists/oss-security/&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Yocto Security Team ==&lt;br /&gt;
 &lt;br /&gt;
The purpose of creating a security team in the Yocto project is to discuss, sync and organize security related activities.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The team&#039;s main responsibilities among others are:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
*  Scanning of security forums/mailing list(s) to detect security vulnerabilities reported by community&lt;br /&gt;
*  Responsible for fixing CVEs in the Yocto releases &amp;amp; maintained branches&lt;br /&gt;
*  Evaluation of tools for security tests &lt;br /&gt;
*  Responsible for security related info in the Yocto documentations&lt;br /&gt;
*  Hardening of Yocto release&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;How to Contact Yocto&#039;s security team Securely&#039;&#039;&#039;&lt;br /&gt;
---------------------------------------------&lt;br /&gt;
We have set up two security-related mailing lists:&lt;br /&gt;
*  &#039;&#039;&#039;Public List&#039;&#039;&#039;&lt;br /&gt;
: yocto [dash] security [at] yoctoproject[dot] org&lt;br /&gt;
: This is a public mailing list for anyone to subscribe to. This list is an open list to discuss public security issues/patches.&lt;br /&gt;
&lt;br /&gt;
*  &#039;&#039;&#039;Private List&#039;&#039;&#039;&lt;br /&gt;
: security [at] yoctoprojct [dot] org (Forwards to the following addresses)&lt;br /&gt;
 &lt;br /&gt;
: - &#039;&#039;&#039;sona [dot] sarmadi [at] enea [dot] com&#039;&#039;&#039; &lt;br /&gt;
: - &#039;&#039;&#039;mhalstead [at] linuxfoundation [dot] org&#039;&#039;&#039; &lt;br /&gt;
: For secure communications, please send your messages encrypted to both using the following GPG keys. &lt;br /&gt;
: Remember message headers are not encrypted so do not include sensitive information in the subject line.&lt;br /&gt;
&lt;br /&gt;
: Download public keys: [https://pgp.mit.edu/pks/lookup?op=vindex&amp;amp;search=0x773EF6EF68716A14 Sona Sarmadi] [https://pgp.mit.edu/pks/lookup?op=vindex&amp;amp;search=0x3373170601861969 Michael Halstead]&lt;br /&gt;
&lt;br /&gt;
Anyone can contribute with security patches as before, but those volunteering to this security team will sync/organize security related activities and take more responsibility.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;What you should do if you find a security vulnerability&#039;&#039;&#039;&lt;br /&gt;
---------------------------------------------&lt;br /&gt;
If you find a security flaw; a crash, an information leakage, or anything that can have a security impact if exploited in any Open Source packages used by the Yocto Project, please report this to the Yocto Security Team. If you prefer to contact the upstream project directly, please send a copy to the security team at Yocto as well.&lt;br /&gt;
If you believe this is sensitive information, please report the vulnerability in a secure way, i.e. encrypt the email and send it to the private list. This ensures that the exploit is not leaked and exploited before a response/fix has been generated.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;What Yocto Security Team does when it receives a security vulnerability&#039;&#039;&#039;&lt;br /&gt;
---------------------------------------------&lt;br /&gt;
The team performs a quick analysis and reports the flaw to the upstream project. Normally the upstream projects analyzes the problem. If they deem that it is a real security problem in their software, the project will  email the linux-distros mailing list and notify all the big Linux distributions/vendors about the existence of this vulnerability/flaw. These mailing lists are normally non-public. The project and people on the linux-distros can then agree on a release date when the flaw should be made public.&lt;br /&gt;
There is also sometimes some coordination for handling patches or backporting of patches etc, or just understanding the problem or what caused it.&lt;br /&gt;
&lt;br /&gt;
When the security issue is finally to be made public, normally upstream project is responsible to contact Mitre (cve.mitre.org) to get a CVE number assigned to it and copy the information to other Opens Source Security mailing lists to inform the whole world of the vulnerability.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;If an upstream project does not respond quickly&#039;&#039;&#039;&lt;br /&gt;
---------------------------------------------&lt;br /&gt;
If an upstream project does not fix the problem the Yocto&#039;s Security Team will contact linux-distros and community and together try to solve the vulnerability as quickly as possible. &lt;br /&gt;
Normally big Linux vendors fix the problem if the problem affects their products.&lt;br /&gt;
Chances are that everyone from the enterprise distros to the commercial Yocto vendors will get fixes done first, but it is nice to have saftey net for issues that really are specific to oe and embedded.&lt;br /&gt;
&lt;br /&gt;
== Branches maintained with security fixes  ==&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! Major version&lt;br /&gt;
! Current Version&lt;br /&gt;
! Branch name&lt;br /&gt;
! BitBake version&lt;br /&gt;
! Maintainer&lt;br /&gt;
|-&lt;br /&gt;
|1.7&lt;br /&gt;
|1.7&lt;br /&gt;
|dizzy&lt;br /&gt;
|1.24&lt;br /&gt;
|Armin Kuster &amp;lt;akuster808@gmail.com&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
|1.6&lt;br /&gt;
|1.6.1&lt;br /&gt;
|daisy&lt;br /&gt;
|1.22&lt;br /&gt;
|Saul Wold &amp;lt;sgw@linux.intel.com&amp;gt;&lt;br /&gt;
|- style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|1.5&lt;br /&gt;
|1.5.3&lt;br /&gt;
|dora&lt;br /&gt;
|1.20&lt;br /&gt;
|Robert Yang &amp;lt;liezhi.yang@windriver.com&amp;gt;&lt;br /&gt;
|- style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|1.4&lt;br /&gt;
|1.4.3[https://lists.yoctoproject.org/pipermail/yocto/2014-July/020699.html *]&lt;br /&gt;
|dylan&lt;br /&gt;
|1.18&lt;br /&gt;
|Paul Eggleton &amp;lt;paul.eggleton@linux.intel.com&amp;gt;&lt;br /&gt;
|- style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|1.3&lt;br /&gt;
|1.3.2&lt;br /&gt;
|danny&lt;br /&gt;
|1.16&lt;br /&gt;
|Ross Burton &amp;lt;ross.burton@intel.com&amp;gt;&lt;br /&gt;
|- style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Security patches (CVEs) is backported to all branches above (if at all possible). &lt;br /&gt;
Versions in grey are no longer actively maintained, but well-tested security patches may still be accepted for them.) &lt;br /&gt;
&lt;br /&gt;
See [https://wiki.yoctoproject.org/wiki/Stable_branch_maintenance Stable branches maintenance]for detailed info regarding the policies and maintenance of Stable branch&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Policy for updating package versions for the stable branches ==&lt;br /&gt;
The Yocto project purposely limits updating of packages on oe-stable releases to items that address security problems (e.g. CVE&#039;s). For packages like qemu we avoid updating between from one &amp;quot;dot.dot&amp;quot; to another related &amp;quot;dot.dot&amp;quot; version since it has been seen in the past that even with &amp;quot;simple&amp;quot; updates, things can go wrong and a lot more testing is required to verify compatibility. Better to only add CVE patches to fix specific point problems.&lt;br /&gt;
&lt;br /&gt;
== Kernel security patches ==&lt;br /&gt;
&lt;br /&gt;
Kernel security patches are backported to Linux-yoco kernels regularly from https://www.kernel.org/&lt;br /&gt;
=== Linux-yocto ===&lt;br /&gt;
linux-yocto_3.10 &amp;amp; linux-yocto_3.14 (maintainer: Bruce Ashfield)&lt;br /&gt;
&lt;br /&gt;
=== Vendor kernels ===&lt;br /&gt;
Kernel security patches are also backported to Linux-vendor kernels from https://www.kernel.org/&lt;br /&gt;
 &lt;br /&gt;
* meta-intel (meta-intel uses Linux-yocto)&lt;br /&gt;
* meta-fsl-ppc (meta-freescale@yoctoproject.org)&lt;br /&gt;
* meta-xilinx (meta-xilinx@lists.yoctoproject.org)&lt;br /&gt;
* meta-ti (meta-ti@yoctoproject.org)&lt;br /&gt;
* etc&lt;br /&gt;
&lt;br /&gt;
== How to test ==&lt;br /&gt;
 &lt;br /&gt;
If there is any test case for the vulnerability by the upstream project or community&lt;br /&gt;
 - Run the test to reproduce the problem and verify the correction. &lt;br /&gt;
 - Run the regression test&lt;br /&gt;
&lt;br /&gt;
If there isn’t any test case and it is complicated and time consuming to write a testcase&lt;br /&gt;
 - Run the regressions test&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Regression test&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Build the core image for at least two architectures (preferably one big-endian and one little-endian)&lt;br /&gt;
* Run ptest (for those branches/packages that there is ptest mechanism)&lt;br /&gt;
&lt;br /&gt;
== Patch name convention and commit message ==&lt;br /&gt;
Security patches should have reference to the CVE identifier both in the patch file/s and the commit comment.&lt;br /&gt;
&lt;br /&gt;
Please make sure to add the package name in the subject and the reference to the CVE. Example for the commit comment: &lt;br /&gt;
&lt;br /&gt;
    bash: CVE-2014-6278&lt;br /&gt;
    &lt;br /&gt;
    &amp;lt;short description&amp;gt;&lt;br /&gt;
    &lt;br /&gt;
    &amp;lt;[YOCTO #xxx] if there is any&amp;gt;&lt;br /&gt;
    &lt;br /&gt;
    References&lt;br /&gt;
    E.g. [https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6278 link to CVE] or other useful info/blog/advisory.&lt;br /&gt;
    &lt;br /&gt;
    Signed-off-by: &lt;br /&gt;
    &lt;br /&gt;
For additional guidelines refer to: [http://openembedded.org/wiki/Commit_Patch_Message_Guidelines Commit Patch Message Guidelines]&lt;br /&gt;
&lt;br /&gt;
== Some security related links/useful tools ==&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
* [http://www.cvedetails.com CVE details] &lt;br /&gt;
* [http://www.cvedetails.com/vulnerability-list/vendor_id-33/product_id-47/year-2014/Linux-Linux-Kernel.html  CVE list, Linux kernel 2014]&lt;br /&gt;
* [https://www.yoctoproject.org/blogs/andrei-dinu/2013/meta-security-layer-now-available Meta-security-layer]&lt;br /&gt;
* [http://www.yoctoproject.org/docs/1.7/dev-manual/dev-manual.html#making-images-more-secure Making images more secure]&lt;br /&gt;
* [http://cvechecker.sourceforge.net Cvechecker]&lt;br /&gt;
&lt;br /&gt;
== Security Issues Addressed in Yocto Releases ==&lt;br /&gt;
&#039;&#039;&#039;Yocto 1.7.1 - Dizzy&#039;&#039;&#039; &lt;br /&gt;
https://www.yoctoproject.org/downloads/core/dizzy171&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Yocto 1.7 - Dizzy&#039;&#039;&#039; &lt;br /&gt;
https://www.yoctoproject.org/downloads/core/dizzy17&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Yocto 1.6 - Daisy&#039;&#039;&#039; &lt;br /&gt;
https://www.yoctoproject.org/downloads/core/daisy16&lt;/div&gt;</summary>
		<author><name>SonaSarmadi</name></author>
	</entry>
	<entry>
		<id>https://wiki.yoctoproject.org/wiki/index.php?title=Security&amp;diff=14476</id>
		<title>Security</title>
		<link rel="alternate" type="text/html" href="https://wiki.yoctoproject.org/wiki/index.php?title=Security&amp;diff=14476"/>
		<updated>2015-04-15T09:05:01Z</updated>

		<summary type="html">&lt;p&gt;SonaSarmadi: /* Policy for updating package versions for the stable branches */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Since the Yocto Project is intended to be flexible and meet the needs of many applications, we leave policy-making decisions around security to our end users. Our goal instead is to ship each release with metadata that follows best practices in that we do not release recipe versions which are known to have significant security vulnerabilities. Generally this is done by upgrading recipes to newer versions that are no longer vulnerable to these issues. &lt;br /&gt;
&lt;br /&gt;
Upgrading recipes to the newer versions in the maintenance branches is not always easy, this is why we provide a patch for the existing version instead if we detect a vulnerability in a package. The patches are added to the recipes, see example below:&lt;br /&gt;
&lt;br /&gt;
  poky/recipes-connectivity/bind/bind_9.9.5.bb&lt;br /&gt;
  &lt;br /&gt;
  SRC_URI = &amp;quot;ftp://ftp.isc.org/isc/bind9/${PV}/${BPN}-${PV}.tar.gz \&lt;br /&gt;
           file://conf.patch \&lt;br /&gt;
           ...&lt;br /&gt;
           file://bind9_9_5-CVE-2014-8500.patch \&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
We are tracking security vulnerabilities in the Yocto Project against the [http://nvd.nist.gov/home.cfm National Vulnerability Database]. &lt;br /&gt;
&lt;br /&gt;
We also track CVEs reported to the oss-security list (Open Source Software Security) http://www.openwall.com/lists/oss-security/&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Yocto Security Team ==&lt;br /&gt;
 &lt;br /&gt;
The purpose of creating a security team in the Yocto project is to discuss, sync and organize security related activities.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The team&#039;s main responsibilities among others are:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
*  Scanning of security forums/mailing list(s) to detect security vulnerabilities reported by community&lt;br /&gt;
*  Responsible for fixing CVEs in the Yocto releases &amp;amp; maintained branches&lt;br /&gt;
*  Evaluation of tools for security tests &lt;br /&gt;
*  Responsible for security related info in the Yocto documentations&lt;br /&gt;
*  Hardening of Yocto release&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;How to Contact Yocto&#039;s security team Securely&#039;&#039;&#039;&lt;br /&gt;
---------------------------------------------&lt;br /&gt;
We have set up two security-related mailing lists:&lt;br /&gt;
*  &#039;&#039;&#039;Public List&#039;&#039;&#039;&lt;br /&gt;
: yocto [dash] security [at] yoctoproject[dot] com&lt;br /&gt;
: This is a public mailing list for anyone to subscribe to. This list is an open list to discuss public security issues/patches.&lt;br /&gt;
&lt;br /&gt;
*  &#039;&#039;&#039;Private List&#039;&#039;&#039;&lt;br /&gt;
: security [at] yoctoprojct [dot] org (Forwards to the following addresses)&lt;br /&gt;
 &lt;br /&gt;
: - &#039;&#039;&#039;sona [dot] sarmadi [at] enea [dot] com&#039;&#039;&#039; &lt;br /&gt;
: - &#039;&#039;&#039;mhalstead [at] linuxfoundation [dot] org&#039;&#039;&#039; &lt;br /&gt;
: For secure communications, please send your messages encrypted to both using the following GPG keys. &lt;br /&gt;
: Remember message headers are not encrypted so do not include sensitive information in the subject line.&lt;br /&gt;
&lt;br /&gt;
: Download public keys: [https://pgp.mit.edu/pks/lookup?op=vindex&amp;amp;search=0x773EF6EF68716A14 Sona Sarmadi] [https://pgp.mit.edu/pks/lookup?op=vindex&amp;amp;search=0x3373170601861969 Michael Halstead]&lt;br /&gt;
&lt;br /&gt;
Anyone can contribute with security patches as before, but those volunteering to this security team will sync/organize security related activities and take more responsibility.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;What you should do if you find a security vulnerability&#039;&#039;&#039;&lt;br /&gt;
---------------------------------------------&lt;br /&gt;
If you find a security flaw; a crash, an information leakage, or anything that can have a security impact if exploited in any Open Source packages used by the Yocto Project, please report this to the Yocto Security Team. If you prefer to contact the upstream project directly, please send a copy to the security team at Yocto as well.&lt;br /&gt;
If you believe this is sensitive information, please report the vulnerability in a secure way, i.e. encrypt the email and send it to the private list. This ensures that the exploit is not leaked and exploited before a response/fix has been generated.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;What Yocto Security Team does when it receives a security vulnerability&#039;&#039;&#039;&lt;br /&gt;
---------------------------------------------&lt;br /&gt;
The team performs a quick analysis and reports the flaw to the upstream project. Normally the upstream projects analyzes the problem. If they deem that it is a real security problem in their software, the project will  email the linux-distros mailing list and notify all the big Linux distributions/vendors about the existence of this vulnerability/flaw. These mailing lists are normally non-public. The project and people on the linux-distros can then agree on a release date when the flaw should be made public.&lt;br /&gt;
There is also sometimes some coordination for handling patches or backporting of patches etc, or just understanding the problem or what caused it.&lt;br /&gt;
&lt;br /&gt;
When the security issue is finally to be made public, normally upstream project is responsible to contact Mitre (cve.mitre.org) to get a CVE number assigned to it and copy the information to other Opens Source Security mailing lists to inform the whole world of the vulnerability.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;If an upstream project does not respond quickly&#039;&#039;&#039;&lt;br /&gt;
---------------------------------------------&lt;br /&gt;
If an upstream project does not fix the problem the Yocto&#039;s Security Team will contact linux-distros and community and together try to solve the vulnerability as quickly as possible. &lt;br /&gt;
Normally big Linux vendors fix the problem if the problem affects their products.&lt;br /&gt;
Chances are that everyone from the enterprise distros to the commercial Yocto vendors will get fixes done first, but it is nice to have saftey net for issues that really are specific to oe and embedded.&lt;br /&gt;
&lt;br /&gt;
== Branches maintained with security fixes  ==&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! Major version&lt;br /&gt;
! Current Version&lt;br /&gt;
! Branch name&lt;br /&gt;
! BitBake version&lt;br /&gt;
! Maintainer&lt;br /&gt;
|-&lt;br /&gt;
|1.7&lt;br /&gt;
|1.7&lt;br /&gt;
|dizzy&lt;br /&gt;
|1.24&lt;br /&gt;
|Armin Kuster &amp;lt;akuster808@gmail.com&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
|1.6&lt;br /&gt;
|1.6.1&lt;br /&gt;
|daisy&lt;br /&gt;
|1.22&lt;br /&gt;
|Saul Wold &amp;lt;sgw@linux.intel.com&amp;gt;&lt;br /&gt;
|- style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|1.5&lt;br /&gt;
|1.5.3&lt;br /&gt;
|dora&lt;br /&gt;
|1.20&lt;br /&gt;
|Robert Yang &amp;lt;liezhi.yang@windriver.com&amp;gt;&lt;br /&gt;
|- style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|1.4&lt;br /&gt;
|1.4.3[https://lists.yoctoproject.org/pipermail/yocto/2014-July/020699.html *]&lt;br /&gt;
|dylan&lt;br /&gt;
|1.18&lt;br /&gt;
|Paul Eggleton &amp;lt;paul.eggleton@linux.intel.com&amp;gt;&lt;br /&gt;
|- style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|1.3&lt;br /&gt;
|1.3.2&lt;br /&gt;
|danny&lt;br /&gt;
|1.16&lt;br /&gt;
|Ross Burton &amp;lt;ross.burton@intel.com&amp;gt;&lt;br /&gt;
|- style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Security patches (CVEs) is backported to all branches above (if at all possible). &lt;br /&gt;
Versions in grey are no longer actively maintained, but well-tested security patches may still be accepted for them.) &lt;br /&gt;
&lt;br /&gt;
See [https://wiki.yoctoproject.org/wiki/Stable_branch_maintenance Stable branches maintenance]for detailed info regarding the policies and maintenance of Stable branch&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Policy for updating package versions for the stable branches ==&lt;br /&gt;
The Yocto project purposely limits updating of packages on oe-stable releases to items that address security problems (e.g. CVE&#039;s). For packages like qemu we avoid updating between from one &amp;quot;dot.dot&amp;quot; to another related &amp;quot;dot.dot&amp;quot; version since it has been seen in the past that even with &amp;quot;simple&amp;quot; updates, things can go wrong and a lot more testing is required to verify compatibility. Better to only add CVE patches to fix specific point problems.&lt;br /&gt;
&lt;br /&gt;
== Kernel security patches ==&lt;br /&gt;
&lt;br /&gt;
Kernel security patches are backported to Linux-yoco kernels regularly from https://www.kernel.org/&lt;br /&gt;
=== Linux-yocto ===&lt;br /&gt;
linux-yocto_3.10 &amp;amp; linux-yocto_3.14 (maintainer: Bruce Ashfield)&lt;br /&gt;
&lt;br /&gt;
=== Vendor kernels ===&lt;br /&gt;
Kernel security patches are also backported to Linux-vendor kernels from https://www.kernel.org/&lt;br /&gt;
 &lt;br /&gt;
* meta-intel (meta-intel uses Linux-yocto)&lt;br /&gt;
* meta-fsl-ppc (meta-freescale@yoctoproject.org)&lt;br /&gt;
* meta-xilinx (meta-xilinx@lists.yoctoproject.org)&lt;br /&gt;
* meta-ti (meta-ti@yoctoproject.org)&lt;br /&gt;
* etc&lt;br /&gt;
&lt;br /&gt;
== How to test ==&lt;br /&gt;
 &lt;br /&gt;
If there is any test case for the vulnerability by the upstream project or community&lt;br /&gt;
 - Run the test to reproduce the problem and verify the correction. &lt;br /&gt;
 - Run the regression test&lt;br /&gt;
&lt;br /&gt;
If there isn’t any test case and it is complicated and time consuming to write a testcase&lt;br /&gt;
 - Run the regressions test&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Regression test&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Build the core image for at least two architectures (preferably one big-endian and one little-endian)&lt;br /&gt;
* Run ptest (for those branches/packages that there is ptest mechanism)&lt;br /&gt;
&lt;br /&gt;
== Patch name convention and commit message ==&lt;br /&gt;
Security patches should have reference to the CVE identifier both in the patch file/s and the commit comment.&lt;br /&gt;
&lt;br /&gt;
Please make sure to add the package name in the subject and the reference to the CVE. Example for the commit comment: &lt;br /&gt;
&lt;br /&gt;
    bash: CVE-2014-6278&lt;br /&gt;
    &lt;br /&gt;
    &amp;lt;short description&amp;gt;&lt;br /&gt;
    &lt;br /&gt;
    &amp;lt;[YOCTO #xxx] if there is any&amp;gt;&lt;br /&gt;
    &lt;br /&gt;
    References&lt;br /&gt;
    E.g. [https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6278 link to CVE] or other useful info/blog/advisory.&lt;br /&gt;
    &lt;br /&gt;
    Signed-off-by: &lt;br /&gt;
    &lt;br /&gt;
For additional guidelines refer to: [http://openembedded.org/wiki/Commit_Patch_Message_Guidelines Commit Patch Message Guidelines]&lt;br /&gt;
&lt;br /&gt;
== Some security related links/useful tools ==&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
* [http://www.cvedetails.com CVE details] &lt;br /&gt;
* [http://www.cvedetails.com/vulnerability-list/vendor_id-33/product_id-47/year-2014/Linux-Linux-Kernel.html  CVE list, Linux kernel 2014]&lt;br /&gt;
* [https://www.yoctoproject.org/blogs/andrei-dinu/2013/meta-security-layer-now-available Meta-security-layer]&lt;br /&gt;
* [http://www.yoctoproject.org/docs/1.7/dev-manual/dev-manual.html#making-images-more-secure Making images more secure]&lt;br /&gt;
* [http://cvechecker.sourceforge.net Cvechecker]&lt;br /&gt;
&lt;br /&gt;
== Security Issues Addressed in Yocto Releases ==&lt;br /&gt;
&#039;&#039;&#039;Yocto 1.7.1 - Dizzy&#039;&#039;&#039; &lt;br /&gt;
https://www.yoctoproject.org/downloads/core/dizzy171&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Yocto 1.7 - Dizzy&#039;&#039;&#039; &lt;br /&gt;
https://www.yoctoproject.org/downloads/core/dizzy17&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Yocto 1.6 - Daisy&#039;&#039;&#039; &lt;br /&gt;
https://www.yoctoproject.org/downloads/core/daisy16&lt;/div&gt;</summary>
		<author><name>SonaSarmadi</name></author>
	</entry>
	<entry>
		<id>https://wiki.yoctoproject.org/wiki/index.php?title=Security&amp;diff=14475</id>
		<title>Security</title>
		<link rel="alternate" type="text/html" href="https://wiki.yoctoproject.org/wiki/index.php?title=Security&amp;diff=14475"/>
		<updated>2015-04-15T08:35:01Z</updated>

		<summary type="html">&lt;p&gt;SonaSarmadi: /* Kernel security patches */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Since the Yocto Project is intended to be flexible and meet the needs of many applications, we leave policy-making decisions around security to our end users. Our goal instead is to ship each release with metadata that follows best practices in that we do not release recipe versions which are known to have significant security vulnerabilities. Generally this is done by upgrading recipes to newer versions that are no longer vulnerable to these issues. &lt;br /&gt;
&lt;br /&gt;
Upgrading recipes to the newer versions in the maintenance branches is not always easy, this is why we provide a patch for the existing version instead if we detect a vulnerability in a package. The patches are added to the recipes, see example below:&lt;br /&gt;
&lt;br /&gt;
  poky/recipes-connectivity/bind/bind_9.9.5.bb&lt;br /&gt;
  &lt;br /&gt;
  SRC_URI = &amp;quot;ftp://ftp.isc.org/isc/bind9/${PV}/${BPN}-${PV}.tar.gz \&lt;br /&gt;
           file://conf.patch \&lt;br /&gt;
           ...&lt;br /&gt;
           file://bind9_9_5-CVE-2014-8500.patch \&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
We are tracking security vulnerabilities in the Yocto Project against the [http://nvd.nist.gov/home.cfm National Vulnerability Database]. &lt;br /&gt;
&lt;br /&gt;
We also track CVEs reported to the oss-security list (Open Source Software Security) http://www.openwall.com/lists/oss-security/&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Yocto Security Team ==&lt;br /&gt;
 &lt;br /&gt;
The purpose of creating a security team in the Yocto project is to discuss, sync and organize security related activities.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The team&#039;s main responsibilities among others are:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
*  Scanning of security forums/mailing list(s) to detect security vulnerabilities reported by community&lt;br /&gt;
*  Responsible for fixing CVEs in the Yocto releases &amp;amp; maintained branches&lt;br /&gt;
*  Evaluation of tools for security tests &lt;br /&gt;
*  Responsible for security related info in the Yocto documentations&lt;br /&gt;
*  Hardening of Yocto release&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;How to Contact Yocto&#039;s security team Securely&#039;&#039;&#039;&lt;br /&gt;
---------------------------------------------&lt;br /&gt;
We have set up two security-related mailing lists:&lt;br /&gt;
*  &#039;&#039;&#039;Public List&#039;&#039;&#039;&lt;br /&gt;
: yocto [dash] security [at] yoctoproject[dot] com&lt;br /&gt;
: This is a public mailing list for anyone to subscribe to. This list is an open list to discuss public security issues/patches.&lt;br /&gt;
&lt;br /&gt;
*  &#039;&#039;&#039;Private List&#039;&#039;&#039;&lt;br /&gt;
: security [at] yoctoprojct [dot] org (Forwards to the following addresses)&lt;br /&gt;
 &lt;br /&gt;
: - &#039;&#039;&#039;sona [dot] sarmadi [at] enea [dot] com&#039;&#039;&#039; &lt;br /&gt;
: - &#039;&#039;&#039;mhalstead [at] linuxfoundation [dot] org&#039;&#039;&#039; &lt;br /&gt;
: For secure communications, please send your messages encrypted to both using the following GPG keys. &lt;br /&gt;
: Remember message headers are not encrypted so do not include sensitive information in the subject line.&lt;br /&gt;
&lt;br /&gt;
: Download public keys: [https://pgp.mit.edu/pks/lookup?op=vindex&amp;amp;search=0x773EF6EF68716A14 Sona Sarmadi] [https://pgp.mit.edu/pks/lookup?op=vindex&amp;amp;search=0x3373170601861969 Michael Halstead]&lt;br /&gt;
&lt;br /&gt;
Anyone can contribute with security patches as before, but those volunteering to this security team will sync/organize security related activities and take more responsibility.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;What you should do if you find a security vulnerability&#039;&#039;&#039;&lt;br /&gt;
---------------------------------------------&lt;br /&gt;
If you find a security flaw; a crash, an information leakage, or anything that can have a security impact if exploited in any Open Source packages used by the Yocto Project, please report this to the Yocto Security Team. If you prefer to contact the upstream project directly, please send a copy to the security team at Yocto as well.&lt;br /&gt;
If you believe this is sensitive information, please report the vulnerability in a secure way, i.e. encrypt the email and send it to the private list. This ensures that the exploit is not leaked and exploited before a response/fix has been generated.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;What Yocto Security Team does when it receives a security vulnerability&#039;&#039;&#039;&lt;br /&gt;
---------------------------------------------&lt;br /&gt;
The team performs a quick analysis and reports the flaw to the upstream project. Normally the upstream projects analyzes the problem. If they deem that it is a real security problem in their software, the project will  email the linux-distros mailing list and notify all the big Linux distributions/vendors about the existence of this vulnerability/flaw. These mailing lists are normally non-public. The project and people on the linux-distros can then agree on a release date when the flaw should be made public.&lt;br /&gt;
There is also sometimes some coordination for handling patches or backporting of patches etc, or just understanding the problem or what caused it.&lt;br /&gt;
&lt;br /&gt;
When the security issue is finally to be made public, normally upstream project is responsible to contact Mitre (cve.mitre.org) to get a CVE number assigned to it and copy the information to other Opens Source Security mailing lists to inform the whole world of the vulnerability.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;If an upstream project does not respond quickly&#039;&#039;&#039;&lt;br /&gt;
---------------------------------------------&lt;br /&gt;
If an upstream project does not fix the problem the Yocto&#039;s Security Team will contact linux-distros and community and together try to solve the vulnerability as quickly as possible. &lt;br /&gt;
Normally big Linux vendors fix the problem if the problem affects their products.&lt;br /&gt;
Chances are that everyone from the enterprise distros to the commercial Yocto vendors will get fixes done first, but it is nice to have saftey net for issues that really are specific to oe and embedded.&lt;br /&gt;
&lt;br /&gt;
== Branches maintained with security fixes  ==&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! Major version&lt;br /&gt;
! Current Version&lt;br /&gt;
! Branch name&lt;br /&gt;
! BitBake version&lt;br /&gt;
! Maintainer&lt;br /&gt;
|-&lt;br /&gt;
|1.7&lt;br /&gt;
|1.7&lt;br /&gt;
|dizzy&lt;br /&gt;
|1.24&lt;br /&gt;
|Armin Kuster &amp;lt;akuster808@gmail.com&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
|1.6&lt;br /&gt;
|1.6.1&lt;br /&gt;
|daisy&lt;br /&gt;
|1.22&lt;br /&gt;
|Saul Wold &amp;lt;sgw@linux.intel.com&amp;gt;&lt;br /&gt;
|- style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|1.5&lt;br /&gt;
|1.5.3&lt;br /&gt;
|dora&lt;br /&gt;
|1.20&lt;br /&gt;
|Robert Yang &amp;lt;liezhi.yang@windriver.com&amp;gt;&lt;br /&gt;
|- style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|1.4&lt;br /&gt;
|1.4.3[https://lists.yoctoproject.org/pipermail/yocto/2014-July/020699.html *]&lt;br /&gt;
|dylan&lt;br /&gt;
|1.18&lt;br /&gt;
|Paul Eggleton &amp;lt;paul.eggleton@linux.intel.com&amp;gt;&lt;br /&gt;
|- style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|1.3&lt;br /&gt;
|1.3.2&lt;br /&gt;
|danny&lt;br /&gt;
|1.16&lt;br /&gt;
|Ross Burton &amp;lt;ross.burton@intel.com&amp;gt;&lt;br /&gt;
|- style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Security patches (CVEs) is backported to all branches above (if at all possible). &lt;br /&gt;
Versions in grey are no longer actively maintained, but well-tested security patches may still be accepted for them.) &lt;br /&gt;
&lt;br /&gt;
See [https://wiki.yoctoproject.org/wiki/Stable_branch_maintenance Stable branches maintenance]for detailed info regarding the policies and maintenance of Stable branch&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Policy for updating package versions for the stable branches ==&lt;br /&gt;
The Yocto project purposely limits updating of packages on oe-stable releases to items that address security problems (CVE&#039;s). E.g. packages like qemu we avoid updating between from one &amp;quot;dot.dot&amp;quot; to another related &amp;quot;dot.dot&amp;quot; version since it has been seen in the past that even with &amp;quot;simple&amp;quot; updates, things can go wrong and a lot more testing is required to verify compatibility. Better to only add CVE patches to fix specific point problems.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Kernel security patches ==&lt;br /&gt;
&lt;br /&gt;
Kernel security patches are backported to Linux-yoco kernels regularly from https://www.kernel.org/&lt;br /&gt;
=== Linux-yocto ===&lt;br /&gt;
linux-yocto_3.10 &amp;amp; linux-yocto_3.14 (maintainer: Bruce Ashfield)&lt;br /&gt;
&lt;br /&gt;
=== Vendor kernels ===&lt;br /&gt;
Kernel security patches are also backported to Linux-vendor kernels from https://www.kernel.org/&lt;br /&gt;
 &lt;br /&gt;
* meta-intel (meta-intel uses Linux-yocto)&lt;br /&gt;
* meta-fsl-ppc (meta-freescale@yoctoproject.org)&lt;br /&gt;
* meta-xilinx (meta-xilinx@lists.yoctoproject.org)&lt;br /&gt;
* meta-ti (meta-ti@yoctoproject.org)&lt;br /&gt;
* etc&lt;br /&gt;
&lt;br /&gt;
== How to test ==&lt;br /&gt;
 &lt;br /&gt;
If there is any test case for the vulnerability by the upstream project or community&lt;br /&gt;
 - Run the test to reproduce the problem and verify the correction. &lt;br /&gt;
 - Run the regression test&lt;br /&gt;
&lt;br /&gt;
If there isn’t any test case and it is complicated and time consuming to write a testcase&lt;br /&gt;
 - Run the regressions test&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Regression test&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Build the core image for at least two architectures (preferably one big-endian and one little-endian)&lt;br /&gt;
* Run ptest (for those branches/packages that there is ptest mechanism)&lt;br /&gt;
&lt;br /&gt;
== Patch name convention and commit message ==&lt;br /&gt;
Security patches should have reference to the CVE identifier both in the patch file/s and the commit comment.&lt;br /&gt;
&lt;br /&gt;
Please make sure to add the package name in the subject and the reference to the CVE. Example for the commit comment: &lt;br /&gt;
&lt;br /&gt;
    bash: CVE-2014-6278&lt;br /&gt;
    &lt;br /&gt;
    &amp;lt;short description&amp;gt;&lt;br /&gt;
    &lt;br /&gt;
    &amp;lt;[YOCTO #xxx] if there is any&amp;gt;&lt;br /&gt;
    &lt;br /&gt;
    References&lt;br /&gt;
    E.g. [https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6278 link to CVE] or other useful info/blog/advisory.&lt;br /&gt;
    &lt;br /&gt;
    Signed-off-by: &lt;br /&gt;
    &lt;br /&gt;
For additional guidelines refer to: [http://openembedded.org/wiki/Commit_Patch_Message_Guidelines Commit Patch Message Guidelines]&lt;br /&gt;
&lt;br /&gt;
== Some security related links/useful tools ==&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
* [http://www.cvedetails.com CVE details] &lt;br /&gt;
* [http://www.cvedetails.com/vulnerability-list/vendor_id-33/product_id-47/year-2014/Linux-Linux-Kernel.html  CVE list, Linux kernel 2014]&lt;br /&gt;
* [https://www.yoctoproject.org/blogs/andrei-dinu/2013/meta-security-layer-now-available Meta-security-layer]&lt;br /&gt;
* [http://www.yoctoproject.org/docs/1.7/dev-manual/dev-manual.html#making-images-more-secure Making images more secure]&lt;br /&gt;
* [http://cvechecker.sourceforge.net Cvechecker]&lt;br /&gt;
&lt;br /&gt;
== Security Issues Addressed in Yocto Releases ==&lt;br /&gt;
&#039;&#039;&#039;Yocto 1.7.1 - Dizzy&#039;&#039;&#039; &lt;br /&gt;
https://www.yoctoproject.org/downloads/core/dizzy171&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Yocto 1.7 - Dizzy&#039;&#039;&#039; &lt;br /&gt;
https://www.yoctoproject.org/downloads/core/dizzy17&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Yocto 1.6 - Daisy&#039;&#039;&#039; &lt;br /&gt;
https://www.yoctoproject.org/downloads/core/daisy16&lt;/div&gt;</summary>
		<author><name>SonaSarmadi</name></author>
	</entry>
	<entry>
		<id>https://wiki.yoctoproject.org/wiki/index.php?title=Security&amp;diff=14474</id>
		<title>Security</title>
		<link rel="alternate" type="text/html" href="https://wiki.yoctoproject.org/wiki/index.php?title=Security&amp;diff=14474"/>
		<updated>2015-04-15T08:34:38Z</updated>

		<summary type="html">&lt;p&gt;SonaSarmadi: /* Policy for updating package versions for the stable branches */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Since the Yocto Project is intended to be flexible and meet the needs of many applications, we leave policy-making decisions around security to our end users. Our goal instead is to ship each release with metadata that follows best practices in that we do not release recipe versions which are known to have significant security vulnerabilities. Generally this is done by upgrading recipes to newer versions that are no longer vulnerable to these issues. &lt;br /&gt;
&lt;br /&gt;
Upgrading recipes to the newer versions in the maintenance branches is not always easy, this is why we provide a patch for the existing version instead if we detect a vulnerability in a package. The patches are added to the recipes, see example below:&lt;br /&gt;
&lt;br /&gt;
  poky/recipes-connectivity/bind/bind_9.9.5.bb&lt;br /&gt;
  &lt;br /&gt;
  SRC_URI = &amp;quot;ftp://ftp.isc.org/isc/bind9/${PV}/${BPN}-${PV}.tar.gz \&lt;br /&gt;
           file://conf.patch \&lt;br /&gt;
           ...&lt;br /&gt;
           file://bind9_9_5-CVE-2014-8500.patch \&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
We are tracking security vulnerabilities in the Yocto Project against the [http://nvd.nist.gov/home.cfm National Vulnerability Database]. &lt;br /&gt;
&lt;br /&gt;
We also track CVEs reported to the oss-security list (Open Source Software Security) http://www.openwall.com/lists/oss-security/&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Yocto Security Team ==&lt;br /&gt;
 &lt;br /&gt;
The purpose of creating a security team in the Yocto project is to discuss, sync and organize security related activities.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The team&#039;s main responsibilities among others are:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
*  Scanning of security forums/mailing list(s) to detect security vulnerabilities reported by community&lt;br /&gt;
*  Responsible for fixing CVEs in the Yocto releases &amp;amp; maintained branches&lt;br /&gt;
*  Evaluation of tools for security tests &lt;br /&gt;
*  Responsible for security related info in the Yocto documentations&lt;br /&gt;
*  Hardening of Yocto release&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;How to Contact Yocto&#039;s security team Securely&#039;&#039;&#039;&lt;br /&gt;
---------------------------------------------&lt;br /&gt;
We have set up two security-related mailing lists:&lt;br /&gt;
*  &#039;&#039;&#039;Public List&#039;&#039;&#039;&lt;br /&gt;
: yocto [dash] security [at] yoctoproject[dot] com&lt;br /&gt;
: This is a public mailing list for anyone to subscribe to. This list is an open list to discuss public security issues/patches.&lt;br /&gt;
&lt;br /&gt;
*  &#039;&#039;&#039;Private List&#039;&#039;&#039;&lt;br /&gt;
: security [at] yoctoprojct [dot] org (Forwards to the following addresses)&lt;br /&gt;
 &lt;br /&gt;
: - &#039;&#039;&#039;sona [dot] sarmadi [at] enea [dot] com&#039;&#039;&#039; &lt;br /&gt;
: - &#039;&#039;&#039;mhalstead [at] linuxfoundation [dot] org&#039;&#039;&#039; &lt;br /&gt;
: For secure communications, please send your messages encrypted to both using the following GPG keys. &lt;br /&gt;
: Remember message headers are not encrypted so do not include sensitive information in the subject line.&lt;br /&gt;
&lt;br /&gt;
: Download public keys: [https://pgp.mit.edu/pks/lookup?op=vindex&amp;amp;search=0x773EF6EF68716A14 Sona Sarmadi] [https://pgp.mit.edu/pks/lookup?op=vindex&amp;amp;search=0x3373170601861969 Michael Halstead]&lt;br /&gt;
&lt;br /&gt;
Anyone can contribute with security patches as before, but those volunteering to this security team will sync/organize security related activities and take more responsibility.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;What you should do if you find a security vulnerability&#039;&#039;&#039;&lt;br /&gt;
---------------------------------------------&lt;br /&gt;
If you find a security flaw; a crash, an information leakage, or anything that can have a security impact if exploited in any Open Source packages used by the Yocto Project, please report this to the Yocto Security Team. If you prefer to contact the upstream project directly, please send a copy to the security team at Yocto as well.&lt;br /&gt;
If you believe this is sensitive information, please report the vulnerability in a secure way, i.e. encrypt the email and send it to the private list. This ensures that the exploit is not leaked and exploited before a response/fix has been generated.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;What Yocto Security Team does when it receives a security vulnerability&#039;&#039;&#039;&lt;br /&gt;
---------------------------------------------&lt;br /&gt;
The team performs a quick analysis and reports the flaw to the upstream project. Normally the upstream projects analyzes the problem. If they deem that it is a real security problem in their software, the project will  email the linux-distros mailing list and notify all the big Linux distributions/vendors about the existence of this vulnerability/flaw. These mailing lists are normally non-public. The project and people on the linux-distros can then agree on a release date when the flaw should be made public.&lt;br /&gt;
There is also sometimes some coordination for handling patches or backporting of patches etc, or just understanding the problem or what caused it.&lt;br /&gt;
&lt;br /&gt;
When the security issue is finally to be made public, normally upstream project is responsible to contact Mitre (cve.mitre.org) to get a CVE number assigned to it and copy the information to other Opens Source Security mailing lists to inform the whole world of the vulnerability.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;If an upstream project does not respond quickly&#039;&#039;&#039;&lt;br /&gt;
---------------------------------------------&lt;br /&gt;
If an upstream project does not fix the problem the Yocto&#039;s Security Team will contact linux-distros and community and together try to solve the vulnerability as quickly as possible. &lt;br /&gt;
Normally big Linux vendors fix the problem if the problem affects their products.&lt;br /&gt;
Chances are that everyone from the enterprise distros to the commercial Yocto vendors will get fixes done first, but it is nice to have saftey net for issues that really are specific to oe and embedded.&lt;br /&gt;
&lt;br /&gt;
== Branches maintained with security fixes  ==&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! Major version&lt;br /&gt;
! Current Version&lt;br /&gt;
! Branch name&lt;br /&gt;
! BitBake version&lt;br /&gt;
! Maintainer&lt;br /&gt;
|-&lt;br /&gt;
|1.7&lt;br /&gt;
|1.7&lt;br /&gt;
|dizzy&lt;br /&gt;
|1.24&lt;br /&gt;
|Armin Kuster &amp;lt;akuster808@gmail.com&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
|1.6&lt;br /&gt;
|1.6.1&lt;br /&gt;
|daisy&lt;br /&gt;
|1.22&lt;br /&gt;
|Saul Wold &amp;lt;sgw@linux.intel.com&amp;gt;&lt;br /&gt;
|- style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|1.5&lt;br /&gt;
|1.5.3&lt;br /&gt;
|dora&lt;br /&gt;
|1.20&lt;br /&gt;
|Robert Yang &amp;lt;liezhi.yang@windriver.com&amp;gt;&lt;br /&gt;
|- style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|1.4&lt;br /&gt;
|1.4.3[https://lists.yoctoproject.org/pipermail/yocto/2014-July/020699.html *]&lt;br /&gt;
|dylan&lt;br /&gt;
|1.18&lt;br /&gt;
|Paul Eggleton &amp;lt;paul.eggleton@linux.intel.com&amp;gt;&lt;br /&gt;
|- style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|1.3&lt;br /&gt;
|1.3.2&lt;br /&gt;
|danny&lt;br /&gt;
|1.16&lt;br /&gt;
|Ross Burton &amp;lt;ross.burton@intel.com&amp;gt;&lt;br /&gt;
|- style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Security patches (CVEs) is backported to all branches above (if at all possible). &lt;br /&gt;
Versions in grey are no longer actively maintained, but well-tested security patches may still be accepted for them.) &lt;br /&gt;
&lt;br /&gt;
See [https://wiki.yoctoproject.org/wiki/Stable_branch_maintenance Stable branches maintenance]for detailed info regarding the policies and maintenance of Stable branch&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Policy for updating package versions for the stable branches ==&lt;br /&gt;
The Yocto project purposely limits updating of packages on oe-stable releases to items that address security problems (CVE&#039;s). E.g. packages like qemu we avoid updating between from one &amp;quot;dot.dot&amp;quot; to another related &amp;quot;dot.dot&amp;quot; version since it has been seen in the past that even with &amp;quot;simple&amp;quot; updates, things can go wrong and a lot more testing is required to verify compatibility. Better to only add CVE patches to fix specific point problems.&lt;br /&gt;
&lt;br /&gt;
== Kernel security patches ==&lt;br /&gt;
&lt;br /&gt;
Kernel security patches are backported to Linux-yoco kernels regularly from https://www.kernel.org/&lt;br /&gt;
=== Linux-yocto ===&lt;br /&gt;
linux-yocto_3.10 &amp;amp; linux-yocto_3.14 (maintainer: Bruce Ashfield)&lt;br /&gt;
&lt;br /&gt;
=== Vendor kernels ===&lt;br /&gt;
Kernel security patches are also backported to Linux-vendor kernels from https://www.kernel.org/&lt;br /&gt;
 &lt;br /&gt;
* meta-intel (meta-intel uses Linux-yocto)&lt;br /&gt;
* meta-fsl-ppc (meta-freescale@yoctoproject.org)&lt;br /&gt;
* meta-xilinx (meta-xilinx@lists.yoctoproject.org)&lt;br /&gt;
* meta-ti (meta-ti@yoctoproject.org)&lt;br /&gt;
* etc&lt;br /&gt;
&lt;br /&gt;
== How to test ==&lt;br /&gt;
 &lt;br /&gt;
If there is any test case for the vulnerability by the upstream project or community&lt;br /&gt;
 - Run the test to reproduce the problem and verify the correction. &lt;br /&gt;
 - Run the regression test&lt;br /&gt;
&lt;br /&gt;
If there isn’t any test case and it is complicated and time consuming to write a testcase&lt;br /&gt;
 - Run the regressions test&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Regression test&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Build the core image for at least two architectures (preferably one big-endian and one little-endian)&lt;br /&gt;
* Run ptest (for those branches/packages that there is ptest mechanism)&lt;br /&gt;
&lt;br /&gt;
== Patch name convention and commit message ==&lt;br /&gt;
Security patches should have reference to the CVE identifier both in the patch file/s and the commit comment.&lt;br /&gt;
&lt;br /&gt;
Please make sure to add the package name in the subject and the reference to the CVE. Example for the commit comment: &lt;br /&gt;
&lt;br /&gt;
    bash: CVE-2014-6278&lt;br /&gt;
    &lt;br /&gt;
    &amp;lt;short description&amp;gt;&lt;br /&gt;
    &lt;br /&gt;
    &amp;lt;[YOCTO #xxx] if there is any&amp;gt;&lt;br /&gt;
    &lt;br /&gt;
    References&lt;br /&gt;
    E.g. [https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6278 link to CVE] or other useful info/blog/advisory.&lt;br /&gt;
    &lt;br /&gt;
    Signed-off-by: &lt;br /&gt;
    &lt;br /&gt;
For additional guidelines refer to: [http://openembedded.org/wiki/Commit_Patch_Message_Guidelines Commit Patch Message Guidelines]&lt;br /&gt;
&lt;br /&gt;
== Some security related links/useful tools ==&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
* [http://www.cvedetails.com CVE details] &lt;br /&gt;
* [http://www.cvedetails.com/vulnerability-list/vendor_id-33/product_id-47/year-2014/Linux-Linux-Kernel.html  CVE list, Linux kernel 2014]&lt;br /&gt;
* [https://www.yoctoproject.org/blogs/andrei-dinu/2013/meta-security-layer-now-available Meta-security-layer]&lt;br /&gt;
* [http://www.yoctoproject.org/docs/1.7/dev-manual/dev-manual.html#making-images-more-secure Making images more secure]&lt;br /&gt;
* [http://cvechecker.sourceforge.net Cvechecker]&lt;br /&gt;
&lt;br /&gt;
== Security Issues Addressed in Yocto Releases ==&lt;br /&gt;
&#039;&#039;&#039;Yocto 1.7.1 - Dizzy&#039;&#039;&#039; &lt;br /&gt;
https://www.yoctoproject.org/downloads/core/dizzy171&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Yocto 1.7 - Dizzy&#039;&#039;&#039; &lt;br /&gt;
https://www.yoctoproject.org/downloads/core/dizzy17&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Yocto 1.6 - Daisy&#039;&#039;&#039; &lt;br /&gt;
https://www.yoctoproject.org/downloads/core/daisy16&lt;/div&gt;</summary>
		<author><name>SonaSarmadi</name></author>
	</entry>
	<entry>
		<id>https://wiki.yoctoproject.org/wiki/index.php?title=Security&amp;diff=14473</id>
		<title>Security</title>
		<link rel="alternate" type="text/html" href="https://wiki.yoctoproject.org/wiki/index.php?title=Security&amp;diff=14473"/>
		<updated>2015-04-15T05:52:24Z</updated>

		<summary type="html">&lt;p&gt;SonaSarmadi: /* Security Policy for updating package versions for the stable branches */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Since the Yocto Project is intended to be flexible and meet the needs of many applications, we leave policy-making decisions around security to our end users. Our goal instead is to ship each release with metadata that follows best practices in that we do not release recipe versions which are known to have significant security vulnerabilities. Generally this is done by upgrading recipes to newer versions that are no longer vulnerable to these issues. &lt;br /&gt;
&lt;br /&gt;
Upgrading recipes to the newer versions in the maintenance branches is not always easy, this is why we provide a patch for the existing version instead if we detect a vulnerability in a package. The patches are added to the recipes, see example below:&lt;br /&gt;
&lt;br /&gt;
  poky/recipes-connectivity/bind/bind_9.9.5.bb&lt;br /&gt;
  &lt;br /&gt;
  SRC_URI = &amp;quot;ftp://ftp.isc.org/isc/bind9/${PV}/${BPN}-${PV}.tar.gz \&lt;br /&gt;
           file://conf.patch \&lt;br /&gt;
           ...&lt;br /&gt;
           file://bind9_9_5-CVE-2014-8500.patch \&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
We are tracking security vulnerabilities in the Yocto Project against the [http://nvd.nist.gov/home.cfm National Vulnerability Database]. &lt;br /&gt;
&lt;br /&gt;
We also track CVEs reported to the oss-security list (Open Source Software Security) http://www.openwall.com/lists/oss-security/&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Yocto Security Team ==&lt;br /&gt;
 &lt;br /&gt;
The purpose of creating a security team in the Yocto project is to discuss, sync and organize security related activities.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The team&#039;s main responsibilities among others are:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
*  Scanning of security forums/mailing list(s) to detect security vulnerabilities reported by community&lt;br /&gt;
*  Responsible for fixing CVEs in the Yocto releases &amp;amp; maintained branches&lt;br /&gt;
*  Evaluation of tools for security tests &lt;br /&gt;
*  Responsible for security related info in the Yocto documentations&lt;br /&gt;
*  Hardening of Yocto release&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;How to Contact Yocto&#039;s security team Securely&#039;&#039;&#039;&lt;br /&gt;
---------------------------------------------&lt;br /&gt;
We have set up two security-related mailing lists:&lt;br /&gt;
*  &#039;&#039;&#039;Public List&#039;&#039;&#039;&lt;br /&gt;
: yocto [dash] security [at] yoctoproject[dot] com&lt;br /&gt;
: This is a public mailing list for anyone to subscribe to. This list is an open list to discuss public security issues/patches.&lt;br /&gt;
&lt;br /&gt;
*  &#039;&#039;&#039;Private List&#039;&#039;&#039;&lt;br /&gt;
: security [at] yoctoprojct [dot] org (Forwards to the following addresses)&lt;br /&gt;
 &lt;br /&gt;
: - &#039;&#039;&#039;sona [dot] sarmadi [at] enea [dot] com&#039;&#039;&#039; &lt;br /&gt;
: - &#039;&#039;&#039;mhalstead [at] linuxfoundation [dot] org&#039;&#039;&#039; &lt;br /&gt;
: For secure communications, please send your messages encrypted to both using the following GPG keys. &lt;br /&gt;
: Remember message headers are not encrypted so do not include sensitive information in the subject line.&lt;br /&gt;
&lt;br /&gt;
: Download public keys: [https://pgp.mit.edu/pks/lookup?op=vindex&amp;amp;search=0x773EF6EF68716A14 Sona Sarmadi] [https://pgp.mit.edu/pks/lookup?op=vindex&amp;amp;search=0x3373170601861969 Michael Halstead]&lt;br /&gt;
&lt;br /&gt;
Anyone can contribute with security patches as before, but those volunteering to this security team will sync/organize security related activities and take more responsibility.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;What you should do if you find a security vulnerability&#039;&#039;&#039;&lt;br /&gt;
---------------------------------------------&lt;br /&gt;
If you find a security flaw; a crash, an information leakage, or anything that can have a security impact if exploited in any Open Source packages used by the Yocto Project, please report this to the Yocto Security Team. If you prefer to contact the upstream project directly, please send a copy to the security team at Yocto as well.&lt;br /&gt;
If you believe this is sensitive information, please report the vulnerability in a secure way, i.e. encrypt the email and send it to the private list. This ensures that the exploit is not leaked and exploited before a response/fix has been generated.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;What Yocto Security Team does when it receives a security vulnerability&#039;&#039;&#039;&lt;br /&gt;
---------------------------------------------&lt;br /&gt;
The team performs a quick analysis and reports the flaw to the upstream project. Normally the upstream projects analyzes the problem. If they deem that it is a real security problem in their software, the project will  email the linux-distros mailing list and notify all the big Linux distributions/vendors about the existence of this vulnerability/flaw. These mailing lists are normally non-public. The project and people on the linux-distros can then agree on a release date when the flaw should be made public.&lt;br /&gt;
There is also sometimes some coordination for handling patches or backporting of patches etc, or just understanding the problem or what caused it.&lt;br /&gt;
&lt;br /&gt;
When the security issue is finally to be made public, normally upstream project is responsible to contact Mitre (cve.mitre.org) to get a CVE number assigned to it and copy the information to other Opens Source Security mailing lists to inform the whole world of the vulnerability.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;If an upstream project does not respond quickly&#039;&#039;&#039;&lt;br /&gt;
---------------------------------------------&lt;br /&gt;
If an upstream project does not fix the problem the Yocto&#039;s Security Team will contact linux-distros and community and together try to solve the vulnerability as quickly as possible. &lt;br /&gt;
Normally big Linux vendors fix the problem if the problem affects their products.&lt;br /&gt;
Chances are that everyone from the enterprise distros to the commercial Yocto vendors will get fixes done first, but it is nice to have saftey net for issues that really are specific to oe and embedded.&lt;br /&gt;
&lt;br /&gt;
== Branches maintained with security fixes  ==&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! Major version&lt;br /&gt;
! Current Version&lt;br /&gt;
! Branch name&lt;br /&gt;
! BitBake version&lt;br /&gt;
! Maintainer&lt;br /&gt;
|-&lt;br /&gt;
|1.7&lt;br /&gt;
|1.7&lt;br /&gt;
|dizzy&lt;br /&gt;
|1.24&lt;br /&gt;
|Armin Kuster &amp;lt;akuster808@gmail.com&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
|1.6&lt;br /&gt;
|1.6.1&lt;br /&gt;
|daisy&lt;br /&gt;
|1.22&lt;br /&gt;
|Saul Wold &amp;lt;sgw@linux.intel.com&amp;gt;&lt;br /&gt;
|- style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|1.5&lt;br /&gt;
|1.5.3&lt;br /&gt;
|dora&lt;br /&gt;
|1.20&lt;br /&gt;
|Robert Yang &amp;lt;liezhi.yang@windriver.com&amp;gt;&lt;br /&gt;
|- style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|1.4&lt;br /&gt;
|1.4.3[https://lists.yoctoproject.org/pipermail/yocto/2014-July/020699.html *]&lt;br /&gt;
|dylan&lt;br /&gt;
|1.18&lt;br /&gt;
|Paul Eggleton &amp;lt;paul.eggleton@linux.intel.com&amp;gt;&lt;br /&gt;
|- style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|1.3&lt;br /&gt;
|1.3.2&lt;br /&gt;
|danny&lt;br /&gt;
|1.16&lt;br /&gt;
|Ross Burton &amp;lt;ross.burton@intel.com&amp;gt;&lt;br /&gt;
|- style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Security patches (CVEs) is backported to all branches above (if at all possible). &lt;br /&gt;
Versions in grey are no longer actively maintained, but well-tested security patches may still be accepted for them.) &lt;br /&gt;
&lt;br /&gt;
See [https://wiki.yoctoproject.org/wiki/Stable_branch_maintenance Stable branches maintenance]for detailed info regarding the policies and maintenance of Stable branch&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Policy for updating package versions for the stable branches ==&lt;br /&gt;
The yocto project purposely limits updating of packages in oe-core stable releases to items that address CVE, security related items. Some packages such as qemu however we avodid updating from one dot.dot to another dot.dot since we have seen issues in the past with &amp;quot;simple&amp;quot; updates, lots more testing is required vs knowing we are adding a CVE patch to fix a point problem.&lt;br /&gt;
&lt;br /&gt;
== Kernel security patches ==&lt;br /&gt;
&lt;br /&gt;
Kernel security patches are backported to Linux-yoco kernels regularly from https://www.kernel.org/&lt;br /&gt;
=== Linux-yocto ===&lt;br /&gt;
linux-yocto_3.10 &amp;amp; linux-yocto_3.14 (maintainer: Bruce Ashfield)&lt;br /&gt;
&lt;br /&gt;
=== Vendor kernels ===&lt;br /&gt;
Kernel security patches are also backported to Linux-vendor kernels from https://www.kernel.org/&lt;br /&gt;
 &lt;br /&gt;
* meta-intel (meta-intel uses Linux-yocto)&lt;br /&gt;
* meta-fsl-ppc (meta-freescale@yoctoproject.org)&lt;br /&gt;
* meta-xilinx (meta-xilinx@lists.yoctoproject.org)&lt;br /&gt;
* meta-ti (meta-ti@yoctoproject.org)&lt;br /&gt;
* etc&lt;br /&gt;
&lt;br /&gt;
== How to test ==&lt;br /&gt;
 &lt;br /&gt;
If there is any test case for the vulnerability by the upstream project or community&lt;br /&gt;
 - Run the test to reproduce the problem and verify the correction. &lt;br /&gt;
 - Run the regression test&lt;br /&gt;
&lt;br /&gt;
If there isn’t any test case and it is complicated and time consuming to write a testcase&lt;br /&gt;
 - Run the regressions test&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Regression test&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Build the core image for at least two architectures (preferably one big-endian and one little-endian)&lt;br /&gt;
* Run ptest (for those branches/packages that there is ptest mechanism)&lt;br /&gt;
&lt;br /&gt;
== Patch name convention and commit message ==&lt;br /&gt;
Security patches should have reference to the CVE identifier both in the patch file/s and the commit comment.&lt;br /&gt;
&lt;br /&gt;
Please make sure to add the package name in the subject and the reference to the CVE. Example for the commit comment: &lt;br /&gt;
&lt;br /&gt;
    bash: CVE-2014-6278&lt;br /&gt;
    &lt;br /&gt;
    &amp;lt;short description&amp;gt;&lt;br /&gt;
    &lt;br /&gt;
    &amp;lt;[YOCTO #xxx] if there is any&amp;gt;&lt;br /&gt;
    &lt;br /&gt;
    References&lt;br /&gt;
    E.g. [https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6278 link to CVE] or other useful info/blog/advisory.&lt;br /&gt;
    &lt;br /&gt;
    Signed-off-by: &lt;br /&gt;
    &lt;br /&gt;
For additional guidelines refer to: [http://openembedded.org/wiki/Commit_Patch_Message_Guidelines Commit Patch Message Guidelines]&lt;br /&gt;
&lt;br /&gt;
== Some security related links/useful tools ==&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
* [http://www.cvedetails.com CVE details] &lt;br /&gt;
* [http://www.cvedetails.com/vulnerability-list/vendor_id-33/product_id-47/year-2014/Linux-Linux-Kernel.html  CVE list, Linux kernel 2014]&lt;br /&gt;
* [https://www.yoctoproject.org/blogs/andrei-dinu/2013/meta-security-layer-now-available Meta-security-layer]&lt;br /&gt;
* [http://www.yoctoproject.org/docs/1.7/dev-manual/dev-manual.html#making-images-more-secure Making images more secure]&lt;br /&gt;
* [http://cvechecker.sourceforge.net Cvechecker]&lt;br /&gt;
&lt;br /&gt;
== Security Issues Addressed in Yocto Releases ==&lt;br /&gt;
&#039;&#039;&#039;Yocto 1.7.1 - Dizzy&#039;&#039;&#039; &lt;br /&gt;
https://www.yoctoproject.org/downloads/core/dizzy171&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Yocto 1.7 - Dizzy&#039;&#039;&#039; &lt;br /&gt;
https://www.yoctoproject.org/downloads/core/dizzy17&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Yocto 1.6 - Daisy&#039;&#039;&#039; &lt;br /&gt;
https://www.yoctoproject.org/downloads/core/daisy16&lt;/div&gt;</summary>
		<author><name>SonaSarmadi</name></author>
	</entry>
	<entry>
		<id>https://wiki.yoctoproject.org/wiki/index.php?title=Security&amp;diff=14472</id>
		<title>Security</title>
		<link rel="alternate" type="text/html" href="https://wiki.yoctoproject.org/wiki/index.php?title=Security&amp;diff=14472"/>
		<updated>2015-04-15T05:48:28Z</updated>

		<summary type="html">&lt;p&gt;SonaSarmadi: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Since the Yocto Project is intended to be flexible and meet the needs of many applications, we leave policy-making decisions around security to our end users. Our goal instead is to ship each release with metadata that follows best practices in that we do not release recipe versions which are known to have significant security vulnerabilities. Generally this is done by upgrading recipes to newer versions that are no longer vulnerable to these issues. &lt;br /&gt;
&lt;br /&gt;
Upgrading recipes to the newer versions in the maintenance branches is not always easy, this is why we provide a patch for the existing version instead if we detect a vulnerability in a package. The patches are added to the recipes, see example below:&lt;br /&gt;
&lt;br /&gt;
  poky/recipes-connectivity/bind/bind_9.9.5.bb&lt;br /&gt;
  &lt;br /&gt;
  SRC_URI = &amp;quot;ftp://ftp.isc.org/isc/bind9/${PV}/${BPN}-${PV}.tar.gz \&lt;br /&gt;
           file://conf.patch \&lt;br /&gt;
           ...&lt;br /&gt;
           file://bind9_9_5-CVE-2014-8500.patch \&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
We are tracking security vulnerabilities in the Yocto Project against the [http://nvd.nist.gov/home.cfm National Vulnerability Database]. &lt;br /&gt;
&lt;br /&gt;
We also track CVEs reported to the oss-security list (Open Source Software Security) http://www.openwall.com/lists/oss-security/&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Yocto Security Team ==&lt;br /&gt;
 &lt;br /&gt;
The purpose of creating a security team in the Yocto project is to discuss, sync and organize security related activities.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The team&#039;s main responsibilities among others are:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
*  Scanning of security forums/mailing list(s) to detect security vulnerabilities reported by community&lt;br /&gt;
*  Responsible for fixing CVEs in the Yocto releases &amp;amp; maintained branches&lt;br /&gt;
*  Evaluation of tools for security tests &lt;br /&gt;
*  Responsible for security related info in the Yocto documentations&lt;br /&gt;
*  Hardening of Yocto release&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;How to Contact Yocto&#039;s security team Securely&#039;&#039;&#039;&lt;br /&gt;
---------------------------------------------&lt;br /&gt;
We have set up two security-related mailing lists:&lt;br /&gt;
*  &#039;&#039;&#039;Public List&#039;&#039;&#039;&lt;br /&gt;
: yocto [dash] security [at] yoctoproject[dot] com&lt;br /&gt;
: This is a public mailing list for anyone to subscribe to. This list is an open list to discuss public security issues/patches.&lt;br /&gt;
&lt;br /&gt;
*  &#039;&#039;&#039;Private List&#039;&#039;&#039;&lt;br /&gt;
: security [at] yoctoprojct [dot] org (Forwards to the following addresses)&lt;br /&gt;
 &lt;br /&gt;
: - &#039;&#039;&#039;sona [dot] sarmadi [at] enea [dot] com&#039;&#039;&#039; &lt;br /&gt;
: - &#039;&#039;&#039;mhalstead [at] linuxfoundation [dot] org&#039;&#039;&#039; &lt;br /&gt;
: For secure communications, please send your messages encrypted to both using the following GPG keys. &lt;br /&gt;
: Remember message headers are not encrypted so do not include sensitive information in the subject line.&lt;br /&gt;
&lt;br /&gt;
: Download public keys: [https://pgp.mit.edu/pks/lookup?op=vindex&amp;amp;search=0x773EF6EF68716A14 Sona Sarmadi] [https://pgp.mit.edu/pks/lookup?op=vindex&amp;amp;search=0x3373170601861969 Michael Halstead]&lt;br /&gt;
&lt;br /&gt;
Anyone can contribute with security patches as before, but those volunteering to this security team will sync/organize security related activities and take more responsibility.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;What you should do if you find a security vulnerability&#039;&#039;&#039;&lt;br /&gt;
---------------------------------------------&lt;br /&gt;
If you find a security flaw; a crash, an information leakage, or anything that can have a security impact if exploited in any Open Source packages used by the Yocto Project, please report this to the Yocto Security Team. If you prefer to contact the upstream project directly, please send a copy to the security team at Yocto as well.&lt;br /&gt;
If you believe this is sensitive information, please report the vulnerability in a secure way, i.e. encrypt the email and send it to the private list. This ensures that the exploit is not leaked and exploited before a response/fix has been generated.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;What Yocto Security Team does when it receives a security vulnerability&#039;&#039;&#039;&lt;br /&gt;
---------------------------------------------&lt;br /&gt;
The team performs a quick analysis and reports the flaw to the upstream project. Normally the upstream projects analyzes the problem. If they deem that it is a real security problem in their software, the project will  email the linux-distros mailing list and notify all the big Linux distributions/vendors about the existence of this vulnerability/flaw. These mailing lists are normally non-public. The project and people on the linux-distros can then agree on a release date when the flaw should be made public.&lt;br /&gt;
There is also sometimes some coordination for handling patches or backporting of patches etc, or just understanding the problem or what caused it.&lt;br /&gt;
&lt;br /&gt;
When the security issue is finally to be made public, normally upstream project is responsible to contact Mitre (cve.mitre.org) to get a CVE number assigned to it and copy the information to other Opens Source Security mailing lists to inform the whole world of the vulnerability.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;If an upstream project does not respond quickly&#039;&#039;&#039;&lt;br /&gt;
---------------------------------------------&lt;br /&gt;
If an upstream project does not fix the problem the Yocto&#039;s Security Team will contact linux-distros and community and together try to solve the vulnerability as quickly as possible. &lt;br /&gt;
Normally big Linux vendors fix the problem if the problem affects their products.&lt;br /&gt;
Chances are that everyone from the enterprise distros to the commercial Yocto vendors will get fixes done first, but it is nice to have saftey net for issues that really are specific to oe and embedded.&lt;br /&gt;
&lt;br /&gt;
== Branches maintained with security fixes  ==&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! Major version&lt;br /&gt;
! Current Version&lt;br /&gt;
! Branch name&lt;br /&gt;
! BitBake version&lt;br /&gt;
! Maintainer&lt;br /&gt;
|-&lt;br /&gt;
|1.7&lt;br /&gt;
|1.7&lt;br /&gt;
|dizzy&lt;br /&gt;
|1.24&lt;br /&gt;
|Armin Kuster &amp;lt;akuster808@gmail.com&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
|1.6&lt;br /&gt;
|1.6.1&lt;br /&gt;
|daisy&lt;br /&gt;
|1.22&lt;br /&gt;
|Saul Wold &amp;lt;sgw@linux.intel.com&amp;gt;&lt;br /&gt;
|- style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|1.5&lt;br /&gt;
|1.5.3&lt;br /&gt;
|dora&lt;br /&gt;
|1.20&lt;br /&gt;
|Robert Yang &amp;lt;liezhi.yang@windriver.com&amp;gt;&lt;br /&gt;
|- style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|1.4&lt;br /&gt;
|1.4.3[https://lists.yoctoproject.org/pipermail/yocto/2014-July/020699.html *]&lt;br /&gt;
|dylan&lt;br /&gt;
|1.18&lt;br /&gt;
|Paul Eggleton &amp;lt;paul.eggleton@linux.intel.com&amp;gt;&lt;br /&gt;
|- style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|1.3&lt;br /&gt;
|1.3.2&lt;br /&gt;
|danny&lt;br /&gt;
|1.16&lt;br /&gt;
|Ross Burton &amp;lt;ross.burton@intel.com&amp;gt;&lt;br /&gt;
|- style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Security patches (CVEs) is backported to all branches above (if at all possible). &lt;br /&gt;
Versions in grey are no longer actively maintained, but well-tested security patches may still be accepted for them.) &lt;br /&gt;
&lt;br /&gt;
See [https://wiki.yoctoproject.org/wiki/Stable_branch_maintenance Stable branches maintenance]for detailed info regarding the policies and maintenance of Stable branch&lt;br /&gt;
&lt;br /&gt;
== Security Policy for updating package versions for the stable branches ==&lt;br /&gt;
The yocto project purposely limits updating of packages in oe-core stable releases to items that address CVE, security related items. Some packages such as qemu however we avodid updating from one dot.dot to another dot.dot since we have seen issues in the past with &amp;quot;simple&amp;quot; updates, lots more testing is required vs knowing we are adding a CVE patch to fix a point problem.&lt;br /&gt;
&lt;br /&gt;
== Kernel security patches ==&lt;br /&gt;
&lt;br /&gt;
Kernel security patches are backported to Linux-yoco kernels regularly from https://www.kernel.org/&lt;br /&gt;
=== Linux-yocto ===&lt;br /&gt;
linux-yocto_3.10 &amp;amp; linux-yocto_3.14 (maintainer: Bruce Ashfield)&lt;br /&gt;
&lt;br /&gt;
=== Vendor kernels ===&lt;br /&gt;
Kernel security patches are also backported to Linux-vendor kernels from https://www.kernel.org/&lt;br /&gt;
 &lt;br /&gt;
* meta-intel (meta-intel uses Linux-yocto)&lt;br /&gt;
* meta-fsl-ppc (meta-freescale@yoctoproject.org)&lt;br /&gt;
* meta-xilinx (meta-xilinx@lists.yoctoproject.org)&lt;br /&gt;
* meta-ti (meta-ti@yoctoproject.org)&lt;br /&gt;
* etc&lt;br /&gt;
&lt;br /&gt;
== How to test ==&lt;br /&gt;
 &lt;br /&gt;
If there is any test case for the vulnerability by the upstream project or community&lt;br /&gt;
 - Run the test to reproduce the problem and verify the correction. &lt;br /&gt;
 - Run the regression test&lt;br /&gt;
&lt;br /&gt;
If there isn’t any test case and it is complicated and time consuming to write a testcase&lt;br /&gt;
 - Run the regressions test&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Regression test&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Build the core image for at least two architectures (preferably one big-endian and one little-endian)&lt;br /&gt;
* Run ptest (for those branches/packages that there is ptest mechanism)&lt;br /&gt;
&lt;br /&gt;
== Patch name convention and commit message ==&lt;br /&gt;
Security patches should have reference to the CVE identifier both in the patch file/s and the commit comment.&lt;br /&gt;
&lt;br /&gt;
Please make sure to add the package name in the subject and the reference to the CVE. Example for the commit comment: &lt;br /&gt;
&lt;br /&gt;
    bash: CVE-2014-6278&lt;br /&gt;
    &lt;br /&gt;
    &amp;lt;short description&amp;gt;&lt;br /&gt;
    &lt;br /&gt;
    &amp;lt;[YOCTO #xxx] if there is any&amp;gt;&lt;br /&gt;
    &lt;br /&gt;
    References&lt;br /&gt;
    E.g. [https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6278 link to CVE] or other useful info/blog/advisory.&lt;br /&gt;
    &lt;br /&gt;
    Signed-off-by: &lt;br /&gt;
    &lt;br /&gt;
For additional guidelines refer to: [http://openembedded.org/wiki/Commit_Patch_Message_Guidelines Commit Patch Message Guidelines]&lt;br /&gt;
&lt;br /&gt;
== Some security related links/useful tools ==&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
* [http://www.cvedetails.com CVE details] &lt;br /&gt;
* [http://www.cvedetails.com/vulnerability-list/vendor_id-33/product_id-47/year-2014/Linux-Linux-Kernel.html  CVE list, Linux kernel 2014]&lt;br /&gt;
* [https://www.yoctoproject.org/blogs/andrei-dinu/2013/meta-security-layer-now-available Meta-security-layer]&lt;br /&gt;
* [http://www.yoctoproject.org/docs/1.7/dev-manual/dev-manual.html#making-images-more-secure Making images more secure]&lt;br /&gt;
* [http://cvechecker.sourceforge.net Cvechecker]&lt;br /&gt;
&lt;br /&gt;
== Security Issues Addressed in Yocto Releases ==&lt;br /&gt;
&#039;&#039;&#039;Yocto 1.7.1 - Dizzy&#039;&#039;&#039; &lt;br /&gt;
https://www.yoctoproject.org/downloads/core/dizzy171&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Yocto 1.7 - Dizzy&#039;&#039;&#039; &lt;br /&gt;
https://www.yoctoproject.org/downloads/core/dizzy17&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Yocto 1.6 - Daisy&#039;&#039;&#039; &lt;br /&gt;
https://www.yoctoproject.org/downloads/core/daisy16&lt;/div&gt;</summary>
		<author><name>SonaSarmadi</name></author>
	</entry>
	<entry>
		<id>https://wiki.yoctoproject.org/wiki/index.php?title=Security&amp;diff=14471</id>
		<title>Security</title>
		<link rel="alternate" type="text/html" href="https://wiki.yoctoproject.org/wiki/index.php?title=Security&amp;diff=14471"/>
		<updated>2015-04-15T05:41:55Z</updated>

		<summary type="html">&lt;p&gt;SonaSarmadi: /* Branches maintained with security fixes */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Since the Yocto Project is intended to be flexible and meet the needs of many applications, we leave policy-making decisions around security to our end users. Our goal instead is to ship each release with metadata that follows best practices in that we do not release recipe versions which are known to have significant security vulnerabilities. Generally this is done by upgrading recipes to newer versions that are no longer vulnerable to these issues. &lt;br /&gt;
&lt;br /&gt;
Upgrading recipes to the newer versions in the maintenance branches is not always easy, this is why we provide a patch for the existing version instead if we detect a vulnerability in a package. The patches are added to the recipes, see example below:&lt;br /&gt;
&lt;br /&gt;
  poky/recipes-connectivity/bind/bind_9.9.5.bb&lt;br /&gt;
  &lt;br /&gt;
  SRC_URI = &amp;quot;ftp://ftp.isc.org/isc/bind9/${PV}/${BPN}-${PV}.tar.gz \&lt;br /&gt;
           file://conf.patch \&lt;br /&gt;
           ...&lt;br /&gt;
           file://bind9_9_5-CVE-2014-8500.patch \&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
We are tracking security vulnerabilities in the Yocto Project against the [http://nvd.nist.gov/home.cfm National Vulnerability Database]. &lt;br /&gt;
&lt;br /&gt;
We also track CVEs reported to the oss-security list (Open Source Software Security) http://www.openwall.com/lists/oss-security/&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Yocto Security Team ==&lt;br /&gt;
 &lt;br /&gt;
The purpose of creating a security team in the Yocto project is to discuss, sync and organize security related activities.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The team&#039;s main responsibilities among others are:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
*  Scanning of security forums/mailing list(s) to detect security vulnerabilities reported by community&lt;br /&gt;
*  Responsible for fixing CVEs in the Yocto releases &amp;amp; maintained branches&lt;br /&gt;
*  Evaluation of tools for security tests &lt;br /&gt;
*  Responsible for security related info in the Yocto documentations&lt;br /&gt;
*  Hardening of Yocto release&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;How to Contact Yocto&#039;s security team Securely&#039;&#039;&#039;&lt;br /&gt;
---------------------------------------------&lt;br /&gt;
We have set up two security-related mailing lists:&lt;br /&gt;
*  &#039;&#039;&#039;Public List&#039;&#039;&#039;&lt;br /&gt;
: yocto [dash] security [at] yoctoproject[dot] com&lt;br /&gt;
: This is a public mailing list for anyone to subscribe to. This list is an open list to discuss public security issues/patches.&lt;br /&gt;
&lt;br /&gt;
*  &#039;&#039;&#039;Private List&#039;&#039;&#039;&lt;br /&gt;
: security [at] yoctoprojct [dot] org (Forwards to the following addresses)&lt;br /&gt;
 &lt;br /&gt;
: - &#039;&#039;&#039;sona [dot] sarmadi [at] enea [dot] com&#039;&#039;&#039; &lt;br /&gt;
: - &#039;&#039;&#039;mhalstead [at] linuxfoundation [dot] org&#039;&#039;&#039; &lt;br /&gt;
: For secure communications, please send your messages encrypted to both using the following GPG keys. &lt;br /&gt;
: Remember message headers are not encrypted so do not include sensitive information in the subject line.&lt;br /&gt;
&lt;br /&gt;
: Download public keys: [https://pgp.mit.edu/pks/lookup?op=vindex&amp;amp;search=0x773EF6EF68716A14 Sona Sarmadi] [https://pgp.mit.edu/pks/lookup?op=vindex&amp;amp;search=0x3373170601861969 Michael Halstead]&lt;br /&gt;
&lt;br /&gt;
Anyone can contribute with security patches as before, but those volunteering to this security team will sync/organize security related activities and take more responsibility.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;What you should do if you find a security vulnerability&#039;&#039;&#039;&lt;br /&gt;
---------------------------------------------&lt;br /&gt;
If you find a security flaw; a crash, an information leakage, or anything that can have a security impact if exploited in any Open Source packages used by the Yocto Project, please report this to the Yocto Security Team. If you prefer to contact the upstream project directly, please send a copy to the security team at Yocto as well.&lt;br /&gt;
If you believe this is sensitive information, please report the vulnerability in a secure way, i.e. encrypt the email and send it to the private list. This ensures that the exploit is not leaked and exploited before a response/fix has been generated.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;What Yocto Security Team does when it receives a security vulnerability&#039;&#039;&#039;&lt;br /&gt;
---------------------------------------------&lt;br /&gt;
The team performs a quick analysis and reports the flaw to the upstream project. Normally the upstream projects analyzes the problem. If they deem that it is a real security problem in their software, the project will  email the linux-distros mailing list and notify all the big Linux distributions/vendors about the existence of this vulnerability/flaw. These mailing lists are normally non-public. The project and people on the linux-distros can then agree on a release date when the flaw should be made public.&lt;br /&gt;
There is also sometimes some coordination for handling patches or backporting of patches etc, or just understanding the problem or what caused it.&lt;br /&gt;
&lt;br /&gt;
When the security issue is finally to be made public, normally upstream project is responsible to contact Mitre (cve.mitre.org) to get a CVE number assigned to it and copy the information to other Opens Source Security mailing lists to inform the whole world of the vulnerability.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;If an upstream project does not respond quickly&#039;&#039;&#039;&lt;br /&gt;
---------------------------------------------&lt;br /&gt;
If an upstream project does not fix the problem the Yocto&#039;s Security Team will contact linux-distros and community and together try to solve the vulnerability as quickly as possible. &lt;br /&gt;
Normally big Linux vendors fix the problem if the problem affects their products.&lt;br /&gt;
Chances are that everyone from the enterprise distros to the commercial Yocto vendors will get fixes done first, but it is nice to have saftey net for issues that really are specific to oe and embedded.&lt;br /&gt;
&lt;br /&gt;
== Branches maintained with security fixes  ==&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! Major version&lt;br /&gt;
! Current Version&lt;br /&gt;
! Branch name&lt;br /&gt;
! BitBake version&lt;br /&gt;
! Maintainer&lt;br /&gt;
|-&lt;br /&gt;
|1.7&lt;br /&gt;
|1.7&lt;br /&gt;
|dizzy&lt;br /&gt;
|1.24&lt;br /&gt;
|Armin Kuster &amp;lt;akuster808@gmail.com&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
|1.6&lt;br /&gt;
|1.6.1&lt;br /&gt;
|daisy&lt;br /&gt;
|1.22&lt;br /&gt;
|Saul Wold &amp;lt;sgw@linux.intel.com&amp;gt;&lt;br /&gt;
|- style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|1.5&lt;br /&gt;
|1.5.3&lt;br /&gt;
|dora&lt;br /&gt;
|1.20&lt;br /&gt;
|Robert Yang &amp;lt;liezhi.yang@windriver.com&amp;gt;&lt;br /&gt;
|- style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|1.4&lt;br /&gt;
|1.4.3[https://lists.yoctoproject.org/pipermail/yocto/2014-July/020699.html *]&lt;br /&gt;
|dylan&lt;br /&gt;
|1.18&lt;br /&gt;
|Paul Eggleton &amp;lt;paul.eggleton@linux.intel.com&amp;gt;&lt;br /&gt;
|- style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|1.3&lt;br /&gt;
|1.3.2&lt;br /&gt;
|danny&lt;br /&gt;
|1.16&lt;br /&gt;
|Ross Burton &amp;lt;ross.burton@intel.com&amp;gt;&lt;br /&gt;
|- style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Security patches (CVEs) is backported to all branches above (if at all possible). &lt;br /&gt;
Versions in grey are no longer actively maintained, but well-tested security patches may still be accepted for them.) &lt;br /&gt;
&lt;br /&gt;
See [https://wiki.yoctoproject.org/wiki/Stable_branch_maintenance Stable branches maintenance]for detailed info regarding the policies and maintenance of Stable branch&lt;br /&gt;
&lt;br /&gt;
== Kernel security patches ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Kernel security patches are backported to Linux-yoco kernels regularly from https://www.kernel.org/&lt;br /&gt;
=== Linux-yocto ===&lt;br /&gt;
linux-yocto_3.10 &amp;amp; linux-yocto_3.14 (maintainer: Bruce Ashfield)&lt;br /&gt;
&lt;br /&gt;
=== Vendor kernels ===&lt;br /&gt;
Kernel security patches are also backported to Linux-vendor kernels from https://www.kernel.org/&lt;br /&gt;
 &lt;br /&gt;
* meta-intel (meta-intel uses Linux-yocto)&lt;br /&gt;
* meta-fsl-ppc (meta-freescale@yoctoproject.org)&lt;br /&gt;
* meta-xilinx (meta-xilinx@lists.yoctoproject.org)&lt;br /&gt;
* meta-ti (meta-ti@yoctoproject.org)&lt;br /&gt;
* etc&lt;br /&gt;
&lt;br /&gt;
== How to test ==&lt;br /&gt;
 &lt;br /&gt;
If there is any test case for the vulnerability by the upstream project or community&lt;br /&gt;
 - Run the test to reproduce the problem and verify the correction. &lt;br /&gt;
 - Run the regression test&lt;br /&gt;
&lt;br /&gt;
If there isn’t any test case and it is complicated and time consuming to write a testcase&lt;br /&gt;
 - Run the regressions test&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Regression test&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Build the core image for at least two architectures (preferably one big-endian and one little-endian)&lt;br /&gt;
* Run ptest (for those branches/packages that there is ptest mechanism)&lt;br /&gt;
&lt;br /&gt;
== Patch name convention and commit message ==&lt;br /&gt;
Security patches should have reference to the CVE identifier both in the patch file/s and the commit comment.&lt;br /&gt;
&lt;br /&gt;
Please make sure to add the package name in the subject and the reference to the CVE. Example for the commit comment: &lt;br /&gt;
&lt;br /&gt;
    bash: CVE-2014-6278&lt;br /&gt;
    &lt;br /&gt;
    &amp;lt;short description&amp;gt;&lt;br /&gt;
    &lt;br /&gt;
    &amp;lt;[YOCTO #xxx] if there is any&amp;gt;&lt;br /&gt;
    &lt;br /&gt;
    References&lt;br /&gt;
    E.g. [https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6278 link to CVE] or other useful info/blog/advisory.&lt;br /&gt;
    &lt;br /&gt;
    Signed-off-by: &lt;br /&gt;
    &lt;br /&gt;
For additional guidelines refer to: [http://openembedded.org/wiki/Commit_Patch_Message_Guidelines Commit Patch Message Guidelines]&lt;br /&gt;
&lt;br /&gt;
== Some security related links/useful tools ==&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
* [http://www.cvedetails.com CVE details] &lt;br /&gt;
* [http://www.cvedetails.com/vulnerability-list/vendor_id-33/product_id-47/year-2014/Linux-Linux-Kernel.html  CVE list, Linux kernel 2014]&lt;br /&gt;
* [https://www.yoctoproject.org/blogs/andrei-dinu/2013/meta-security-layer-now-available Meta-security-layer]&lt;br /&gt;
* [http://www.yoctoproject.org/docs/1.7/dev-manual/dev-manual.html#making-images-more-secure Making images more secure]&lt;br /&gt;
* [http://cvechecker.sourceforge.net Cvechecker]&lt;br /&gt;
&lt;br /&gt;
== Security Issues Addressed in Yocto Releases ==&lt;br /&gt;
&#039;&#039;&#039;Yocto 1.7.1 - Dizzy&#039;&#039;&#039; &lt;br /&gt;
https://www.yoctoproject.org/downloads/core/dizzy171&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Yocto 1.7 - Dizzy&#039;&#039;&#039; &lt;br /&gt;
https://www.yoctoproject.org/downloads/core/dizzy17&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Yocto 1.6 - Daisy&#039;&#039;&#039; &lt;br /&gt;
https://www.yoctoproject.org/downloads/core/daisy16&lt;/div&gt;</summary>
		<author><name>SonaSarmadi</name></author>
	</entry>
	<entry>
		<id>https://wiki.yoctoproject.org/wiki/index.php?title=Security&amp;diff=14275</id>
		<title>Security</title>
		<link rel="alternate" type="text/html" href="https://wiki.yoctoproject.org/wiki/index.php?title=Security&amp;diff=14275"/>
		<updated>2015-03-10T16:47:19Z</updated>

		<summary type="html">&lt;p&gt;SonaSarmadi: /* Yocto Security Team */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Since the Yocto Project is intended to be flexible and meet the needs of many applications, we leave policy-making decisions around security to our end users. Our goal instead is to ship each release with metadata that follows best practices in that we do not release recipe versions which are known to have significant security vulnerabilities. Generally this is done by upgrading recipes to newer versions that are no longer vulnerable to these issues. &lt;br /&gt;
&lt;br /&gt;
Upgrading recipes to the newer versions in the maintenance branches is not always easy, this is why we provide a patch for the existing version instead if we detect a vulnerability in a package. The patches are added to the recipes, see example below:&lt;br /&gt;
&lt;br /&gt;
  poky/recipes-connectivity/bind/bind_9.9.5.bb&lt;br /&gt;
  &lt;br /&gt;
  SRC_URI = &amp;quot;ftp://ftp.isc.org/isc/bind9/${PV}/${BPN}-${PV}.tar.gz \&lt;br /&gt;
           file://conf.patch \&lt;br /&gt;
           ...&lt;br /&gt;
           file://bind9_9_5-CVE-2014-8500.patch \&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
We are tracking security vulnerabilities in the Yocto Project against the [http://nvd.nist.gov/home.cfm National Vulnerability Database]. &lt;br /&gt;
&lt;br /&gt;
We also track CVEs reported to the oss-security list (Open Source Software Security) http://www.openwall.com/lists/oss-security/&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Yocto Security Team ==&lt;br /&gt;
 &lt;br /&gt;
The purpose of creating a security team in the Yocto project is to discuss, sync and organize security related activities.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The team&#039;s main responsibilities among others are:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
*  Scanning of security forums/mailing list(s) to detect security vulnerabilities reported by community&lt;br /&gt;
*  Responsible for fixing CVEs in the Yocto releases &amp;amp; maintained branches&lt;br /&gt;
*  Evaluation of tools for security tests &lt;br /&gt;
*  Responsible for security related info in the Yocto documentations&lt;br /&gt;
*  Hardening of Yocto release&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;How to Contact Yocto&#039;s security team Securely&#039;&#039;&#039;&lt;br /&gt;
---------------------------------------------&lt;br /&gt;
We have set up two security-related mailing lists:&lt;br /&gt;
*  &#039;&#039;&#039;Public List&#039;&#039;&#039;&lt;br /&gt;
: yocto [dash] security [at] yoctoproject[dot] com&lt;br /&gt;
: This is a public mailing list for anyone to subscribe to. This list is an open list to discuss public security issues/patches.&lt;br /&gt;
&lt;br /&gt;
*  &#039;&#039;&#039;Private List&#039;&#039;&#039;&lt;br /&gt;
: security [at] yoctoprojct [dot] org (Forwards to the following addresses)&lt;br /&gt;
 &lt;br /&gt;
: - &#039;&#039;&#039;sona [dot] sarmadi [at] enea [dot] com&#039;&#039;&#039; &lt;br /&gt;
: - &#039;&#039;&#039;mhalstead [at] linuxfoundation [dot] org&#039;&#039;&#039; &lt;br /&gt;
: For secure communications, please send your messages encrypted to both using the following GPG keys. &lt;br /&gt;
: Remember message headers are not encrypted so do not include sensitive information in the subject line.&lt;br /&gt;
&lt;br /&gt;
: Download public keys: [https://pgp.mit.edu/pks/lookup?op=vindex&amp;amp;search=0x773EF6EF68716A14 Sona Sarmadi] [https://pgp.mit.edu/pks/lookup?op=vindex&amp;amp;search=0x3373170601861969 Michael Halstead]&lt;br /&gt;
&lt;br /&gt;
Anyone can contribute with security patches as before, but those volunteering to this security team will sync/organize security related activities and take more responsibility.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;What you should do if you find a security vulnerability&#039;&#039;&#039;&lt;br /&gt;
---------------------------------------------&lt;br /&gt;
If you find a security flaw; a crash, an information leakage, or anything that can have a security impact if exploited in any Open Source packages used by the Yocto Project, please report this to the Yocto Security Team. If you prefer to contact the upstream project directly, please send a copy to the security team at Yocto as well.&lt;br /&gt;
If you believe this is sensitive information, please report the vulnerability in a secure way, i.e. encrypt the email and send it to the private list. This ensures that the exploit is not leaked and exploited before a response/fix has been generated.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;What Yocto Security Team does when it receives a security vulnerability&#039;&#039;&#039;&lt;br /&gt;
---------------------------------------------&lt;br /&gt;
The team performs a quick analysis and reports the flaw to the upstream project. Normally the upstream projects analyzes the problem. If they deem that it is a real security problem in their software, the project will  email the linux-distros mailing list and notify all the big Linux distributions/vendors about the existence of this vulnerability/flaw. These mailing lists are normally non-public. The project and people on the linux-distros can then agree on a release date when the flaw should be made public.&lt;br /&gt;
There is also sometimes some coordination for handling patches or backporting of patches etc, or just understanding the problem or what caused it.&lt;br /&gt;
&lt;br /&gt;
When the security issue is finally to be made public, normally upstream project is responsible to contact Mitre (cve.mitre.org) to get a CVE number assigned to it and copy the information to other Opens Source Security mailing lists to inform the whole world of the vulnerability.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;If an upstream project does not respond quickly&#039;&#039;&#039;&lt;br /&gt;
---------------------------------------------&lt;br /&gt;
If an upstream project does not fix the problem the Yocto&#039;s Security Team will contact linux-distros and community and together try to solve the vulnerability as quickly as possible. &lt;br /&gt;
Normally big Linux vendors fix the problem if the problem affects their products.&lt;br /&gt;
Chances are that everyone from the enterprise distros to the commercial Yocto vendors will get fixes done first, but it is nice to have saftey net for issues that really are specific to oe and embedded.&lt;br /&gt;
&lt;br /&gt;
== Branches maintained with security fixes  ==&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! Major version&lt;br /&gt;
! Current Version&lt;br /&gt;
! Branch name&lt;br /&gt;
! BitBake version&lt;br /&gt;
! Maintainer&lt;br /&gt;
|-&lt;br /&gt;
|1.7&lt;br /&gt;
|1.7&lt;br /&gt;
|dizzy&lt;br /&gt;
|1.24&lt;br /&gt;
|Armin Kuster &amp;lt;akuster808@gmail.com&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
|1.6&lt;br /&gt;
|1.6.1&lt;br /&gt;
|daisy&lt;br /&gt;
|1.22&lt;br /&gt;
|Saul Wold &amp;lt;sgw@linux.intel.com&amp;gt;&lt;br /&gt;
|- style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|1.5&lt;br /&gt;
|1.5.3&lt;br /&gt;
|dora&lt;br /&gt;
|1.20&lt;br /&gt;
|Robert Yang &amp;lt;liezhi.yang@windriver.com&amp;gt;&lt;br /&gt;
|- style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|1.4&lt;br /&gt;
|1.4.3[https://lists.yoctoproject.org/pipermail/yocto/2014-July/020699.html *]&lt;br /&gt;
|dylan&lt;br /&gt;
|1.18&lt;br /&gt;
|Paul Eggleton &amp;lt;paul.eggleton@linux.intel.com&amp;gt;&lt;br /&gt;
|- style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|1.3&lt;br /&gt;
|1.3.2&lt;br /&gt;
|danny&lt;br /&gt;
|1.16&lt;br /&gt;
|Ross Burton &amp;lt;ross.burton@intel.com&amp;gt;&lt;br /&gt;
|- style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Security patches (CVEs) is backported to all branches above (if at all possible). &lt;br /&gt;
Versions in grey are no longer actively maintained, but well-tested security patches may still be accepted for them.) &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
See [https://wiki.yoctoproject.org/wiki/Stable_branch_maintenance Stable branches maintenance]for detailed info regarding the policies and maintenance of Stable branch&lt;br /&gt;
&lt;br /&gt;
== Kernel security patches ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Kernel security patches are backported to Linux-yoco kernels regularly from https://www.kernel.org/&lt;br /&gt;
=== Linux-yocto ===&lt;br /&gt;
linux-yocto_3.10 &amp;amp; linux-yocto_3.14 (maintainer: Bruce Ashfield)&lt;br /&gt;
&lt;br /&gt;
=== Vendor kernels ===&lt;br /&gt;
Kernel security patches are also backported to Linux-vendor kernels from https://www.kernel.org/&lt;br /&gt;
 &lt;br /&gt;
* meta-intel (meta-intel uses Linux-yocto)&lt;br /&gt;
* meta-fsl-ppc (meta-freescale@yoctoproject.org)&lt;br /&gt;
* meta-xilinx (meta-xilinx@lists.yoctoproject.org)&lt;br /&gt;
* meta-ti (meta-ti@yoctoproject.org)&lt;br /&gt;
* etc&lt;br /&gt;
&lt;br /&gt;
== How to test ==&lt;br /&gt;
 &lt;br /&gt;
If there is any test case for the vulnerability by the upstream project or community&lt;br /&gt;
 - Run the test to reproduce the problem and verify the correction. &lt;br /&gt;
 - Run the regression test&lt;br /&gt;
&lt;br /&gt;
If there isn’t any test case and it is complicated and time consuming to write a testcase&lt;br /&gt;
 - Run the regressions test&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Regression test&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Build the core image for at least two architectures (preferably one big-endian and one little-endian)&lt;br /&gt;
* Run ptest (for those branches/packages that there is ptest mechanism)&lt;br /&gt;
&lt;br /&gt;
== Patch name convention and commit message ==&lt;br /&gt;
Security patches should have reference to the CVE identifier both in the patch file/s and the commit comment.&lt;br /&gt;
&lt;br /&gt;
Please make sure to add the package name in the subject and the reference to the CVE. Example for the commit comment: &lt;br /&gt;
&lt;br /&gt;
    bash: CVE-2014-6278&lt;br /&gt;
    &lt;br /&gt;
    &amp;lt;short description&amp;gt;&lt;br /&gt;
    &lt;br /&gt;
    &amp;lt;[YOCTO #xxx] if there is any&amp;gt;&lt;br /&gt;
    &lt;br /&gt;
    References&lt;br /&gt;
    E.g. [https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6278 link to CVE] or other useful info/blog/advisory.&lt;br /&gt;
    &lt;br /&gt;
    Signed-off-by: &lt;br /&gt;
    &lt;br /&gt;
For additional guidelines refer to: [http://openembedded.org/wiki/Commit_Patch_Message_Guidelines Commit Patch Message Guidelines]&lt;br /&gt;
&lt;br /&gt;
== Some security related links/useful tools ==&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
* [http://www.cvedetails.com CVE details] &lt;br /&gt;
* [http://www.cvedetails.com/vulnerability-list/vendor_id-33/product_id-47/year-2014/Linux-Linux-Kernel.html  CVE list, Linux kernel 2014]&lt;br /&gt;
* [https://www.yoctoproject.org/blogs/andrei-dinu/2013/meta-security-layer-now-available Meta-security-layer]&lt;br /&gt;
* [http://www.yoctoproject.org/docs/1.7/dev-manual/dev-manual.html#making-images-more-secure Making images more secure]&lt;br /&gt;
* [http://cvechecker.sourceforge.net Cvechecker]&lt;br /&gt;
&lt;br /&gt;
== Security Issues Addressed in Yocto Releases ==&lt;br /&gt;
&#039;&#039;&#039;Yocto 1.7.1 - Dizzy&#039;&#039;&#039; &lt;br /&gt;
https://www.yoctoproject.org/downloads/core/dizzy171&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Yocto 1.7 - Dizzy&#039;&#039;&#039; &lt;br /&gt;
https://www.yoctoproject.org/downloads/core/dizzy17&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Yocto 1.6 - Daisy&#039;&#039;&#039; &lt;br /&gt;
https://www.yoctoproject.org/downloads/core/daisy16&lt;/div&gt;</summary>
		<author><name>SonaSarmadi</name></author>
	</entry>
	<entry>
		<id>https://wiki.yoctoproject.org/wiki/index.php?title=Security&amp;diff=14274</id>
		<title>Security</title>
		<link rel="alternate" type="text/html" href="https://wiki.yoctoproject.org/wiki/index.php?title=Security&amp;diff=14274"/>
		<updated>2015-03-10T16:44:57Z</updated>

		<summary type="html">&lt;p&gt;SonaSarmadi: /* Yocto Security Team */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Since the Yocto Project is intended to be flexible and meet the needs of many applications, we leave policy-making decisions around security to our end users. Our goal instead is to ship each release with metadata that follows best practices in that we do not release recipe versions which are known to have significant security vulnerabilities. Generally this is done by upgrading recipes to newer versions that are no longer vulnerable to these issues. &lt;br /&gt;
&lt;br /&gt;
Upgrading recipes to the newer versions in the maintenance branches is not always easy, this is why we provide a patch for the existing version instead if we detect a vulnerability in a package. The patches are added to the recipes, see example below:&lt;br /&gt;
&lt;br /&gt;
  poky/recipes-connectivity/bind/bind_9.9.5.bb&lt;br /&gt;
  &lt;br /&gt;
  SRC_URI = &amp;quot;ftp://ftp.isc.org/isc/bind9/${PV}/${BPN}-${PV}.tar.gz \&lt;br /&gt;
           file://conf.patch \&lt;br /&gt;
           ...&lt;br /&gt;
           file://bind9_9_5-CVE-2014-8500.patch \&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
We are tracking security vulnerabilities in the Yocto Project against the [http://nvd.nist.gov/home.cfm National Vulnerability Database]. &lt;br /&gt;
&lt;br /&gt;
We also track CVEs reported to the oss-security list (Open Source Software Security) http://www.openwall.com/lists/oss-security/&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Yocto Security Team ==&lt;br /&gt;
 &lt;br /&gt;
The purpose of creating a security team in the Yocto project is to discuss, sync and organize security related activities.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The team&#039;s main responsibilities among others are:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
*  Scanning of security forums/mailing list(s) to detect security vulnerabilities reported by community&lt;br /&gt;
*  Responsible for fixing CVEs in the Yocto releases &amp;amp; maintained branches&lt;br /&gt;
*  Evaluation of tools for security tests &lt;br /&gt;
*  Responsible for security related info in the Yocto documentations&lt;br /&gt;
*  Hardening of Yocto release&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;How to Contact Yocto&#039;s security team Securely&#039;&#039;&#039;&lt;br /&gt;
---------------------------------------------&lt;br /&gt;
We have set up two security-related mailing lists:&lt;br /&gt;
*  &#039;&#039;&#039;Public List&#039;&#039;&#039;&lt;br /&gt;
: yocto [dash] security [at] yoctoproject[dot] com&lt;br /&gt;
: This is a public mailing list for anyone to subscribe to. This list is an open list to discuss public security issues/patches.&lt;br /&gt;
&lt;br /&gt;
*  &#039;&#039;&#039;Private List&#039;&#039;&#039;&lt;br /&gt;
: security [at] yoctoprojct [dot] org (Forwards to the following addresses)&lt;br /&gt;
 &lt;br /&gt;
: - &#039;&#039;&#039;sona [dot] sarmadi [at] enea [dot] com&#039;&#039;&#039; &lt;br /&gt;
: - &#039;&#039;&#039;mhalstead [at] linuxfoundation [dot] org&#039;&#039;&#039; &lt;br /&gt;
: For secure communications, please send your messages encrypted to both using the following GPG keys. &lt;br /&gt;
: Remember message headers are not encrypted so do not include sensitive information in the subject line.&lt;br /&gt;
&lt;br /&gt;
: Download public keys: [https://pgp.mit.edu/pks/lookup?op=vindex&amp;amp;search=0x773EF6EF68716A14 Sona Sarmadi] [https://pgp.mit.edu/pks/lookup?op=vindex&amp;amp;search=0x3373170601861969 Michael Halstead]&lt;br /&gt;
&lt;br /&gt;
Anyone can contribute with security patches as before, but those volunteering to this security team will sync/organize security related activities and take more responsibility.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;What you should do if you find a security vulnerability&#039;&#039;&#039;&lt;br /&gt;
---------------------------------------------&lt;br /&gt;
If you find a security flaw; a crash, an information leakage, or anything that can have a security impact if exploited in any Open Source packages used by Yocto Project, please report this to the Yocto Security Team. If you prefer to contact the upstream project directly, please send a copy to the security team at Yocto as well.&lt;br /&gt;
If you believe this is sensitive information, please report the vulnerability in a secure way, i.e. encrypt the email and send it to the private list. This ensures that the exploit is not leaked and exploited before a response/fix has been generated.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;What Yocto Security Team does when it receives a security vulnerability&#039;&#039;&#039;&lt;br /&gt;
---------------------------------------------&lt;br /&gt;
The team performs a quick analysis and reports the flaw to the upstream project. Normally the upstream projects analyzes the problem. If they deem that it is a real security problem in their software, the project will  email the linux-distros mailing list and notify all the big Linux distributions/vendors about the existence of this vulnerability/flaw. These mailing lists are normally non-public. The project and people on the linux-distros can then agree on a release date when the flaw should be made public.&lt;br /&gt;
There is also sometimes some coordination for handling patches or backporting of patches etc, or just understanding the problem or what caused it.&lt;br /&gt;
&lt;br /&gt;
When the security issue is finally to be made public, normally upstream project is responsible to contact Mitre (cve.mitre.org) to get a CVE number assigned to it and copy the information to other Opens Source Security mailing lists to inform the whole world of the vulnerability.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;If an upstream project does not respond quickly&#039;&#039;&#039;&lt;br /&gt;
---------------------------------------------&lt;br /&gt;
If an upstream project does not fix the problem the Yocto&#039;s Security Team will contact linux-distros and community and together try to solve the vulnerability as quickly as possible. &lt;br /&gt;
Normally big Linux vendors fix the problem if the problem affects their products.&lt;br /&gt;
Chances are that everyone from the enterprise distros to the commercial Yocto vendors will get fixes done first, but it is nice to have saftey net for issues that really are specific to oe and embedded.&lt;br /&gt;
&lt;br /&gt;
== Branches maintained with security fixes  ==&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! Major version&lt;br /&gt;
! Current Version&lt;br /&gt;
! Branch name&lt;br /&gt;
! BitBake version&lt;br /&gt;
! Maintainer&lt;br /&gt;
|-&lt;br /&gt;
|1.7&lt;br /&gt;
|1.7&lt;br /&gt;
|dizzy&lt;br /&gt;
|1.24&lt;br /&gt;
|Armin Kuster &amp;lt;akuster808@gmail.com&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
|1.6&lt;br /&gt;
|1.6.1&lt;br /&gt;
|daisy&lt;br /&gt;
|1.22&lt;br /&gt;
|Saul Wold &amp;lt;sgw@linux.intel.com&amp;gt;&lt;br /&gt;
|- style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|1.5&lt;br /&gt;
|1.5.3&lt;br /&gt;
|dora&lt;br /&gt;
|1.20&lt;br /&gt;
|Robert Yang &amp;lt;liezhi.yang@windriver.com&amp;gt;&lt;br /&gt;
|- style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|1.4&lt;br /&gt;
|1.4.3[https://lists.yoctoproject.org/pipermail/yocto/2014-July/020699.html *]&lt;br /&gt;
|dylan&lt;br /&gt;
|1.18&lt;br /&gt;
|Paul Eggleton &amp;lt;paul.eggleton@linux.intel.com&amp;gt;&lt;br /&gt;
|- style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|1.3&lt;br /&gt;
|1.3.2&lt;br /&gt;
|danny&lt;br /&gt;
|1.16&lt;br /&gt;
|Ross Burton &amp;lt;ross.burton@intel.com&amp;gt;&lt;br /&gt;
|- style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Security patches (CVEs) is backported to all branches above (if at all possible). &lt;br /&gt;
Versions in grey are no longer actively maintained, but well-tested security patches may still be accepted for them.) &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
See [https://wiki.yoctoproject.org/wiki/Stable_branch_maintenance Stable branches maintenance]for detailed info regarding the policies and maintenance of Stable branch&lt;br /&gt;
&lt;br /&gt;
== Kernel security patches ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Kernel security patches are backported to Linux-yoco kernels regularly from https://www.kernel.org/&lt;br /&gt;
=== Linux-yocto ===&lt;br /&gt;
linux-yocto_3.10 &amp;amp; linux-yocto_3.14 (maintainer: Bruce Ashfield)&lt;br /&gt;
&lt;br /&gt;
=== Vendor kernels ===&lt;br /&gt;
Kernel security patches are also backported to Linux-vendor kernels from https://www.kernel.org/&lt;br /&gt;
 &lt;br /&gt;
* meta-intel (meta-intel uses Linux-yocto)&lt;br /&gt;
* meta-fsl-ppc (meta-freescale@yoctoproject.org)&lt;br /&gt;
* meta-xilinx (meta-xilinx@lists.yoctoproject.org)&lt;br /&gt;
* meta-ti (meta-ti@yoctoproject.org)&lt;br /&gt;
* etc&lt;br /&gt;
&lt;br /&gt;
== How to test ==&lt;br /&gt;
 &lt;br /&gt;
If there is any test case for the vulnerability by the upstream project or community&lt;br /&gt;
 - Run the test to reproduce the problem and verify the correction. &lt;br /&gt;
 - Run the regression test&lt;br /&gt;
&lt;br /&gt;
If there isn’t any test case and it is complicated and time consuming to write a testcase&lt;br /&gt;
 - Run the regressions test&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Regression test&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Build the core image for at least two architectures (preferably one big-endian and one little-endian)&lt;br /&gt;
* Run ptest (for those branches/packages that there is ptest mechanism)&lt;br /&gt;
&lt;br /&gt;
== Patch name convention and commit message ==&lt;br /&gt;
Security patches should have reference to the CVE identifier both in the patch file/s and the commit comment.&lt;br /&gt;
&lt;br /&gt;
Please make sure to add the package name in the subject and the reference to the CVE. Example for the commit comment: &lt;br /&gt;
&lt;br /&gt;
    bash: CVE-2014-6278&lt;br /&gt;
    &lt;br /&gt;
    &amp;lt;short description&amp;gt;&lt;br /&gt;
    &lt;br /&gt;
    &amp;lt;[YOCTO #xxx] if there is any&amp;gt;&lt;br /&gt;
    &lt;br /&gt;
    References&lt;br /&gt;
    E.g. [https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6278 link to CVE] or other useful info/blog/advisory.&lt;br /&gt;
    &lt;br /&gt;
    Signed-off-by: &lt;br /&gt;
    &lt;br /&gt;
For additional guidelines refer to: [http://openembedded.org/wiki/Commit_Patch_Message_Guidelines Commit Patch Message Guidelines]&lt;br /&gt;
&lt;br /&gt;
== Some security related links/useful tools ==&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
* [http://www.cvedetails.com CVE details] &lt;br /&gt;
* [http://www.cvedetails.com/vulnerability-list/vendor_id-33/product_id-47/year-2014/Linux-Linux-Kernel.html  CVE list, Linux kernel 2014]&lt;br /&gt;
* [https://www.yoctoproject.org/blogs/andrei-dinu/2013/meta-security-layer-now-available Meta-security-layer]&lt;br /&gt;
* [http://www.yoctoproject.org/docs/1.7/dev-manual/dev-manual.html#making-images-more-secure Making images more secure]&lt;br /&gt;
* [http://cvechecker.sourceforge.net Cvechecker]&lt;br /&gt;
&lt;br /&gt;
== Security Issues Addressed in Yocto Releases ==&lt;br /&gt;
&#039;&#039;&#039;Yocto 1.7.1 - Dizzy&#039;&#039;&#039; &lt;br /&gt;
https://www.yoctoproject.org/downloads/core/dizzy171&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Yocto 1.7 - Dizzy&#039;&#039;&#039; &lt;br /&gt;
https://www.yoctoproject.org/downloads/core/dizzy17&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Yocto 1.6 - Daisy&#039;&#039;&#039; &lt;br /&gt;
https://www.yoctoproject.org/downloads/core/daisy16&lt;/div&gt;</summary>
		<author><name>SonaSarmadi</name></author>
	</entry>
	<entry>
		<id>https://wiki.yoctoproject.org/wiki/index.php?title=Security&amp;diff=14265</id>
		<title>Security</title>
		<link rel="alternate" type="text/html" href="https://wiki.yoctoproject.org/wiki/index.php?title=Security&amp;diff=14265"/>
		<updated>2015-03-10T12:10:39Z</updated>

		<summary type="html">&lt;p&gt;SonaSarmadi: /* Branches maintained with security fixes */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Since the Yocto Project is intended to be flexible and meet the needs of many applications, we leave policy-making decisions around security to our end users. Our goal instead is to ship each release with metadata that follows best practices in that we do not release recipe versions which are known to have significant security vulnerabilities. Generally this is done by upgrading recipes to newer versions that are no longer vulnerable to these issues. &lt;br /&gt;
&lt;br /&gt;
Upgrading recipes to the newer versions in the maintenance branches is not always easy, this is why we provide a patch for the existing version instead if we detect a vulnerability in a package. The patches are added to the recipes, see example below:&lt;br /&gt;
&lt;br /&gt;
  poky/recipes-connectivity/bind/bind_9.9.5.bb&lt;br /&gt;
  &lt;br /&gt;
  SRC_URI = &amp;quot;ftp://ftp.isc.org/isc/bind9/${PV}/${BPN}-${PV}.tar.gz \&lt;br /&gt;
           file://conf.patch \&lt;br /&gt;
           ...&lt;br /&gt;
           file://bind9_9_5-CVE-2014-8500.patch \&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
We are tracking security vulnerabilities in the Yocto Project against the [http://nvd.nist.gov/home.cfm National Vulnerability Database]. &lt;br /&gt;
&lt;br /&gt;
We also track CVEs reported to the oss-security list (Open Source Software Security) http://www.openwall.com/lists/oss-security/&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Yocto Security Team ==&lt;br /&gt;
 &lt;br /&gt;
The purpose of creating a security team in the Yocto project is to discuss, sync and organize security related activities.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The team&#039;s main responsibilities among others are:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
*  Scanning of security forums/mailing list(s) to detect security vulnerabilities reported by community&lt;br /&gt;
*  Responsible for fixing CVEs in the Yocto releases &amp;amp; maintained branches&lt;br /&gt;
*  Evaluation of tools for security tests &lt;br /&gt;
*  Responsible for security related info in the Yocto documentations&lt;br /&gt;
*  Hardening of Yocto release&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;How to Contact Yocto&#039;s security team Securely&#039;&#039;&#039;&lt;br /&gt;
---------------------------------------------&lt;br /&gt;
We have set up two security-related mailing lists:&lt;br /&gt;
*  &#039;&#039;&#039;Public List&#039;&#039;&#039;&lt;br /&gt;
: yocto [dash] security [at] yoctoproject[dot] com&lt;br /&gt;
: This is a public mailing list for anyone to subscribe to. This list is an open list to discuss public security issues/patches.&lt;br /&gt;
&lt;br /&gt;
*  &#039;&#039;&#039;Private List&#039;&#039;&#039;&lt;br /&gt;
: security [at] yoctoprojct [dot] org (Forwards to the following addresses)&lt;br /&gt;
 &lt;br /&gt;
: - &#039;&#039;&#039;sona [dot] sarmadi [at] enea [dot] com&#039;&#039;&#039; &lt;br /&gt;
: - &#039;&#039;&#039;mhalstead [at] linuxfoundation [dot] org&#039;&#039;&#039; &lt;br /&gt;
: For secure communications, please send your messages encrypted to both using the following GPG keys. &lt;br /&gt;
: Remember message headers are not encrypted so do not include sensitive information in the subject line.&lt;br /&gt;
&lt;br /&gt;
: Download public keys: [https://pgp.mit.edu/pks/lookup?op=vindex&amp;amp;search=0x773EF6EF68716A14 Sona Sarmadi] [https://pgp.mit.edu/pks/lookup?op=vindex&amp;amp;search=0x3373170601861969 Michael Halstead]&lt;br /&gt;
&lt;br /&gt;
Anyone can contribute with security patches as before, but those volunteering to this security team will sync/organize security related activities and take more responsibility.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;What you should do if you find a security vulnerability&#039;&#039;&#039;&lt;br /&gt;
---------------------------------------------&lt;br /&gt;
If you find a security flaw; a crash, an information leakage, or anything that can have a security impact if exploited in any Open Source packages used by Yocto Project, please report this to the Yocto Security Team. If you prefer to contact the upstream project directly, please send a copy to the security team at Yocto as well.&lt;br /&gt;
If you believe this is sensitive information, please report the vulnerability in a secure way, i.e. encrypt the email and send it to the private list. This ensures that the exploit is not leaked and exploited before a response/fix has been generated.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;What Yocto Security Team do/does when it receives a security vulnerability&#039;&#039;&#039;&lt;br /&gt;
---------------------------------------------&lt;br /&gt;
The team performs a quick analysis and reports the flaw to the upstream project. Normally the upstream projects analyzes the problem. If they deem that it is a real security problem in their software, the project will  email the linux-distros mailing list and notify all the big Linux distributions/vendors about the existence of this vulnerability/flaw. These mailing lists are normally non-public. The project and people on the linux-distros can then agree on a release date when the flaw should be made public.&lt;br /&gt;
There is also sometimes some coordination for handling patches or backporting of patches etc, or just understanding the problem or what caused it.&lt;br /&gt;
&lt;br /&gt;
When the security issue is finally to be made public, normally upstream project is responsible to contact Mitre (cve.mitre.org) to get a CVE number assigned to it and copy the information to other Opens Source Security mailing lists to inform the whole world of the vulnerability.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;If an upstream project does not respond quickly&#039;&#039;&#039;&lt;br /&gt;
---------------------------------------------&lt;br /&gt;
If an upstream project does not fix the problem the Yocto&#039;s Security Team will contact linux-distros and community and together try to solve the vulnerability as quickly as possible. &lt;br /&gt;
Normally big Linux vendors fix the problem if the problem affects their products.&lt;br /&gt;
Chances are that everyone from the enterprise distros to the commercial Yocto vendors will get fixes done first, but it is nice to have saftey net for issues that really are specific to oe and embedded.&lt;br /&gt;
&lt;br /&gt;
== Branches maintained with security fixes  ==&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! Major version&lt;br /&gt;
! Current Version&lt;br /&gt;
! Branch name&lt;br /&gt;
! BitBake version&lt;br /&gt;
! Maintainer&lt;br /&gt;
|-&lt;br /&gt;
|1.7&lt;br /&gt;
|1.7&lt;br /&gt;
|dizzy&lt;br /&gt;
|1.24&lt;br /&gt;
|Armin Kuster &amp;lt;akuster808@gmail.com&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
|1.6&lt;br /&gt;
|1.6.1&lt;br /&gt;
|daisy&lt;br /&gt;
|1.22&lt;br /&gt;
|Saul Wold &amp;lt;sgw@linux.intel.com&amp;gt;&lt;br /&gt;
|- style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|1.5&lt;br /&gt;
|1.5.3&lt;br /&gt;
|dora&lt;br /&gt;
|1.20&lt;br /&gt;
|Robert Yang &amp;lt;liezhi.yang@windriver.com&amp;gt;&lt;br /&gt;
|- style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|1.4&lt;br /&gt;
|1.4.3[https://lists.yoctoproject.org/pipermail/yocto/2014-July/020699.html *]&lt;br /&gt;
|dylan&lt;br /&gt;
|1.18&lt;br /&gt;
|Paul Eggleton &amp;lt;paul.eggleton@linux.intel.com&amp;gt;&lt;br /&gt;
|- style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|1.3&lt;br /&gt;
|1.3.2&lt;br /&gt;
|danny&lt;br /&gt;
|1.16&lt;br /&gt;
|Ross Burton &amp;lt;ross.burton@intel.com&amp;gt;&lt;br /&gt;
|- style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Security patches (CVEs) is backported to all branches above (if at all possible). &lt;br /&gt;
Versions in grey are no longer actively maintained, but well-tested security patches may still be accepted for them.) &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
See [https://wiki.yoctoproject.org/wiki/Stable_branch_maintenance Stable branches maintenance]for detailed info regarding the policies and maintenance of Stable branch&lt;br /&gt;
&lt;br /&gt;
== Kernel security patches ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Kernel security patches are backported to Linux-yoco kernels regularly from https://www.kernel.org/&lt;br /&gt;
=== Linux-yocto ===&lt;br /&gt;
linux-yocto_3.10 &amp;amp; linux-yocto_3.14 (maintainer: Bruce Ashfield)&lt;br /&gt;
&lt;br /&gt;
=== Vendor kernels ===&lt;br /&gt;
Kernel security patches are also backported to Linux-vendor kernels from https://www.kernel.org/&lt;br /&gt;
 &lt;br /&gt;
* meta-intel (meta-intel uses Linux-yocto)&lt;br /&gt;
* meta-fsl-ppc (meta-freescale@yoctoproject.org)&lt;br /&gt;
* meta-xilinx (meta-xilinx@lists.yoctoproject.org)&lt;br /&gt;
* meta-ti (meta-ti@yoctoproject.org)&lt;br /&gt;
* etc&lt;br /&gt;
&lt;br /&gt;
== How to test ==&lt;br /&gt;
 &lt;br /&gt;
If there is any test case for the vulnerability by the upstream project or community&lt;br /&gt;
 - Run the test to reproduce the problem and verify the correction. &lt;br /&gt;
 - Run the regression test&lt;br /&gt;
&lt;br /&gt;
If there isn’t any test case and it is complicated and time consuming to write a testcase&lt;br /&gt;
 - Run the regressions test&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Regression test&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Build the core image for at least two architectures (preferably one big-endian and one little-endian)&lt;br /&gt;
* Run ptest (for those branches/packages that there is ptest mechanism)&lt;br /&gt;
&lt;br /&gt;
== Patch name convention and commit message ==&lt;br /&gt;
Security patches should have reference to the CVE identifier both in the patch file/s and the commit comment.&lt;br /&gt;
&lt;br /&gt;
Please make sure to add the package name in the subject and the reference to the CVE. Example for the commit comment: &lt;br /&gt;
&lt;br /&gt;
    bash: CVE-2014-6278&lt;br /&gt;
    &lt;br /&gt;
    &amp;lt;short description&amp;gt;&lt;br /&gt;
    &lt;br /&gt;
    &amp;lt;[YOCTO #xxx] if there is any&amp;gt;&lt;br /&gt;
    &lt;br /&gt;
    References&lt;br /&gt;
    E.g. [https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6278 link to CVE] or other useful info/blog/advisory.&lt;br /&gt;
    &lt;br /&gt;
    Signed-off-by: &lt;br /&gt;
    &lt;br /&gt;
For additional guidelines refer to: [http://openembedded.org/wiki/Commit_Patch_Message_Guidelines Commit Patch Message Guidelines]&lt;br /&gt;
&lt;br /&gt;
== Some security related links/useful tools ==&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
* [http://www.cvedetails.com CVE details] &lt;br /&gt;
* [http://www.cvedetails.com/vulnerability-list/vendor_id-33/product_id-47/year-2014/Linux-Linux-Kernel.html  CVE list, Linux kernel 2014]&lt;br /&gt;
* [https://www.yoctoproject.org/blogs/andrei-dinu/2013/meta-security-layer-now-available Meta-security-layer]&lt;br /&gt;
* [http://www.yoctoproject.org/docs/1.7/dev-manual/dev-manual.html#making-images-more-secure Making images more secure]&lt;br /&gt;
* [http://cvechecker.sourceforge.net Cvechecker]&lt;br /&gt;
&lt;br /&gt;
== Security Issues Addressed in Yocto Releases ==&lt;br /&gt;
&#039;&#039;&#039;Yocto 1.7.1 - Dizzy&#039;&#039;&#039; &lt;br /&gt;
https://www.yoctoproject.org/downloads/core/dizzy171&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Yocto 1.7 - Dizzy&#039;&#039;&#039; &lt;br /&gt;
https://www.yoctoproject.org/downloads/core/dizzy17&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Yocto 1.6 - Daisy&#039;&#039;&#039; &lt;br /&gt;
https://www.yoctoproject.org/downloads/core/daisy16&lt;/div&gt;</summary>
		<author><name>SonaSarmadi</name></author>
	</entry>
	<entry>
		<id>https://wiki.yoctoproject.org/wiki/index.php?title=Security&amp;diff=14264</id>
		<title>Security</title>
		<link rel="alternate" type="text/html" href="https://wiki.yoctoproject.org/wiki/index.php?title=Security&amp;diff=14264"/>
		<updated>2015-03-10T12:06:09Z</updated>

		<summary type="html">&lt;p&gt;SonaSarmadi: /* Yocto Security Team */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Since the Yocto Project is intended to be flexible and meet the needs of many applications, we leave policy-making decisions around security to our end users. Our goal instead is to ship each release with metadata that follows best practices in that we do not release recipe versions which are known to have significant security vulnerabilities. Generally this is done by upgrading recipes to newer versions that are no longer vulnerable to these issues. &lt;br /&gt;
&lt;br /&gt;
Upgrading recipes to the newer versions in the maintenance branches is not always easy, this is why we provide a patch for the existing version instead if we detect a vulnerability in a package. The patches are added to the recipes, see example below:&lt;br /&gt;
&lt;br /&gt;
  poky/recipes-connectivity/bind/bind_9.9.5.bb&lt;br /&gt;
  &lt;br /&gt;
  SRC_URI = &amp;quot;ftp://ftp.isc.org/isc/bind9/${PV}/${BPN}-${PV}.tar.gz \&lt;br /&gt;
           file://conf.patch \&lt;br /&gt;
           ...&lt;br /&gt;
           file://bind9_9_5-CVE-2014-8500.patch \&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
We are tracking security vulnerabilities in the Yocto Project against the [http://nvd.nist.gov/home.cfm National Vulnerability Database]. &lt;br /&gt;
&lt;br /&gt;
We also track CVEs reported to the oss-security list (Open Source Software Security) http://www.openwall.com/lists/oss-security/&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Yocto Security Team ==&lt;br /&gt;
 &lt;br /&gt;
The purpose of creating a security team in the Yocto project is to discuss, sync and organize security related activities.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The team&#039;s main responsibilities among others are:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
*  Scanning of security forums/mailing list(s) to detect security vulnerabilities reported by community&lt;br /&gt;
*  Responsible for fixing CVEs in the Yocto releases &amp;amp; maintained branches&lt;br /&gt;
*  Evaluation of tools for security tests &lt;br /&gt;
*  Responsible for security related info in the Yocto documentations&lt;br /&gt;
*  Hardening of Yocto release&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;How to Contact Yocto&#039;s security team Securely&#039;&#039;&#039;&lt;br /&gt;
---------------------------------------------&lt;br /&gt;
We have set up two security-related mailing lists:&lt;br /&gt;
*  &#039;&#039;&#039;Public List&#039;&#039;&#039;&lt;br /&gt;
: yocto [dash] security [at] yoctoproject[dot] com&lt;br /&gt;
: This is a public mailing list for anyone to subscribe to. This list is an open list to discuss public security issues/patches.&lt;br /&gt;
&lt;br /&gt;
*  &#039;&#039;&#039;Private List&#039;&#039;&#039;&lt;br /&gt;
: security [at] yoctoprojct [dot] org (Forwards to the following addresses)&lt;br /&gt;
 &lt;br /&gt;
: - &#039;&#039;&#039;sona [dot] sarmadi [at] enea [dot] com&#039;&#039;&#039; &lt;br /&gt;
: - &#039;&#039;&#039;mhalstead [at] linuxfoundation [dot] org&#039;&#039;&#039; &lt;br /&gt;
: For secure communications, please send your messages encrypted to both using the following GPG keys. &lt;br /&gt;
: Remember message headers are not encrypted so do not include sensitive information in the subject line.&lt;br /&gt;
&lt;br /&gt;
: Download public keys: [https://pgp.mit.edu/pks/lookup?op=vindex&amp;amp;search=0x773EF6EF68716A14 Sona Sarmadi] [https://pgp.mit.edu/pks/lookup?op=vindex&amp;amp;search=0x3373170601861969 Michael Halstead]&lt;br /&gt;
&lt;br /&gt;
Anyone can contribute with security patches as before, but those volunteering to this security team will sync/organize security related activities and take more responsibility.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;What you should do if you find a security vulnerability&#039;&#039;&#039;&lt;br /&gt;
---------------------------------------------&lt;br /&gt;
If you find a security flaw; a crash, an information leakage, or anything that can have a security impact if exploited in any Open Source packages used by Yocto Project, please report this to the Yocto Security Team. If you prefer to contact the upstream project directly, please send a copy to the security team at Yocto as well.&lt;br /&gt;
If you believe this is sensitive information, please report the vulnerability in a secure way, i.e. encrypt the email and send it to the private list. This ensures that the exploit is not leaked and exploited before a response/fix has been generated.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;What Yocto Security Team do/does when it receives a security vulnerability&#039;&#039;&#039;&lt;br /&gt;
---------------------------------------------&lt;br /&gt;
The team performs a quick analysis and reports the flaw to the upstream project. Normally the upstream projects analyzes the problem. If they deem that it is a real security problem in their software, the project will  email the linux-distros mailing list and notify all the big Linux distributions/vendors about the existence of this vulnerability/flaw. These mailing lists are normally non-public. The project and people on the linux-distros can then agree on a release date when the flaw should be made public.&lt;br /&gt;
There is also sometimes some coordination for handling patches or backporting of patches etc, or just understanding the problem or what caused it.&lt;br /&gt;
&lt;br /&gt;
When the security issue is finally to be made public, normally upstream project is responsible to contact Mitre (cve.mitre.org) to get a CVE number assigned to it and copy the information to other Opens Source Security mailing lists to inform the whole world of the vulnerability.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;If an upstream project does not respond quickly&#039;&#039;&#039;&lt;br /&gt;
---------------------------------------------&lt;br /&gt;
If an upstream project does not fix the problem the Yocto&#039;s Security Team will contact linux-distros and community and together try to solve the vulnerability as quickly as possible. &lt;br /&gt;
Normally big Linux vendors fix the problem if the problem affects their products.&lt;br /&gt;
Chances are that everyone from the enterprise distros to the commercial Yocto vendors will get fixes done first, but it is nice to have saftey net for issues that really are specific to oe and embedded.&lt;br /&gt;
&lt;br /&gt;
== Branches maintained with security fixes  ==&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! Major version&lt;br /&gt;
! Current Version&lt;br /&gt;
! Branch name&lt;br /&gt;
! BitBake version&lt;br /&gt;
! Maintainer&lt;br /&gt;
|-&lt;br /&gt;
|1.7&lt;br /&gt;
|1.7&lt;br /&gt;
|dizzy&lt;br /&gt;
|1.24&lt;br /&gt;
|Armin Kuster &amp;lt;akuster808@gmail.com&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
|1.6&lt;br /&gt;
|1.6.1&lt;br /&gt;
|daisy&lt;br /&gt;
|1.22&lt;br /&gt;
|Saul Wold &amp;lt;sgw@linux.intel.com&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
|1.5&lt;br /&gt;
|1.5.3&lt;br /&gt;
|dora&lt;br /&gt;
|1.20&lt;br /&gt;
|Robert Yang &amp;lt;liezhi.yang@windriver.com&amp;gt;&lt;br /&gt;
|- style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|1.4&lt;br /&gt;
|1.4.3[https://lists.yoctoproject.org/pipermail/yocto/2014-July/020699.html *]&lt;br /&gt;
|dylan&lt;br /&gt;
|1.18&lt;br /&gt;
|Paul Eggleton &amp;lt;paul.eggleton@linux.intel.com&amp;gt;&lt;br /&gt;
|- style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|1.3&lt;br /&gt;
|1.3.2&lt;br /&gt;
|danny&lt;br /&gt;
|1.16&lt;br /&gt;
|Ross Burton &amp;lt;ross.burton@intel.com&amp;gt;&lt;br /&gt;
|- style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
All CVEs (security patches) should be backported to all branches above (if at all possible). &lt;br /&gt;
Versions in grey are no longer actively maintained, but well-tested security patches may still be accepted for them.) &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
See [https://wiki.yoctoproject.org/wiki/Stable_branch_maintenance Stable branches maintenance]for detailed info regarding the policies and maintenance of Stable branch&lt;br /&gt;
&lt;br /&gt;
== Kernel security patches ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Kernel security patches are backported to Linux-yoco kernels regularly from https://www.kernel.org/&lt;br /&gt;
=== Linux-yocto ===&lt;br /&gt;
linux-yocto_3.10 &amp;amp; linux-yocto_3.14 (maintainer: Bruce Ashfield)&lt;br /&gt;
&lt;br /&gt;
=== Vendor kernels ===&lt;br /&gt;
Kernel security patches are also backported to Linux-vendor kernels from https://www.kernel.org/&lt;br /&gt;
 &lt;br /&gt;
* meta-intel (meta-intel uses Linux-yocto)&lt;br /&gt;
* meta-fsl-ppc (meta-freescale@yoctoproject.org)&lt;br /&gt;
* meta-xilinx (meta-xilinx@lists.yoctoproject.org)&lt;br /&gt;
* meta-ti (meta-ti@yoctoproject.org)&lt;br /&gt;
* etc&lt;br /&gt;
&lt;br /&gt;
== How to test ==&lt;br /&gt;
 &lt;br /&gt;
If there is any test case for the vulnerability by the upstream project or community&lt;br /&gt;
 - Run the test to reproduce the problem and verify the correction. &lt;br /&gt;
 - Run the regression test&lt;br /&gt;
&lt;br /&gt;
If there isn’t any test case and it is complicated and time consuming to write a testcase&lt;br /&gt;
 - Run the regressions test&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Regression test&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Build the core image for at least two architectures (preferably one big-endian and one little-endian)&lt;br /&gt;
* Run ptest (for those branches/packages that there is ptest mechanism)&lt;br /&gt;
&lt;br /&gt;
== Patch name convention and commit message ==&lt;br /&gt;
Security patches should have reference to the CVE identifier both in the patch file/s and the commit comment.&lt;br /&gt;
&lt;br /&gt;
Please make sure to add the package name in the subject and the reference to the CVE. Example for the commit comment: &lt;br /&gt;
&lt;br /&gt;
    bash: CVE-2014-6278&lt;br /&gt;
    &lt;br /&gt;
    &amp;lt;short description&amp;gt;&lt;br /&gt;
    &lt;br /&gt;
    &amp;lt;[YOCTO #xxx] if there is any&amp;gt;&lt;br /&gt;
    &lt;br /&gt;
    References&lt;br /&gt;
    E.g. [https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6278 link to CVE] or other useful info/blog/advisory.&lt;br /&gt;
    &lt;br /&gt;
    Signed-off-by: &lt;br /&gt;
    &lt;br /&gt;
For additional guidelines refer to: [http://openembedded.org/wiki/Commit_Patch_Message_Guidelines Commit Patch Message Guidelines]&lt;br /&gt;
&lt;br /&gt;
== Some security related links/useful tools ==&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
* [http://www.cvedetails.com CVE details] &lt;br /&gt;
* [http://www.cvedetails.com/vulnerability-list/vendor_id-33/product_id-47/year-2014/Linux-Linux-Kernel.html  CVE list, Linux kernel 2014]&lt;br /&gt;
* [https://www.yoctoproject.org/blogs/andrei-dinu/2013/meta-security-layer-now-available Meta-security-layer]&lt;br /&gt;
* [http://www.yoctoproject.org/docs/1.7/dev-manual/dev-manual.html#making-images-more-secure Making images more secure]&lt;br /&gt;
* [http://cvechecker.sourceforge.net Cvechecker]&lt;br /&gt;
&lt;br /&gt;
== Security Issues Addressed in Yocto Releases ==&lt;br /&gt;
&#039;&#039;&#039;Yocto 1.7.1 - Dizzy&#039;&#039;&#039; &lt;br /&gt;
https://www.yoctoproject.org/downloads/core/dizzy171&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Yocto 1.7 - Dizzy&#039;&#039;&#039; &lt;br /&gt;
https://www.yoctoproject.org/downloads/core/dizzy17&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Yocto 1.6 - Daisy&#039;&#039;&#039; &lt;br /&gt;
https://www.yoctoproject.org/downloads/core/daisy16&lt;/div&gt;</summary>
		<author><name>SonaSarmadi</name></author>
	</entry>
	<entry>
		<id>https://wiki.yoctoproject.org/wiki/index.php?title=Security&amp;diff=14263</id>
		<title>Security</title>
		<link rel="alternate" type="text/html" href="https://wiki.yoctoproject.org/wiki/index.php?title=Security&amp;diff=14263"/>
		<updated>2015-03-10T12:00:36Z</updated>

		<summary type="html">&lt;p&gt;SonaSarmadi: /* Yocto Security Team */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Since the Yocto Project is intended to be flexible and meet the needs of many applications, we leave policy-making decisions around security to our end users. Our goal instead is to ship each release with metadata that follows best practices in that we do not release recipe versions which are known to have significant security vulnerabilities. Generally this is done by upgrading recipes to newer versions that are no longer vulnerable to these issues. &lt;br /&gt;
&lt;br /&gt;
Upgrading recipes to the newer versions in the maintenance branches is not always easy, this is why we provide a patch for the existing version instead if we detect a vulnerability in a package. The patches are added to the recipes, see example below:&lt;br /&gt;
&lt;br /&gt;
  poky/recipes-connectivity/bind/bind_9.9.5.bb&lt;br /&gt;
  &lt;br /&gt;
  SRC_URI = &amp;quot;ftp://ftp.isc.org/isc/bind9/${PV}/${BPN}-${PV}.tar.gz \&lt;br /&gt;
           file://conf.patch \&lt;br /&gt;
           ...&lt;br /&gt;
           file://bind9_9_5-CVE-2014-8500.patch \&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
We are tracking security vulnerabilities in the Yocto Project against the [http://nvd.nist.gov/home.cfm National Vulnerability Database]. &lt;br /&gt;
&lt;br /&gt;
We also track CVEs reported to the oss-security list (Open Source Software Security) http://www.openwall.com/lists/oss-security/&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Yocto Security Team ==&lt;br /&gt;
 &lt;br /&gt;
The purpose of creating a security team in the Yocto project is to discuss, sync and organize security related activities.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The team&#039;s main responsibilities among others are:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
*  Scanning of security forums/mailing list(s) to detect security vulnerabilities reported by community&lt;br /&gt;
*  Responsible for fixing CVEs in the Yocto releases &amp;amp; maintained branches&lt;br /&gt;
*  Evaluation of tools for security tests &lt;br /&gt;
*  Responsible for security related info in the Yocto documentations&lt;br /&gt;
*  Hardening of Yocto release&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;How to Contact Yocto&#039;s security team Securely&#039;&#039;&#039;&lt;br /&gt;
---------------------------------------------&lt;br /&gt;
We have set up two security-related mailing lists:&lt;br /&gt;
*  &#039;&#039;&#039;Public List&#039;&#039;&#039;&lt;br /&gt;
: yocto [dash] security [at] yoctoproject[dot] com&lt;br /&gt;
: This is a public mailing list for anyone to subscribe to. This list is an open list to discuss public security issues/patches.&lt;br /&gt;
&lt;br /&gt;
*  &#039;&#039;&#039;Private List&#039;&#039;&#039;&lt;br /&gt;
: security [at] yoctoprojct [dot] org (Forwards to the following addresses)&lt;br /&gt;
 &lt;br /&gt;
: - &#039;&#039;&#039;sona [dot] sarmadi [at] enea [dot] com&#039;&#039;&#039; &lt;br /&gt;
: - &#039;&#039;&#039;mhalstead [at] linuxfoundation [dot] org&#039;&#039;&#039; &lt;br /&gt;
: For secure communications, please send your messages encrypted to both using the following GPG keys. &lt;br /&gt;
: Remember message headers are not encrypted so do not include sensitive information in the subject line.&lt;br /&gt;
&lt;br /&gt;
: Download public keys: [https://pgp.mit.edu/pks/lookup?op=vindex&amp;amp;search=0x773EF6EF68716A14 Sona Sarmadi] [https://pgp.mit.edu/pks/lookup?op=vindex&amp;amp;search=0x3373170601861969 Michael Halstead]&lt;br /&gt;
&lt;br /&gt;
Anyone can contribute with security patches as before, but those volunteering to this security team will sync/organize security related activities and take more responsibility.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;What you should do if you find a security vulnerability&#039;&#039;&#039;&lt;br /&gt;
---------------------------------------------&lt;br /&gt;
If you find a security flaw; a crash, an information leakage or anything that can have a security impact if exploited in any Open Source packages used by Yocto Project, please report this to the Yocto Security Team. If you prefer to contact the upstream project directly, please copy security team at Yocto as well.&lt;br /&gt;
If you believe this is a sensitive information, please report the vulnerability in a secure way, i.e. encrypt email and send it to the private list. This ensures that the exploit is not leaked and exploited before a&lt;br /&gt;
response/fix has been generated.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;What Yocto Security Team do/does when they receive a security vulnerability&#039;&#039;&#039;&lt;br /&gt;
---------------------------------------------&lt;br /&gt;
The team performs a quick analysis and reports the flaw to the upstream project. Normally the upstream projects, analyzes the problem. If they deem that it is a real security problem in their software, the project then mail the linux-distros mailing list and notify all the big Linux distributions/vendors about the existence of this vulnerability/flaw. These mailing lists are normally non-public. The project and people on the linux-distros then can agree on a release date when the flaw should be made public.&lt;br /&gt;
There’s also sometimes some coordination for handling patches or backporting of patches etc, or just understanding the problem or what caused it.&lt;br /&gt;
&lt;br /&gt;
When the security issue is finally to be made public, normally upstream project is responsible to contact Mitre (cve.mitre.org) to get a CVE number assigned to it and copy other Opens Source Security mailing lists to inform the whole world of vulnerability.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;If an upstream project does not respond quickly&#039;&#039;&#039;&lt;br /&gt;
---------------------------------------------&lt;br /&gt;
If an upstream project does not fix the problem the Yocto&#039;s Security Team will contact linux-distros and community and together try to solve the vulnerability as quickly as possible. &lt;br /&gt;
Normally big Linux vendors fix the problem if the problem affects their products.&lt;br /&gt;
Chances are that everyone from the enterprise distros to the commercial&lt;br /&gt;
Yocto vendors will get fixes done first, but it is nice to have saftey net for&lt;br /&gt;
issues that really are specific to oe and embedded.&lt;br /&gt;
&lt;br /&gt;
== Branches maintained with security fixes  ==&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! Major version&lt;br /&gt;
! Current Version&lt;br /&gt;
! Branch name&lt;br /&gt;
! BitBake version&lt;br /&gt;
! Maintainer&lt;br /&gt;
|-&lt;br /&gt;
|1.7&lt;br /&gt;
|1.7&lt;br /&gt;
|dizzy&lt;br /&gt;
|1.24&lt;br /&gt;
|Armin Kuster &amp;lt;akuster808@gmail.com&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
|1.6&lt;br /&gt;
|1.6.1&lt;br /&gt;
|daisy&lt;br /&gt;
|1.22&lt;br /&gt;
|Saul Wold &amp;lt;sgw@linux.intel.com&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
|1.5&lt;br /&gt;
|1.5.3&lt;br /&gt;
|dora&lt;br /&gt;
|1.20&lt;br /&gt;
|Robert Yang &amp;lt;liezhi.yang@windriver.com&amp;gt;&lt;br /&gt;
|- style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|1.4&lt;br /&gt;
|1.4.3[https://lists.yoctoproject.org/pipermail/yocto/2014-July/020699.html *]&lt;br /&gt;
|dylan&lt;br /&gt;
|1.18&lt;br /&gt;
|Paul Eggleton &amp;lt;paul.eggleton@linux.intel.com&amp;gt;&lt;br /&gt;
|- style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|1.3&lt;br /&gt;
|1.3.2&lt;br /&gt;
|danny&lt;br /&gt;
|1.16&lt;br /&gt;
|Ross Burton &amp;lt;ross.burton@intel.com&amp;gt;&lt;br /&gt;
|- style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
All CVEs (security patches) should be backported to all branches above (if at all possible). &lt;br /&gt;
Versions in grey are no longer actively maintained, but well-tested security patches may still be accepted for them.) &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
See [https://wiki.yoctoproject.org/wiki/Stable_branch_maintenance Stable branches maintenance]for detailed info regarding the policies and maintenance of Stable branch&lt;br /&gt;
&lt;br /&gt;
== Kernel security patches ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Kernel security patches are backported to Linux-yoco kernels regularly from https://www.kernel.org/&lt;br /&gt;
=== Linux-yocto ===&lt;br /&gt;
linux-yocto_3.10 &amp;amp; linux-yocto_3.14 (maintainer: Bruce Ashfield)&lt;br /&gt;
&lt;br /&gt;
=== Vendor kernels ===&lt;br /&gt;
Kernel security patches are also backported to Linux-vendor kernels from https://www.kernel.org/&lt;br /&gt;
 &lt;br /&gt;
* meta-intel (meta-intel uses Linux-yocto)&lt;br /&gt;
* meta-fsl-ppc (meta-freescale@yoctoproject.org)&lt;br /&gt;
* meta-xilinx (meta-xilinx@lists.yoctoproject.org)&lt;br /&gt;
* meta-ti (meta-ti@yoctoproject.org)&lt;br /&gt;
* etc&lt;br /&gt;
&lt;br /&gt;
== How to test ==&lt;br /&gt;
 &lt;br /&gt;
If there is any test case for the vulnerability by the upstream project or community&lt;br /&gt;
 - Run the test to reproduce the problem and verify the correction. &lt;br /&gt;
 - Run the regression test&lt;br /&gt;
&lt;br /&gt;
If there isn’t any test case and it is complicated and time consuming to write a testcase&lt;br /&gt;
 - Run the regressions test&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Regression test&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Build the core image for at least two architectures (preferably one big-endian and one little-endian)&lt;br /&gt;
* Run ptest (for those branches/packages that there is ptest mechanism)&lt;br /&gt;
&lt;br /&gt;
== Patch name convention and commit message ==&lt;br /&gt;
Security patches should have reference to the CVE identifier both in the patch file/s and the commit comment.&lt;br /&gt;
&lt;br /&gt;
Please make sure to add the package name in the subject and the reference to the CVE. Example for the commit comment: &lt;br /&gt;
&lt;br /&gt;
    bash: CVE-2014-6278&lt;br /&gt;
    &lt;br /&gt;
    &amp;lt;short description&amp;gt;&lt;br /&gt;
    &lt;br /&gt;
    &amp;lt;[YOCTO #xxx] if there is any&amp;gt;&lt;br /&gt;
    &lt;br /&gt;
    References&lt;br /&gt;
    E.g. [https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6278 link to CVE] or other useful info/blog/advisory.&lt;br /&gt;
    &lt;br /&gt;
    Signed-off-by: &lt;br /&gt;
    &lt;br /&gt;
For additional guidelines refer to: [http://openembedded.org/wiki/Commit_Patch_Message_Guidelines Commit Patch Message Guidelines]&lt;br /&gt;
&lt;br /&gt;
== Some security related links/useful tools ==&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
* [http://www.cvedetails.com CVE details] &lt;br /&gt;
* [http://www.cvedetails.com/vulnerability-list/vendor_id-33/product_id-47/year-2014/Linux-Linux-Kernel.html  CVE list, Linux kernel 2014]&lt;br /&gt;
* [https://www.yoctoproject.org/blogs/andrei-dinu/2013/meta-security-layer-now-available Meta-security-layer]&lt;br /&gt;
* [http://www.yoctoproject.org/docs/1.7/dev-manual/dev-manual.html#making-images-more-secure Making images more secure]&lt;br /&gt;
* [http://cvechecker.sourceforge.net Cvechecker]&lt;br /&gt;
&lt;br /&gt;
== Security Issues Addressed in Yocto Releases ==&lt;br /&gt;
&#039;&#039;&#039;Yocto 1.7.1 - Dizzy&#039;&#039;&#039; &lt;br /&gt;
https://www.yoctoproject.org/downloads/core/dizzy171&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Yocto 1.7 - Dizzy&#039;&#039;&#039; &lt;br /&gt;
https://www.yoctoproject.org/downloads/core/dizzy17&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Yocto 1.6 - Daisy&#039;&#039;&#039; &lt;br /&gt;
https://www.yoctoproject.org/downloads/core/daisy16&lt;/div&gt;</summary>
		<author><name>SonaSarmadi</name></author>
	</entry>
	<entry>
		<id>https://wiki.yoctoproject.org/wiki/index.php?title=Security&amp;diff=14231</id>
		<title>Security</title>
		<link rel="alternate" type="text/html" href="https://wiki.yoctoproject.org/wiki/index.php?title=Security&amp;diff=14231"/>
		<updated>2015-03-10T06:47:35Z</updated>

		<summary type="html">&lt;p&gt;SonaSarmadi: /* Vendor kernels */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Since the Yocto Project is intended to be flexible and meet the needs of many applications, we leave policy-making decisions around security to our end users. Our goal instead is to ship each release with metadata that follows best practices in that we do not release recipe versions which are known to have significant security vulnerabilities. Generally this is done by upgrading recipes to newer versions that are no longer vulnerable to these issues. &lt;br /&gt;
&lt;br /&gt;
Upgrading recipes to the newer versions in the maintenance branches is not always easy, this is why we provide a patch for the existing version instead if we detect a vulnerability in a package. The patches are added to the recipes, see example below:&lt;br /&gt;
&lt;br /&gt;
  poky/recipes-connectivity/bind/bind_9.9.5.bb&lt;br /&gt;
  &lt;br /&gt;
  SRC_URI = &amp;quot;ftp://ftp.isc.org/isc/bind9/${PV}/${BPN}-${PV}.tar.gz \&lt;br /&gt;
           file://conf.patch \&lt;br /&gt;
           ...&lt;br /&gt;
           file://bind9_9_5-CVE-2014-8500.patch \&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
We are tracking security vulnerabilities in the Yocto Project against the [http://nvd.nist.gov/home.cfm National Vulnerability Database]. &lt;br /&gt;
&lt;br /&gt;
We also track CVEs reported to the oss-security list (Open Source Software Security) http://www.openwall.com/lists/oss-security/&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Yocto Security Team ==&lt;br /&gt;
 &lt;br /&gt;
The purpose of creating a security team in the Yocto project is to discuss, sync and organize security related activities.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The team&#039;s main responsibilities among others are:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
*  Scanning of security forums/mailing list(s) to detect security vulnerabilities reported by community&lt;br /&gt;
*  Responsible for fixing CVEs in the Yocto releases &amp;amp; maintained branches&lt;br /&gt;
*  Evaluation of tools for security tests &lt;br /&gt;
*  Responsible for security related info in the Yocto documentations&lt;br /&gt;
*  Hardening of Yocto release&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;How to Contact Yocto&#039;s security team Securely&#039;&#039;&#039;&lt;br /&gt;
---------------------------------------------&lt;br /&gt;
We have set up two security-related mailing lists:&lt;br /&gt;
*  &#039;&#039;&#039;Public List&#039;&#039;&#039;&lt;br /&gt;
: yocto [dash] security [at] yoctoproject[dot] com&lt;br /&gt;
: This is a public mailing list for anyone to subscribe to. This list is an open list to discuss public security issues/patches.&lt;br /&gt;
&lt;br /&gt;
*  &#039;&#039;&#039;Private List&#039;&#039;&#039;&lt;br /&gt;
: security [at] yoctoprojct [dot] org (Forwards to the following addresses)&lt;br /&gt;
 &lt;br /&gt;
: - &#039;&#039;&#039;sona [dot] sarmadi [at] enea [dot] com&#039;&#039;&#039; &lt;br /&gt;
: - &#039;&#039;&#039;mhalstead [at] linuxfoundation [dot] org&#039;&#039;&#039; &lt;br /&gt;
: For secure communications, please send your messages encrypted to both using the following GPG keys. &lt;br /&gt;
: Remember message headers are not encrypted so do not include sensitive information in the subject line.&lt;br /&gt;
&lt;br /&gt;
: Download public keys: [https://pgp.mit.edu/pks/lookup?op=vindex&amp;amp;search=0x773EF6EF68716A14 Sona Sarmadi] [https://pgp.mit.edu/pks/lookup?op=vindex&amp;amp;search=0x3373170601861969 Michael Halstead]&lt;br /&gt;
&lt;br /&gt;
Anyone can contribute Yocto with security patches as before, but those volunteering to this security team will sync/organize security related activities and take more responsibility&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;What you should do if you find a security vulnerability&#039;&#039;&#039;&lt;br /&gt;
---------------------------------------------&lt;br /&gt;
If you find a security flaw; a crash, an information leakage or anything that can have a security impact if exploited in any Open Source packages used by Yocto Project, please report this to the Yocto Security Team. If you prefer to contact the upstream project directly, please copy security team at Yocto as well.&lt;br /&gt;
If you believe this is a sensitive information, please report the vulnerability in a secure way, i.e. encrypt email and send it to the private list. This ensures that the exploit is not leaked and exploited before a&lt;br /&gt;
response/fix has been generated.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;What Yocto Security Team do/does when they receive a security vulnerability&#039;&#039;&#039;&lt;br /&gt;
---------------------------------------------&lt;br /&gt;
The team performs a quick analysis and reports the flaw to the upstream project. Normally the upstream projects, analyzes the problem. If they deem that it is a real security problem in their software, the project then mail the linux-distros mailing list and notify all the big Linux distributions/vendors about the existence of this vulnerability/flaw. These mailing lists are normally non-public. The project and people on the linux-distros then can agree on a release date when the flaw should be made public.&lt;br /&gt;
There’s also sometimes some coordination for handling patches or backporting of patches etc, or just understanding the problem or what caused it.&lt;br /&gt;
&lt;br /&gt;
When the security issue is finally to be made public, normally upstream project is responsible to contact Mitre (cve.mitre.org) to get a CVE number assigned to it and copy other Opens Source Security mailing lists to inform the whole world of vulnerability.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;If an upstream project does not respond quickly&#039;&#039;&#039;&lt;br /&gt;
---------------------------------------------&lt;br /&gt;
If an upstream project does not fix the problem the Yocto&#039;s Security Team will contact linux-distros and community and together try to solve the vulnerability as quickly as possible. &lt;br /&gt;
Normally big Linux vendors fix the problem if the problem affects their products.&lt;br /&gt;
Chances are that everyone from the enterprise distros to the commercial&lt;br /&gt;
Yocto vendors will get fixes done first, but it is nice to have saftey net for&lt;br /&gt;
issues that really are specific to oe and embedded.&lt;br /&gt;
&lt;br /&gt;
== Branches maintained with security fixes  ==&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! Major version&lt;br /&gt;
! Current Version&lt;br /&gt;
! Branch name&lt;br /&gt;
! BitBake version&lt;br /&gt;
! Maintainer&lt;br /&gt;
|-&lt;br /&gt;
|1.7&lt;br /&gt;
|1.7&lt;br /&gt;
|dizzy&lt;br /&gt;
|1.24&lt;br /&gt;
|Armin Kuster &amp;lt;akuster808@gmail.com&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
|1.6&lt;br /&gt;
|1.6.1&lt;br /&gt;
|daisy&lt;br /&gt;
|1.22&lt;br /&gt;
|Saul Wold &amp;lt;sgw@linux.intel.com&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
|1.5&lt;br /&gt;
|1.5.3&lt;br /&gt;
|dora&lt;br /&gt;
|1.20&lt;br /&gt;
|Robert Yang &amp;lt;liezhi.yang@windriver.com&amp;gt;&lt;br /&gt;
|- style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|1.4&lt;br /&gt;
|1.4.3[https://lists.yoctoproject.org/pipermail/yocto/2014-July/020699.html *]&lt;br /&gt;
|dylan&lt;br /&gt;
|1.18&lt;br /&gt;
|Paul Eggleton &amp;lt;paul.eggleton@linux.intel.com&amp;gt;&lt;br /&gt;
|- style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|1.3&lt;br /&gt;
|1.3.2&lt;br /&gt;
|danny&lt;br /&gt;
|1.16&lt;br /&gt;
|Ross Burton &amp;lt;ross.burton@intel.com&amp;gt;&lt;br /&gt;
|- style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
All CVEs (security patches) should be backported to all branches above (if at all possible). &lt;br /&gt;
Versions in grey are no longer actively maintained, but well-tested security patches may still be accepted for them.) &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
See [https://wiki.yoctoproject.org/wiki/Stable_branch_maintenance Stable branches maintenance]for detailed info regarding the policies and maintenance of Stable branch&lt;br /&gt;
&lt;br /&gt;
== Kernel security patches ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Kernel security patches are backported to Linux-yoco kernels regularly from https://www.kernel.org/&lt;br /&gt;
=== Linux-yocto ===&lt;br /&gt;
linux-yocto_3.10 &amp;amp; linux-yocto_3.14 (maintainer: Bruce Ashfield)&lt;br /&gt;
&lt;br /&gt;
=== Vendor kernels ===&lt;br /&gt;
Kernel security patches are also backported to Linux-vendor kernels from https://www.kernel.org/&lt;br /&gt;
 &lt;br /&gt;
* meta-intel (meta-intel uses Linux-yocto)&lt;br /&gt;
* meta-fsl-ppc (meta-freescale@yoctoproject.org)&lt;br /&gt;
* meta-xilinx (meta-xilinx@lists.yoctoproject.org)&lt;br /&gt;
* meta-ti (meta-ti@yoctoproject.org)&lt;br /&gt;
* etc&lt;br /&gt;
&lt;br /&gt;
== How to test ==&lt;br /&gt;
 &lt;br /&gt;
If there is any test case for the vulnerability by the upstream project or community&lt;br /&gt;
 - Run the test to reproduce the problem and verify the correction. &lt;br /&gt;
 - Run the regression test&lt;br /&gt;
&lt;br /&gt;
If there isn’t any test case and it is complicated and time consuming to write a testcase&lt;br /&gt;
 - Run the regressions test&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Regression test&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Build the core image for at least two architectures (preferably one big-endian and one little-endian)&lt;br /&gt;
* Run ptest (for those branches/packages that there is ptest mechanism)&lt;br /&gt;
&lt;br /&gt;
== Patch name convention and commit message ==&lt;br /&gt;
Security patches should have reference to the CVE identifier both in the patch file/s and the commit comment.&lt;br /&gt;
&lt;br /&gt;
Please make sure to add the package name in the subject and the reference to the CVE. Example for the commit comment: &lt;br /&gt;
&lt;br /&gt;
    bash: CVE-2014-6278&lt;br /&gt;
    &lt;br /&gt;
    &amp;lt;short description&amp;gt;&lt;br /&gt;
    &lt;br /&gt;
    &amp;lt;[YOCTO #xxx] if there is any&amp;gt;&lt;br /&gt;
    &lt;br /&gt;
    References&lt;br /&gt;
    E.g. [https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6278 link to CVE] or other useful info/blog/advisory.&lt;br /&gt;
    &lt;br /&gt;
    Signed-off-by: &lt;br /&gt;
    &lt;br /&gt;
For additional guidelines refer to: [http://openembedded.org/wiki/Commit_Patch_Message_Guidelines Commit Patch Message Guidelines]&lt;br /&gt;
&lt;br /&gt;
== Some security related links/useful tools ==&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
* [http://www.cvedetails.com CVE details] &lt;br /&gt;
* [http://www.cvedetails.com/vulnerability-list/vendor_id-33/product_id-47/year-2014/Linux-Linux-Kernel.html  CVE list, Linux kernel 2014]&lt;br /&gt;
* [https://www.yoctoproject.org/blogs/andrei-dinu/2013/meta-security-layer-now-available Meta-security-layer]&lt;br /&gt;
* [http://www.yoctoproject.org/docs/1.7/dev-manual/dev-manual.html#making-images-more-secure Making images more secure]&lt;br /&gt;
* [http://cvechecker.sourceforge.net Cvechecker]&lt;br /&gt;
&lt;br /&gt;
== Security Issues Addressed in Yocto Releases ==&lt;br /&gt;
&#039;&#039;&#039;Yocto 1.7.1 - Dizzy&#039;&#039;&#039; &lt;br /&gt;
https://www.yoctoproject.org/downloads/core/dizzy171&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Yocto 1.7 - Dizzy&#039;&#039;&#039; &lt;br /&gt;
https://www.yoctoproject.org/downloads/core/dizzy17&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Yocto 1.6 - Daisy&#039;&#039;&#039; &lt;br /&gt;
https://www.yoctoproject.org/downloads/core/daisy16&lt;/div&gt;</summary>
		<author><name>SonaSarmadi</name></author>
	</entry>
	<entry>
		<id>https://wiki.yoctoproject.org/wiki/index.php?title=Security&amp;diff=14230</id>
		<title>Security</title>
		<link rel="alternate" type="text/html" href="https://wiki.yoctoproject.org/wiki/index.php?title=Security&amp;diff=14230"/>
		<updated>2015-03-10T06:46:31Z</updated>

		<summary type="html">&lt;p&gt;SonaSarmadi: /* Vendor kernels */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Since the Yocto Project is intended to be flexible and meet the needs of many applications, we leave policy-making decisions around security to our end users. Our goal instead is to ship each release with metadata that follows best practices in that we do not release recipe versions which are known to have significant security vulnerabilities. Generally this is done by upgrading recipes to newer versions that are no longer vulnerable to these issues. &lt;br /&gt;
&lt;br /&gt;
Upgrading recipes to the newer versions in the maintenance branches is not always easy, this is why we provide a patch for the existing version instead if we detect a vulnerability in a package. The patches are added to the recipes, see example below:&lt;br /&gt;
&lt;br /&gt;
  poky/recipes-connectivity/bind/bind_9.9.5.bb&lt;br /&gt;
  &lt;br /&gt;
  SRC_URI = &amp;quot;ftp://ftp.isc.org/isc/bind9/${PV}/${BPN}-${PV}.tar.gz \&lt;br /&gt;
           file://conf.patch \&lt;br /&gt;
           ...&lt;br /&gt;
           file://bind9_9_5-CVE-2014-8500.patch \&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
We are tracking security vulnerabilities in the Yocto Project against the [http://nvd.nist.gov/home.cfm National Vulnerability Database]. &lt;br /&gt;
&lt;br /&gt;
We also track CVEs reported to the oss-security list (Open Source Software Security) http://www.openwall.com/lists/oss-security/&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Yocto Security Team ==&lt;br /&gt;
 &lt;br /&gt;
The purpose of creating a security team in the Yocto project is to discuss, sync and organize security related activities.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The team&#039;s main responsibilities among others are:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
*  Scanning of security forums/mailing list(s) to detect security vulnerabilities reported by community&lt;br /&gt;
*  Responsible for fixing CVEs in the Yocto releases &amp;amp; maintained branches&lt;br /&gt;
*  Evaluation of tools for security tests &lt;br /&gt;
*  Responsible for security related info in the Yocto documentations&lt;br /&gt;
*  Hardening of Yocto release&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;How to Contact Yocto&#039;s security team Securely&#039;&#039;&#039;&lt;br /&gt;
---------------------------------------------&lt;br /&gt;
We have set up two security-related mailing lists:&lt;br /&gt;
*  &#039;&#039;&#039;Public List&#039;&#039;&#039;&lt;br /&gt;
: yocto [dash] security [at] yoctoproject[dot] com&lt;br /&gt;
: This is a public mailing list for anyone to subscribe to. This list is an open list to discuss public security issues/patches.&lt;br /&gt;
&lt;br /&gt;
*  &#039;&#039;&#039;Private List&#039;&#039;&#039;&lt;br /&gt;
: security [at] yoctoprojct [dot] org (Forwards to the following addresses)&lt;br /&gt;
 &lt;br /&gt;
: - &#039;&#039;&#039;sona [dot] sarmadi [at] enea [dot] com&#039;&#039;&#039; &lt;br /&gt;
: - &#039;&#039;&#039;mhalstead [at] linuxfoundation [dot] org&#039;&#039;&#039; &lt;br /&gt;
: For secure communications, please send your messages encrypted to both using the following GPG keys. &lt;br /&gt;
: Remember message headers are not encrypted so do not include sensitive information in the subject line.&lt;br /&gt;
&lt;br /&gt;
: Download public keys: [https://pgp.mit.edu/pks/lookup?op=vindex&amp;amp;search=0x773EF6EF68716A14 Sona Sarmadi] [https://pgp.mit.edu/pks/lookup?op=vindex&amp;amp;search=0x3373170601861969 Michael Halstead]&lt;br /&gt;
&lt;br /&gt;
Anyone can contribute Yocto with security patches as before, but those volunteering to this security team will sync/organize security related activities and take more responsibility&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;What you should do if you find a security vulnerability&#039;&#039;&#039;&lt;br /&gt;
---------------------------------------------&lt;br /&gt;
If you find a security flaw; a crash, an information leakage or anything that can have a security impact if exploited in any Open Source packages used by Yocto Project, please report this to the Yocto Security Team. If you prefer to contact the upstream project directly, please copy security team at Yocto as well.&lt;br /&gt;
If you believe this is a sensitive information, please report the vulnerability in a secure way, i.e. encrypt email and send it to the private list. This ensures that the exploit is not leaked and exploited before a&lt;br /&gt;
response/fix has been generated.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;What Yocto Security Team do/does when they receive a security vulnerability&#039;&#039;&#039;&lt;br /&gt;
---------------------------------------------&lt;br /&gt;
The team performs a quick analysis and reports the flaw to the upstream project. Normally the upstream projects, analyzes the problem. If they deem that it is a real security problem in their software, the project then mail the linux-distros mailing list and notify all the big Linux distributions/vendors about the existence of this vulnerability/flaw. These mailing lists are normally non-public. The project and people on the linux-distros then can agree on a release date when the flaw should be made public.&lt;br /&gt;
There’s also sometimes some coordination for handling patches or backporting of patches etc, or just understanding the problem or what caused it.&lt;br /&gt;
&lt;br /&gt;
When the security issue is finally to be made public, normally upstream project is responsible to contact Mitre (cve.mitre.org) to get a CVE number assigned to it and copy other Opens Source Security mailing lists to inform the whole world of vulnerability.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;If an upstream project does not respond quickly&#039;&#039;&#039;&lt;br /&gt;
---------------------------------------------&lt;br /&gt;
If an upstream project does not fix the problem the Yocto&#039;s Security Team will contact linux-distros and community and together try to solve the vulnerability as quickly as possible. &lt;br /&gt;
Normally big Linux vendors fix the problem if the problem affects their products.&lt;br /&gt;
Chances are that everyone from the enterprise distros to the commercial&lt;br /&gt;
Yocto vendors will get fixes done first, but it is nice to have saftey net for&lt;br /&gt;
issues that really are specific to oe and embedded.&lt;br /&gt;
&lt;br /&gt;
== Branches maintained with security fixes  ==&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! Major version&lt;br /&gt;
! Current Version&lt;br /&gt;
! Branch name&lt;br /&gt;
! BitBake version&lt;br /&gt;
! Maintainer&lt;br /&gt;
|-&lt;br /&gt;
|1.7&lt;br /&gt;
|1.7&lt;br /&gt;
|dizzy&lt;br /&gt;
|1.24&lt;br /&gt;
|Armin Kuster &amp;lt;akuster808@gmail.com&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
|1.6&lt;br /&gt;
|1.6.1&lt;br /&gt;
|daisy&lt;br /&gt;
|1.22&lt;br /&gt;
|Saul Wold &amp;lt;sgw@linux.intel.com&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
|1.5&lt;br /&gt;
|1.5.3&lt;br /&gt;
|dora&lt;br /&gt;
|1.20&lt;br /&gt;
|Robert Yang &amp;lt;liezhi.yang@windriver.com&amp;gt;&lt;br /&gt;
|- style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|1.4&lt;br /&gt;
|1.4.3[https://lists.yoctoproject.org/pipermail/yocto/2014-July/020699.html *]&lt;br /&gt;
|dylan&lt;br /&gt;
|1.18&lt;br /&gt;
|Paul Eggleton &amp;lt;paul.eggleton@linux.intel.com&amp;gt;&lt;br /&gt;
|- style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|1.3&lt;br /&gt;
|1.3.2&lt;br /&gt;
|danny&lt;br /&gt;
|1.16&lt;br /&gt;
|Ross Burton &amp;lt;ross.burton@intel.com&amp;gt;&lt;br /&gt;
|- style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
All CVEs (security patches) should be backported to all branches above (if at all possible). &lt;br /&gt;
Versions in grey are no longer actively maintained, but well-tested security patches may still be accepted for them.) &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
See [https://wiki.yoctoproject.org/wiki/Stable_branch_maintenance Stable branches maintenance]for detailed info regarding the policies and maintenance of Stable branch&lt;br /&gt;
&lt;br /&gt;
== Kernel security patches ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Kernel security patches are backported to Linux-yoco kernels regularly from https://www.kernel.org/&lt;br /&gt;
=== Linux-yocto ===&lt;br /&gt;
linux-yocto_3.10 &amp;amp; linux-yocto_3.14 (maintainer: Bruce Ashfield)&lt;br /&gt;
&lt;br /&gt;
=== Vendor kernels ===&lt;br /&gt;
Kernel security patches are also backported to Linux-vendor kernels from https://www.kernel.org/&lt;br /&gt;
 &lt;br /&gt;
* meta-intel (meta-intel uses Linux-yocto)&lt;br /&gt;
* meta-fsl-ppc (meta-freescale@yoctoproject.org)&lt;br /&gt;
* meta-fsl-arm (maintainer: xxx)&lt;br /&gt;
* meta-xilinx (meta-xilinx@lists.yoctoproject.org)&lt;br /&gt;
* meta-ti (meta-ti@yoctoproject.org)&lt;br /&gt;
* etc&lt;br /&gt;
&lt;br /&gt;
== How to test ==&lt;br /&gt;
 &lt;br /&gt;
If there is any test case for the vulnerability by the upstream project or community&lt;br /&gt;
 - Run the test to reproduce the problem and verify the correction. &lt;br /&gt;
 - Run the regression test&lt;br /&gt;
&lt;br /&gt;
If there isn’t any test case and it is complicated and time consuming to write a testcase&lt;br /&gt;
 - Run the regressions test&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Regression test&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Build the core image for at least two architectures (preferably one big-endian and one little-endian)&lt;br /&gt;
* Run ptest (for those branches/packages that there is ptest mechanism)&lt;br /&gt;
&lt;br /&gt;
== Patch name convention and commit message ==&lt;br /&gt;
Security patches should have reference to the CVE identifier both in the patch file/s and the commit comment.&lt;br /&gt;
&lt;br /&gt;
Please make sure to add the package name in the subject and the reference to the CVE. Example for the commit comment: &lt;br /&gt;
&lt;br /&gt;
    bash: CVE-2014-6278&lt;br /&gt;
    &lt;br /&gt;
    &amp;lt;short description&amp;gt;&lt;br /&gt;
    &lt;br /&gt;
    &amp;lt;[YOCTO #xxx] if there is any&amp;gt;&lt;br /&gt;
    &lt;br /&gt;
    References&lt;br /&gt;
    E.g. [https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6278 link to CVE] or other useful info/blog/advisory.&lt;br /&gt;
    &lt;br /&gt;
    Signed-off-by: &lt;br /&gt;
    &lt;br /&gt;
For additional guidelines refer to: [http://openembedded.org/wiki/Commit_Patch_Message_Guidelines Commit Patch Message Guidelines]&lt;br /&gt;
&lt;br /&gt;
== Some security related links/useful tools ==&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
* [http://www.cvedetails.com CVE details] &lt;br /&gt;
* [http://www.cvedetails.com/vulnerability-list/vendor_id-33/product_id-47/year-2014/Linux-Linux-Kernel.html  CVE list, Linux kernel 2014]&lt;br /&gt;
* [https://www.yoctoproject.org/blogs/andrei-dinu/2013/meta-security-layer-now-available Meta-security-layer]&lt;br /&gt;
* [http://www.yoctoproject.org/docs/1.7/dev-manual/dev-manual.html#making-images-more-secure Making images more secure]&lt;br /&gt;
* [http://cvechecker.sourceforge.net Cvechecker]&lt;br /&gt;
&lt;br /&gt;
== Security Issues Addressed in Yocto Releases ==&lt;br /&gt;
&#039;&#039;&#039;Yocto 1.7.1 - Dizzy&#039;&#039;&#039; &lt;br /&gt;
https://www.yoctoproject.org/downloads/core/dizzy171&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Yocto 1.7 - Dizzy&#039;&#039;&#039; &lt;br /&gt;
https://www.yoctoproject.org/downloads/core/dizzy17&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Yocto 1.6 - Daisy&#039;&#039;&#039; &lt;br /&gt;
https://www.yoctoproject.org/downloads/core/daisy16&lt;/div&gt;</summary>
		<author><name>SonaSarmadi</name></author>
	</entry>
	<entry>
		<id>https://wiki.yoctoproject.org/wiki/index.php?title=Security&amp;diff=14229</id>
		<title>Security</title>
		<link rel="alternate" type="text/html" href="https://wiki.yoctoproject.org/wiki/index.php?title=Security&amp;diff=14229"/>
		<updated>2015-03-10T06:42:40Z</updated>

		<summary type="html">&lt;p&gt;SonaSarmadi: /* Linux-yocto */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Since the Yocto Project is intended to be flexible and meet the needs of many applications, we leave policy-making decisions around security to our end users. Our goal instead is to ship each release with metadata that follows best practices in that we do not release recipe versions which are known to have significant security vulnerabilities. Generally this is done by upgrading recipes to newer versions that are no longer vulnerable to these issues. &lt;br /&gt;
&lt;br /&gt;
Upgrading recipes to the newer versions in the maintenance branches is not always easy, this is why we provide a patch for the existing version instead if we detect a vulnerability in a package. The patches are added to the recipes, see example below:&lt;br /&gt;
&lt;br /&gt;
  poky/recipes-connectivity/bind/bind_9.9.5.bb&lt;br /&gt;
  &lt;br /&gt;
  SRC_URI = &amp;quot;ftp://ftp.isc.org/isc/bind9/${PV}/${BPN}-${PV}.tar.gz \&lt;br /&gt;
           file://conf.patch \&lt;br /&gt;
           ...&lt;br /&gt;
           file://bind9_9_5-CVE-2014-8500.patch \&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
We are tracking security vulnerabilities in the Yocto Project against the [http://nvd.nist.gov/home.cfm National Vulnerability Database]. &lt;br /&gt;
&lt;br /&gt;
We also track CVEs reported to the oss-security list (Open Source Software Security) http://www.openwall.com/lists/oss-security/&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Yocto Security Team ==&lt;br /&gt;
 &lt;br /&gt;
The purpose of creating a security team in the Yocto project is to discuss, sync and organize security related activities.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The team&#039;s main responsibilities among others are:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
*  Scanning of security forums/mailing list(s) to detect security vulnerabilities reported by community&lt;br /&gt;
*  Responsible for fixing CVEs in the Yocto releases &amp;amp; maintained branches&lt;br /&gt;
*  Evaluation of tools for security tests &lt;br /&gt;
*  Responsible for security related info in the Yocto documentations&lt;br /&gt;
*  Hardening of Yocto release&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;How to Contact Yocto&#039;s security team Securely&#039;&#039;&#039;&lt;br /&gt;
---------------------------------------------&lt;br /&gt;
We have set up two security-related mailing lists:&lt;br /&gt;
*  &#039;&#039;&#039;Public List&#039;&#039;&#039;&lt;br /&gt;
: yocto [dash] security [at] yoctoproject[dot] com&lt;br /&gt;
: This is a public mailing list for anyone to subscribe to. This list is an open list to discuss public security issues/patches.&lt;br /&gt;
&lt;br /&gt;
*  &#039;&#039;&#039;Private List&#039;&#039;&#039;&lt;br /&gt;
: security [at] yoctoprojct [dot] org (Forwards to the following addresses)&lt;br /&gt;
 &lt;br /&gt;
: - &#039;&#039;&#039;sona [dot] sarmadi [at] enea [dot] com&#039;&#039;&#039; &lt;br /&gt;
: - &#039;&#039;&#039;mhalstead [at] linuxfoundation [dot] org&#039;&#039;&#039; &lt;br /&gt;
: For secure communications, please send your messages encrypted to both using the following GPG keys. &lt;br /&gt;
: Remember message headers are not encrypted so do not include sensitive information in the subject line.&lt;br /&gt;
&lt;br /&gt;
: Download public keys: [https://pgp.mit.edu/pks/lookup?op=vindex&amp;amp;search=0x773EF6EF68716A14 Sona Sarmadi] [https://pgp.mit.edu/pks/lookup?op=vindex&amp;amp;search=0x3373170601861969 Michael Halstead]&lt;br /&gt;
&lt;br /&gt;
Anyone can contribute Yocto with security patches as before, but those volunteering to this security team will sync/organize security related activities and take more responsibility&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;What you should do if you find a security vulnerability&#039;&#039;&#039;&lt;br /&gt;
---------------------------------------------&lt;br /&gt;
If you find a security flaw; a crash, an information leakage or anything that can have a security impact if exploited in any Open Source packages used by Yocto Project, please report this to the Yocto Security Team. If you prefer to contact the upstream project directly, please copy security team at Yocto as well.&lt;br /&gt;
If you believe this is a sensitive information, please report the vulnerability in a secure way, i.e. encrypt email and send it to the private list. This ensures that the exploit is not leaked and exploited before a&lt;br /&gt;
response/fix has been generated.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;What Yocto Security Team do/does when they receive a security vulnerability&#039;&#039;&#039;&lt;br /&gt;
---------------------------------------------&lt;br /&gt;
The team performs a quick analysis and reports the flaw to the upstream project. Normally the upstream projects, analyzes the problem. If they deem that it is a real security problem in their software, the project then mail the linux-distros mailing list and notify all the big Linux distributions/vendors about the existence of this vulnerability/flaw. These mailing lists are normally non-public. The project and people on the linux-distros then can agree on a release date when the flaw should be made public.&lt;br /&gt;
There’s also sometimes some coordination for handling patches or backporting of patches etc, or just understanding the problem or what caused it.&lt;br /&gt;
&lt;br /&gt;
When the security issue is finally to be made public, normally upstream project is responsible to contact Mitre (cve.mitre.org) to get a CVE number assigned to it and copy other Opens Source Security mailing lists to inform the whole world of vulnerability.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;If an upstream project does not respond quickly&#039;&#039;&#039;&lt;br /&gt;
---------------------------------------------&lt;br /&gt;
If an upstream project does not fix the problem the Yocto&#039;s Security Team will contact linux-distros and community and together try to solve the vulnerability as quickly as possible. &lt;br /&gt;
Normally big Linux vendors fix the problem if the problem affects their products.&lt;br /&gt;
Chances are that everyone from the enterprise distros to the commercial&lt;br /&gt;
Yocto vendors will get fixes done first, but it is nice to have saftey net for&lt;br /&gt;
issues that really are specific to oe and embedded.&lt;br /&gt;
&lt;br /&gt;
== Branches maintained with security fixes  ==&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! Major version&lt;br /&gt;
! Current Version&lt;br /&gt;
! Branch name&lt;br /&gt;
! BitBake version&lt;br /&gt;
! Maintainer&lt;br /&gt;
|-&lt;br /&gt;
|1.7&lt;br /&gt;
|1.7&lt;br /&gt;
|dizzy&lt;br /&gt;
|1.24&lt;br /&gt;
|Armin Kuster &amp;lt;akuster808@gmail.com&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
|1.6&lt;br /&gt;
|1.6.1&lt;br /&gt;
|daisy&lt;br /&gt;
|1.22&lt;br /&gt;
|Saul Wold &amp;lt;sgw@linux.intel.com&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
|1.5&lt;br /&gt;
|1.5.3&lt;br /&gt;
|dora&lt;br /&gt;
|1.20&lt;br /&gt;
|Robert Yang &amp;lt;liezhi.yang@windriver.com&amp;gt;&lt;br /&gt;
|- style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|1.4&lt;br /&gt;
|1.4.3[https://lists.yoctoproject.org/pipermail/yocto/2014-July/020699.html *]&lt;br /&gt;
|dylan&lt;br /&gt;
|1.18&lt;br /&gt;
|Paul Eggleton &amp;lt;paul.eggleton@linux.intel.com&amp;gt;&lt;br /&gt;
|- style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|1.3&lt;br /&gt;
|1.3.2&lt;br /&gt;
|danny&lt;br /&gt;
|1.16&lt;br /&gt;
|Ross Burton &amp;lt;ross.burton@intel.com&amp;gt;&lt;br /&gt;
|- style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
All CVEs (security patches) should be backported to all branches above (if at all possible). &lt;br /&gt;
Versions in grey are no longer actively maintained, but well-tested security patches may still be accepted for them.) &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
See [https://wiki.yoctoproject.org/wiki/Stable_branch_maintenance Stable branches maintenance]for detailed info regarding the policies and maintenance of Stable branch&lt;br /&gt;
&lt;br /&gt;
== Kernel security patches ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Kernel security patches are backported to Linux-yoco kernels regularly from https://www.kernel.org/&lt;br /&gt;
=== Linux-yocto ===&lt;br /&gt;
linux-yocto_3.10 &amp;amp; linux-yocto_3.14 (maintainer: Bruce Ashfield)&lt;br /&gt;
&lt;br /&gt;
=== Vendor kernels ===&lt;br /&gt;
Kernel security patches are also backported to Linux-vendor kernels from https://www.kernel.org/&lt;br /&gt;
 &lt;br /&gt;
* meta-intel (meta-intel uses Linux-yocto)&lt;br /&gt;
* meta-fsl-ppc (maintainer: xxx)&lt;br /&gt;
* meta-fsl-arm (maintainer: xxx)&lt;br /&gt;
* meta-xilinx (maintainer: xxx)&lt;br /&gt;
* meta-ti (maintainer: xxx)&lt;br /&gt;
* etc&lt;br /&gt;
&lt;br /&gt;
== How to test ==&lt;br /&gt;
 &lt;br /&gt;
If there is any test case for the vulnerability by the upstream project or community&lt;br /&gt;
 - Run the test to reproduce the problem and verify the correction. &lt;br /&gt;
 - Run the regression test&lt;br /&gt;
&lt;br /&gt;
If there isn’t any test case and it is complicated and time consuming to write a testcase&lt;br /&gt;
 - Run the regressions test&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Regression test&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Build the core image for at least two architectures (preferably one big-endian and one little-endian)&lt;br /&gt;
* Run ptest (for those branches/packages that there is ptest mechanism)&lt;br /&gt;
&lt;br /&gt;
== Patch name convention and commit message ==&lt;br /&gt;
Security patches should have reference to the CVE identifier both in the patch file/s and the commit comment.&lt;br /&gt;
&lt;br /&gt;
Please make sure to add the package name in the subject and the reference to the CVE. Example for the commit comment: &lt;br /&gt;
&lt;br /&gt;
    bash: CVE-2014-6278&lt;br /&gt;
    &lt;br /&gt;
    &amp;lt;short description&amp;gt;&lt;br /&gt;
    &lt;br /&gt;
    &amp;lt;[YOCTO #xxx] if there is any&amp;gt;&lt;br /&gt;
    &lt;br /&gt;
    References&lt;br /&gt;
    E.g. [https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6278 link to CVE] or other useful info/blog/advisory.&lt;br /&gt;
    &lt;br /&gt;
    Signed-off-by: &lt;br /&gt;
    &lt;br /&gt;
For additional guidelines refer to: [http://openembedded.org/wiki/Commit_Patch_Message_Guidelines Commit Patch Message Guidelines]&lt;br /&gt;
&lt;br /&gt;
== Some security related links/useful tools ==&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
* [http://www.cvedetails.com CVE details] &lt;br /&gt;
* [http://www.cvedetails.com/vulnerability-list/vendor_id-33/product_id-47/year-2014/Linux-Linux-Kernel.html  CVE list, Linux kernel 2014]&lt;br /&gt;
* [https://www.yoctoproject.org/blogs/andrei-dinu/2013/meta-security-layer-now-available Meta-security-layer]&lt;br /&gt;
* [http://www.yoctoproject.org/docs/1.7/dev-manual/dev-manual.html#making-images-more-secure Making images more secure]&lt;br /&gt;
* [http://cvechecker.sourceforge.net Cvechecker]&lt;br /&gt;
&lt;br /&gt;
== Security Issues Addressed in Yocto Releases ==&lt;br /&gt;
&#039;&#039;&#039;Yocto 1.7.1 - Dizzy&#039;&#039;&#039; &lt;br /&gt;
https://www.yoctoproject.org/downloads/core/dizzy171&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Yocto 1.7 - Dizzy&#039;&#039;&#039; &lt;br /&gt;
https://www.yoctoproject.org/downloads/core/dizzy17&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Yocto 1.6 - Daisy&#039;&#039;&#039; &lt;br /&gt;
https://www.yoctoproject.org/downloads/core/daisy16&lt;/div&gt;</summary>
		<author><name>SonaSarmadi</name></author>
	</entry>
	<entry>
		<id>https://wiki.yoctoproject.org/wiki/index.php?title=Security&amp;diff=14228</id>
		<title>Security</title>
		<link rel="alternate" type="text/html" href="https://wiki.yoctoproject.org/wiki/index.php?title=Security&amp;diff=14228"/>
		<updated>2015-03-10T06:40:46Z</updated>

		<summary type="html">&lt;p&gt;SonaSarmadi: /* Yocto Security Team */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Since the Yocto Project is intended to be flexible and meet the needs of many applications, we leave policy-making decisions around security to our end users. Our goal instead is to ship each release with metadata that follows best practices in that we do not release recipe versions which are known to have significant security vulnerabilities. Generally this is done by upgrading recipes to newer versions that are no longer vulnerable to these issues. &lt;br /&gt;
&lt;br /&gt;
Upgrading recipes to the newer versions in the maintenance branches is not always easy, this is why we provide a patch for the existing version instead if we detect a vulnerability in a package. The patches are added to the recipes, see example below:&lt;br /&gt;
&lt;br /&gt;
  poky/recipes-connectivity/bind/bind_9.9.5.bb&lt;br /&gt;
  &lt;br /&gt;
  SRC_URI = &amp;quot;ftp://ftp.isc.org/isc/bind9/${PV}/${BPN}-${PV}.tar.gz \&lt;br /&gt;
           file://conf.patch \&lt;br /&gt;
           ...&lt;br /&gt;
           file://bind9_9_5-CVE-2014-8500.patch \&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
We are tracking security vulnerabilities in the Yocto Project against the [http://nvd.nist.gov/home.cfm National Vulnerability Database]. &lt;br /&gt;
&lt;br /&gt;
We also track CVEs reported to the oss-security list (Open Source Software Security) http://www.openwall.com/lists/oss-security/&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Yocto Security Team ==&lt;br /&gt;
 &lt;br /&gt;
The purpose of creating a security team in the Yocto project is to discuss, sync and organize security related activities.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The team&#039;s main responsibilities among others are:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
*  Scanning of security forums/mailing list(s) to detect security vulnerabilities reported by community&lt;br /&gt;
*  Responsible for fixing CVEs in the Yocto releases &amp;amp; maintained branches&lt;br /&gt;
*  Evaluation of tools for security tests &lt;br /&gt;
*  Responsible for security related info in the Yocto documentations&lt;br /&gt;
*  Hardening of Yocto release&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;How to Contact Yocto&#039;s security team Securely&#039;&#039;&#039;&lt;br /&gt;
---------------------------------------------&lt;br /&gt;
We have set up two security-related mailing lists:&lt;br /&gt;
*  &#039;&#039;&#039;Public List&#039;&#039;&#039;&lt;br /&gt;
: yocto [dash] security [at] yoctoproject[dot] com&lt;br /&gt;
: This is a public mailing list for anyone to subscribe to. This list is an open list to discuss public security issues/patches.&lt;br /&gt;
&lt;br /&gt;
*  &#039;&#039;&#039;Private List&#039;&#039;&#039;&lt;br /&gt;
: security [at] yoctoprojct [dot] org (Forwards to the following addresses)&lt;br /&gt;
 &lt;br /&gt;
: - &#039;&#039;&#039;sona [dot] sarmadi [at] enea [dot] com&#039;&#039;&#039; &lt;br /&gt;
: - &#039;&#039;&#039;mhalstead [at] linuxfoundation [dot] org&#039;&#039;&#039; &lt;br /&gt;
: For secure communications, please send your messages encrypted to both using the following GPG keys. &lt;br /&gt;
: Remember message headers are not encrypted so do not include sensitive information in the subject line.&lt;br /&gt;
&lt;br /&gt;
: Download public keys: [https://pgp.mit.edu/pks/lookup?op=vindex&amp;amp;search=0x773EF6EF68716A14 Sona Sarmadi] [https://pgp.mit.edu/pks/lookup?op=vindex&amp;amp;search=0x3373170601861969 Michael Halstead]&lt;br /&gt;
&lt;br /&gt;
Anyone can contribute Yocto with security patches as before, but those volunteering to this security team will sync/organize security related activities and take more responsibility&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;What you should do if you find a security vulnerability&#039;&#039;&#039;&lt;br /&gt;
---------------------------------------------&lt;br /&gt;
If you find a security flaw; a crash, an information leakage or anything that can have a security impact if exploited in any Open Source packages used by Yocto Project, please report this to the Yocto Security Team. If you prefer to contact the upstream project directly, please copy security team at Yocto as well.&lt;br /&gt;
If you believe this is a sensitive information, please report the vulnerability in a secure way, i.e. encrypt email and send it to the private list. This ensures that the exploit is not leaked and exploited before a&lt;br /&gt;
response/fix has been generated.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;What Yocto Security Team do/does when they receive a security vulnerability&#039;&#039;&#039;&lt;br /&gt;
---------------------------------------------&lt;br /&gt;
The team performs a quick analysis and reports the flaw to the upstream project. Normally the upstream projects, analyzes the problem. If they deem that it is a real security problem in their software, the project then mail the linux-distros mailing list and notify all the big Linux distributions/vendors about the existence of this vulnerability/flaw. These mailing lists are normally non-public. The project and people on the linux-distros then can agree on a release date when the flaw should be made public.&lt;br /&gt;
There’s also sometimes some coordination for handling patches or backporting of patches etc, or just understanding the problem or what caused it.&lt;br /&gt;
&lt;br /&gt;
When the security issue is finally to be made public, normally upstream project is responsible to contact Mitre (cve.mitre.org) to get a CVE number assigned to it and copy other Opens Source Security mailing lists to inform the whole world of vulnerability.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;If an upstream project does not respond quickly&#039;&#039;&#039;&lt;br /&gt;
---------------------------------------------&lt;br /&gt;
If an upstream project does not fix the problem the Yocto&#039;s Security Team will contact linux-distros and community and together try to solve the vulnerability as quickly as possible. &lt;br /&gt;
Normally big Linux vendors fix the problem if the problem affects their products.&lt;br /&gt;
Chances are that everyone from the enterprise distros to the commercial&lt;br /&gt;
Yocto vendors will get fixes done first, but it is nice to have saftey net for&lt;br /&gt;
issues that really are specific to oe and embedded.&lt;br /&gt;
&lt;br /&gt;
== Branches maintained with security fixes  ==&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! Major version&lt;br /&gt;
! Current Version&lt;br /&gt;
! Branch name&lt;br /&gt;
! BitBake version&lt;br /&gt;
! Maintainer&lt;br /&gt;
|-&lt;br /&gt;
|1.7&lt;br /&gt;
|1.7&lt;br /&gt;
|dizzy&lt;br /&gt;
|1.24&lt;br /&gt;
|Armin Kuster &amp;lt;akuster808@gmail.com&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
|1.6&lt;br /&gt;
|1.6.1&lt;br /&gt;
|daisy&lt;br /&gt;
|1.22&lt;br /&gt;
|Saul Wold &amp;lt;sgw@linux.intel.com&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
|1.5&lt;br /&gt;
|1.5.3&lt;br /&gt;
|dora&lt;br /&gt;
|1.20&lt;br /&gt;
|Robert Yang &amp;lt;liezhi.yang@windriver.com&amp;gt;&lt;br /&gt;
|- style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|1.4&lt;br /&gt;
|1.4.3[https://lists.yoctoproject.org/pipermail/yocto/2014-July/020699.html *]&lt;br /&gt;
|dylan&lt;br /&gt;
|1.18&lt;br /&gt;
|Paul Eggleton &amp;lt;paul.eggleton@linux.intel.com&amp;gt;&lt;br /&gt;
|- style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|1.3&lt;br /&gt;
|1.3.2&lt;br /&gt;
|danny&lt;br /&gt;
|1.16&lt;br /&gt;
|Ross Burton &amp;lt;ross.burton@intel.com&amp;gt;&lt;br /&gt;
|- style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
All CVEs (security patches) should be backported to all branches above (if at all possible). &lt;br /&gt;
Versions in grey are no longer actively maintained, but well-tested security patches may still be accepted for them.) &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
See [https://wiki.yoctoproject.org/wiki/Stable_branch_maintenance Stable branches maintenance]for detailed info regarding the policies and maintenance of Stable branch&lt;br /&gt;
&lt;br /&gt;
== Kernel security patches ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Kernel security patches are backported to Linux-yoco kernels regularly from https://www.kernel.org/&lt;br /&gt;
=== Linux-yocto ===&lt;br /&gt;
linux-yocto_3.10 &amp;amp; linux-yocto_3.14 (maintainer: Ross Burton)&lt;br /&gt;
&lt;br /&gt;
=== Vendor kernels ===&lt;br /&gt;
Kernel security patches are also backported to Linux-vendor kernels from https://www.kernel.org/&lt;br /&gt;
 &lt;br /&gt;
* meta-intel (meta-intel uses Linux-yocto)&lt;br /&gt;
* meta-fsl-ppc (maintainer: xxx)&lt;br /&gt;
* meta-fsl-arm (maintainer: xxx)&lt;br /&gt;
* meta-xilinx (maintainer: xxx)&lt;br /&gt;
* meta-ti (maintainer: xxx)&lt;br /&gt;
* etc&lt;br /&gt;
&lt;br /&gt;
== How to test ==&lt;br /&gt;
 &lt;br /&gt;
If there is any test case for the vulnerability by the upstream project or community&lt;br /&gt;
 - Run the test to reproduce the problem and verify the correction. &lt;br /&gt;
 - Run the regression test&lt;br /&gt;
&lt;br /&gt;
If there isn’t any test case and it is complicated and time consuming to write a testcase&lt;br /&gt;
 - Run the regressions test&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Regression test&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Build the core image for at least two architectures (preferably one big-endian and one little-endian)&lt;br /&gt;
* Run ptest (for those branches/packages that there is ptest mechanism)&lt;br /&gt;
&lt;br /&gt;
== Patch name convention and commit message ==&lt;br /&gt;
Security patches should have reference to the CVE identifier both in the patch file/s and the commit comment.&lt;br /&gt;
&lt;br /&gt;
Please make sure to add the package name in the subject and the reference to the CVE. Example for the commit comment: &lt;br /&gt;
&lt;br /&gt;
    bash: CVE-2014-6278&lt;br /&gt;
    &lt;br /&gt;
    &amp;lt;short description&amp;gt;&lt;br /&gt;
    &lt;br /&gt;
    &amp;lt;[YOCTO #xxx] if there is any&amp;gt;&lt;br /&gt;
    &lt;br /&gt;
    References&lt;br /&gt;
    E.g. [https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6278 link to CVE] or other useful info/blog/advisory.&lt;br /&gt;
    &lt;br /&gt;
    Signed-off-by: &lt;br /&gt;
    &lt;br /&gt;
For additional guidelines refer to: [http://openembedded.org/wiki/Commit_Patch_Message_Guidelines Commit Patch Message Guidelines]&lt;br /&gt;
&lt;br /&gt;
== Some security related links/useful tools ==&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
* [http://www.cvedetails.com CVE details] &lt;br /&gt;
* [http://www.cvedetails.com/vulnerability-list/vendor_id-33/product_id-47/year-2014/Linux-Linux-Kernel.html  CVE list, Linux kernel 2014]&lt;br /&gt;
* [https://www.yoctoproject.org/blogs/andrei-dinu/2013/meta-security-layer-now-available Meta-security-layer]&lt;br /&gt;
* [http://www.yoctoproject.org/docs/1.7/dev-manual/dev-manual.html#making-images-more-secure Making images more secure]&lt;br /&gt;
* [http://cvechecker.sourceforge.net Cvechecker]&lt;br /&gt;
&lt;br /&gt;
== Security Issues Addressed in Yocto Releases ==&lt;br /&gt;
&#039;&#039;&#039;Yocto 1.7.1 - Dizzy&#039;&#039;&#039; &lt;br /&gt;
https://www.yoctoproject.org/downloads/core/dizzy171&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Yocto 1.7 - Dizzy&#039;&#039;&#039; &lt;br /&gt;
https://www.yoctoproject.org/downloads/core/dizzy17&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Yocto 1.6 - Daisy&#039;&#039;&#039; &lt;br /&gt;
https://www.yoctoproject.org/downloads/core/daisy16&lt;/div&gt;</summary>
		<author><name>SonaSarmadi</name></author>
	</entry>
	<entry>
		<id>https://wiki.yoctoproject.org/wiki/index.php?title=Security&amp;diff=14218</id>
		<title>Security</title>
		<link rel="alternate" type="text/html" href="https://wiki.yoctoproject.org/wiki/index.php?title=Security&amp;diff=14218"/>
		<updated>2015-03-02T11:20:22Z</updated>

		<summary type="html">&lt;p&gt;SonaSarmadi: /* Yocto Security Team */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Since the Yocto Project is intended to be flexible and meet the needs of many applications, we leave policy-making decisions around security to our end users. Our goal instead is to ship each release with metadata that follows best practices in that we do not release recipe versions which are known to have significant security vulnerabilities. Generally this is done by upgrading recipes to newer versions that are no longer vulnerable to these issues. &lt;br /&gt;
&lt;br /&gt;
Upgrading recipes to the newer versions in the maintenance branches is not always easy, this is why we provide a patch for the existing version instead if we detect a vulnerability in a package. The patches are added to the recipes, see example below:&lt;br /&gt;
&lt;br /&gt;
  poky/recipes-connectivity/bind/bind_9.9.5.bb&lt;br /&gt;
  &lt;br /&gt;
  SRC_URI = &amp;quot;ftp://ftp.isc.org/isc/bind9/${PV}/${BPN}-${PV}.tar.gz \&lt;br /&gt;
           file://conf.patch \&lt;br /&gt;
           ...&lt;br /&gt;
           file://bind9_9_5-CVE-2014-8500.patch \&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
We are tracking security vulnerabilities in the Yocto Project against the [http://nvd.nist.gov/home.cfm National Vulnerability Database]. &lt;br /&gt;
&lt;br /&gt;
We also track CVEs reported to the oss-security list (Open Source Software Security) http://www.openwall.com/lists/oss-security/&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Yocto Security Team ==&lt;br /&gt;
 &lt;br /&gt;
The purpose of creating a security team in the Yocto project is to discuss, sync and organize security related activities.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The team&#039;s main responsibilities among others are:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
*  Scanning of security forums/mailing list(s) to detect security vulnerabilities reported by community&lt;br /&gt;
*  Responsible for fixing CVEs in the Yocto releases &amp;amp; maintained branches&lt;br /&gt;
*  Evaluation of tools for security tests &lt;br /&gt;
*  Responsible for security related info in the Yocto documentations&lt;br /&gt;
*  Hardening of Yocto release&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;How to Contact Yocto&#039;s security team Securely&#039;&#039;&#039;&lt;br /&gt;
---------------------------------------------&lt;br /&gt;
We have set up two security-related mailing lists:&lt;br /&gt;
*  &#039;&#039;&#039;Public List&#039;&#039;&#039;&lt;br /&gt;
: yocto [dash] security [at] yoctoproject[dot] com&lt;br /&gt;
: This is a public mailing list for anyone to subscribe to. This list is an open list to discuss public security issues/patches.&lt;br /&gt;
&lt;br /&gt;
*  &#039;&#039;&#039;Private List&#039;&#039;&#039;&lt;br /&gt;
: security [at] yoctoprojct [dot] org (Forwards to the following addresses)&lt;br /&gt;
 &lt;br /&gt;
: - &#039;&#039;&#039;sona [dot] sarmadi [at] enea [dot] com&#039;&#039;&#039; &lt;br /&gt;
: - &#039;&#039;&#039;mhalstead [at] linuxfoundation [dot] org&#039;&#039;&#039; &lt;br /&gt;
: For secure communications, please send your messages encrypted to both using the following GPG keys. &lt;br /&gt;
: Remember message headers are not encrypted so do not include sensitive information in the subject line.&lt;br /&gt;
&lt;br /&gt;
: Download public keys: [https://pgp.mit.edu/pks/lookup?op=vindex&amp;amp;search=0x773EF6EF68716A14 Sona Sarmadi] [https://pgp.mit.edu/pks/lookup?op=vindex&amp;amp;search=0x3373170601861969 Michael Halstead]&lt;br /&gt;
&lt;br /&gt;
Anyone can contribute Yocto with security patches as before, but those volunteering to this security team will sync/organize security related activities and take more responsibility&lt;br /&gt;
&lt;br /&gt;
== Branches maintained with security fixes  ==&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! Major version&lt;br /&gt;
! Current Version&lt;br /&gt;
! Branch name&lt;br /&gt;
! BitBake version&lt;br /&gt;
! Maintainer&lt;br /&gt;
|-&lt;br /&gt;
|1.7&lt;br /&gt;
|1.7&lt;br /&gt;
|dizzy&lt;br /&gt;
|1.24&lt;br /&gt;
|Armin Kuster &amp;lt;akuster808@gmail.com&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
|1.6&lt;br /&gt;
|1.6.1&lt;br /&gt;
|daisy&lt;br /&gt;
|1.22&lt;br /&gt;
|Saul Wold &amp;lt;sgw@linux.intel.com&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
|1.5&lt;br /&gt;
|1.5.3&lt;br /&gt;
|dora&lt;br /&gt;
|1.20&lt;br /&gt;
|Robert Yang &amp;lt;liezhi.yang@windriver.com&amp;gt;&lt;br /&gt;
|- style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|1.4&lt;br /&gt;
|1.4.3[https://lists.yoctoproject.org/pipermail/yocto/2014-July/020699.html *]&lt;br /&gt;
|dylan&lt;br /&gt;
|1.18&lt;br /&gt;
|Paul Eggleton &amp;lt;paul.eggleton@linux.intel.com&amp;gt;&lt;br /&gt;
|- style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|1.3&lt;br /&gt;
|1.3.2&lt;br /&gt;
|danny&lt;br /&gt;
|1.16&lt;br /&gt;
|Ross Burton &amp;lt;ross.burton@intel.com&amp;gt;&lt;br /&gt;
|- style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
All CVEs (security patches) should be backported to all branches above (if at all possible). &lt;br /&gt;
Versions in grey are no longer actively maintained, but well-tested security patches may still be accepted for them.) &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
See [https://wiki.yoctoproject.org/wiki/Stable_branch_maintenance Stable branches maintenance]for detailed info regarding the policies and maintenance of Stable branch&lt;br /&gt;
&lt;br /&gt;
== Kernel security patches ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Kernel security patches are backported to Linux-yoco kernels regularly from https://www.kernel.org/&lt;br /&gt;
=== Linux-yocto ===&lt;br /&gt;
linux-yocto_3.10 &amp;amp; linux-yocto_3.14 (maintainer: Ross Burton)&lt;br /&gt;
&lt;br /&gt;
=== Vendor kernels ===&lt;br /&gt;
Kernel security patches are also backported to Linux-vendor kernels from https://www.kernel.org/&lt;br /&gt;
 &lt;br /&gt;
* meta-intel (meta-intel uses Linux-yocto)&lt;br /&gt;
* meta-fsl-ppc (maintainer: xxx)&lt;br /&gt;
* meta-fsl-arm (maintainer: xxx)&lt;br /&gt;
* meta-xilinx (maintainer: xxx)&lt;br /&gt;
* meta-ti (maintainer: xxx)&lt;br /&gt;
* etc&lt;br /&gt;
&lt;br /&gt;
== How to test ==&lt;br /&gt;
 &lt;br /&gt;
If there is any test case for the vulnerability by the upstream project or community&lt;br /&gt;
 - Run the test to reproduce the problem and verify the correction. &lt;br /&gt;
 - Run the regression test&lt;br /&gt;
&lt;br /&gt;
If there isn’t any test case and it is complicated and time consuming to write a testcase&lt;br /&gt;
 - Run the regressions test&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Regression test&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Build the core image for at least two architectures (preferably one big-endian and one little-endian)&lt;br /&gt;
* Run ptest (for those branches/packages that there is ptest mechanism)&lt;br /&gt;
&lt;br /&gt;
== Patch name convention and commit message ==&lt;br /&gt;
Security patches should have reference to the CVE identifier both in the patch file/s and the commit comment.&lt;br /&gt;
&lt;br /&gt;
Please make sure to add the package name in the subject and the reference to the CVE. Example for the commit comment: &lt;br /&gt;
&lt;br /&gt;
    bash: CVE-2014-6278&lt;br /&gt;
    &lt;br /&gt;
    &amp;lt;short description&amp;gt;&lt;br /&gt;
    &lt;br /&gt;
    &amp;lt;[YOCTO #xxx] if there is any&amp;gt;&lt;br /&gt;
    &lt;br /&gt;
    References&lt;br /&gt;
    E.g. [https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6278 link to CVE] or other useful info/blog/advisory.&lt;br /&gt;
    &lt;br /&gt;
    Signed-off-by: &lt;br /&gt;
    &lt;br /&gt;
For additional guidelines refer to: [http://openembedded.org/wiki/Commit_Patch_Message_Guidelines Commit Patch Message Guidelines]&lt;br /&gt;
&lt;br /&gt;
== Some security related links/useful tools ==&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
* [http://www.cvedetails.com CVE details] &lt;br /&gt;
* [http://www.cvedetails.com/vulnerability-list/vendor_id-33/product_id-47/year-2014/Linux-Linux-Kernel.html  CVE list, Linux kernel 2014]&lt;br /&gt;
* [https://www.yoctoproject.org/blogs/andrei-dinu/2013/meta-security-layer-now-available Meta-security-layer]&lt;br /&gt;
* [http://www.yoctoproject.org/docs/1.7/dev-manual/dev-manual.html#making-images-more-secure Making images more secure]&lt;br /&gt;
* [http://cvechecker.sourceforge.net Cvechecker]&lt;br /&gt;
&lt;br /&gt;
== Security Issues Addressed in Yocto Releases ==&lt;br /&gt;
&#039;&#039;&#039;Yocto 1.7.1 - Dizzy&#039;&#039;&#039; &lt;br /&gt;
https://www.yoctoproject.org/downloads/core/dizzy171&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Yocto 1.7 - Dizzy&#039;&#039;&#039; &lt;br /&gt;
https://www.yoctoproject.org/downloads/core/dizzy17&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Yocto 1.6 - Daisy&#039;&#039;&#039; &lt;br /&gt;
https://www.yoctoproject.org/downloads/core/daisy16&lt;/div&gt;</summary>
		<author><name>SonaSarmadi</name></author>
	</entry>
	<entry>
		<id>https://wiki.yoctoproject.org/wiki/index.php?title=Security&amp;diff=14217</id>
		<title>Security</title>
		<link rel="alternate" type="text/html" href="https://wiki.yoctoproject.org/wiki/index.php?title=Security&amp;diff=14217"/>
		<updated>2015-03-02T11:09:08Z</updated>

		<summary type="html">&lt;p&gt;SonaSarmadi: /* Yocto Security Team */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Since the Yocto Project is intended to be flexible and meet the needs of many applications, we leave policy-making decisions around security to our end users. Our goal instead is to ship each release with metadata that follows best practices in that we do not release recipe versions which are known to have significant security vulnerabilities. Generally this is done by upgrading recipes to newer versions that are no longer vulnerable to these issues. &lt;br /&gt;
&lt;br /&gt;
Upgrading recipes to the newer versions in the maintenance branches is not always easy, this is why we provide a patch for the existing version instead if we detect a vulnerability in a package. The patches are added to the recipes, see example below:&lt;br /&gt;
&lt;br /&gt;
  poky/recipes-connectivity/bind/bind_9.9.5.bb&lt;br /&gt;
  &lt;br /&gt;
  SRC_URI = &amp;quot;ftp://ftp.isc.org/isc/bind9/${PV}/${BPN}-${PV}.tar.gz \&lt;br /&gt;
           file://conf.patch \&lt;br /&gt;
           ...&lt;br /&gt;
           file://bind9_9_5-CVE-2014-8500.patch \&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
We are tracking security vulnerabilities in the Yocto Project against the [http://nvd.nist.gov/home.cfm National Vulnerability Database]. &lt;br /&gt;
&lt;br /&gt;
We also track CVEs reported to the oss-security list (Open Source Software Security) http://www.openwall.com/lists/oss-security/&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Yocto Security Team ==&lt;br /&gt;
 &lt;br /&gt;
The purpose of creating a security team in the Yocto project is to discuss, sync and organize security related activities.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The team&#039;s main responsibilities among others are:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
*  Scanning of security forums/mailing list(s) to detect security vulnerabilities reported by community&lt;br /&gt;
*  Responsible for fixing CVEs in the Yocto releases &amp;amp; maintained branches&lt;br /&gt;
*  Evaluation of tools for security tests &lt;br /&gt;
*  Responsible for security related info in the Yocto documentations&lt;br /&gt;
*  Hardening of Yocto release&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;How to Contact Yocto&#039;s security team Securely&#039;&#039;&#039;&lt;br /&gt;
---------------------------------------------&lt;br /&gt;
We have set up two security-related mailing lists:&lt;br /&gt;
#  &#039;&#039;&#039;1) Public List&#039;&#039;&#039;&lt;br /&gt;
yocto [dash] security [at] yoctoproject[dot] com&lt;br /&gt;
This is a public mailing list for anyone to subscribe to. This list is an open list to discuss public security issues/patches.&lt;br /&gt;
&lt;br /&gt;
#  &#039;&#039;&#039;2) Private List&#039;&#039;&#039;&lt;br /&gt;
&#039;&#039;&#039;security [at] yoctoprojct [dot] org&#039;&#039;&#039;. (Forwards to the following addresses.)&lt;br /&gt;
 &lt;br /&gt;
For secure communications, please send your messages encrypted to &#039;&#039;&#039;sona [dot] sarmadi [at] enea [dot] com&#039;&#039;&#039; and &#039;&#039;&#039;mhalstead@linuxfoundation.org&#039;&#039;&#039; using the following GPG keys. Remember message headers are not encrypted so do not include sensitive information in the subject line.&lt;br /&gt;
&lt;br /&gt;
Download public keys: [https://pgp.mit.edu/pks/lookup?op=vindex&amp;amp;search=0x773EF6EF68716A14 Sona Sarmadi] [https://pgp.mit.edu/pks/lookup?op=vindex&amp;amp;search=0x3373170601861969 Michael Halstead]&lt;br /&gt;
&lt;br /&gt;
Anyone can contribute Yocto with security patches as before, but those volunteering to this security team will sync/organize security related activities and take more responsibility&lt;br /&gt;
&lt;br /&gt;
== Branches maintained with security fixes  ==&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! Major version&lt;br /&gt;
! Current Version&lt;br /&gt;
! Branch name&lt;br /&gt;
! BitBake version&lt;br /&gt;
! Maintainer&lt;br /&gt;
|-&lt;br /&gt;
|1.7&lt;br /&gt;
|1.7&lt;br /&gt;
|dizzy&lt;br /&gt;
|1.24&lt;br /&gt;
|Armin Kuster &amp;lt;akuster808@gmail.com&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
|1.6&lt;br /&gt;
|1.6.1&lt;br /&gt;
|daisy&lt;br /&gt;
|1.22&lt;br /&gt;
|Saul Wold &amp;lt;sgw@linux.intel.com&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
|1.5&lt;br /&gt;
|1.5.3&lt;br /&gt;
|dora&lt;br /&gt;
|1.20&lt;br /&gt;
|Robert Yang &amp;lt;liezhi.yang@windriver.com&amp;gt;&lt;br /&gt;
|- style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|1.4&lt;br /&gt;
|1.4.3[https://lists.yoctoproject.org/pipermail/yocto/2014-July/020699.html *]&lt;br /&gt;
|dylan&lt;br /&gt;
|1.18&lt;br /&gt;
|Paul Eggleton &amp;lt;paul.eggleton@linux.intel.com&amp;gt;&lt;br /&gt;
|- style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|1.3&lt;br /&gt;
|1.3.2&lt;br /&gt;
|danny&lt;br /&gt;
|1.16&lt;br /&gt;
|Ross Burton &amp;lt;ross.burton@intel.com&amp;gt;&lt;br /&gt;
|- style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
All CVEs (security patches) should be backported to all branches above (if at all possible). &lt;br /&gt;
Versions in grey are no longer actively maintained, but well-tested security patches may still be accepted for them.) &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
See [https://wiki.yoctoproject.org/wiki/Stable_branch_maintenance Stable branches maintenance]for detailed info regarding the policies and maintenance of Stable branch&lt;br /&gt;
&lt;br /&gt;
== Kernel security patches ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Kernel security patches are backported to Linux-yoco kernels regularly from https://www.kernel.org/&lt;br /&gt;
=== Linux-yocto ===&lt;br /&gt;
linux-yocto_3.10 &amp;amp; linux-yocto_3.14 (maintainer: Ross Burton)&lt;br /&gt;
&lt;br /&gt;
=== Vendor kernels ===&lt;br /&gt;
Kernel security patches are also backported to Linux-vendor kernels from https://www.kernel.org/&lt;br /&gt;
 &lt;br /&gt;
* meta-intel (meta-intel uses Linux-yocto)&lt;br /&gt;
* meta-fsl-ppc (maintainer: xxx)&lt;br /&gt;
* meta-fsl-arm (maintainer: xxx)&lt;br /&gt;
* meta-xilinx (maintainer: xxx)&lt;br /&gt;
* meta-ti (maintainer: xxx)&lt;br /&gt;
* etc&lt;br /&gt;
&lt;br /&gt;
== How to test ==&lt;br /&gt;
 &lt;br /&gt;
If there is any test case for the vulnerability by the upstream project or community&lt;br /&gt;
 - Run the test to reproduce the problem and verify the correction. &lt;br /&gt;
 - Run the regression test&lt;br /&gt;
&lt;br /&gt;
If there isn’t any test case and it is complicated and time consuming to write a testcase&lt;br /&gt;
 - Run the regressions test&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Regression test&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Build the core image for at least two architectures (preferably one big-endian and one little-endian)&lt;br /&gt;
* Run ptest (for those branches/packages that there is ptest mechanism)&lt;br /&gt;
&lt;br /&gt;
== Patch name convention and commit message ==&lt;br /&gt;
Security patches should have reference to the CVE identifier both in the patch file/s and the commit comment.&lt;br /&gt;
&lt;br /&gt;
Please make sure to add the package name in the subject and the reference to the CVE. Example for the commit comment: &lt;br /&gt;
&lt;br /&gt;
    bash: CVE-2014-6278&lt;br /&gt;
    &lt;br /&gt;
    &amp;lt;short description&amp;gt;&lt;br /&gt;
    &lt;br /&gt;
    &amp;lt;[YOCTO #xxx] if there is any&amp;gt;&lt;br /&gt;
    &lt;br /&gt;
    References&lt;br /&gt;
    E.g. [https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6278 link to CVE] or other useful info/blog/advisory.&lt;br /&gt;
    &lt;br /&gt;
    Signed-off-by: &lt;br /&gt;
    &lt;br /&gt;
For additional guidelines refer to: [http://openembedded.org/wiki/Commit_Patch_Message_Guidelines Commit Patch Message Guidelines]&lt;br /&gt;
&lt;br /&gt;
== Some security related links/useful tools ==&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
* [http://www.cvedetails.com CVE details] &lt;br /&gt;
* [http://www.cvedetails.com/vulnerability-list/vendor_id-33/product_id-47/year-2014/Linux-Linux-Kernel.html  CVE list, Linux kernel 2014]&lt;br /&gt;
* [https://www.yoctoproject.org/blogs/andrei-dinu/2013/meta-security-layer-now-available Meta-security-layer]&lt;br /&gt;
* [http://www.yoctoproject.org/docs/1.7/dev-manual/dev-manual.html#making-images-more-secure Making images more secure]&lt;br /&gt;
* [http://cvechecker.sourceforge.net Cvechecker]&lt;br /&gt;
&lt;br /&gt;
== Security Issues Addressed in Yocto Releases ==&lt;br /&gt;
&#039;&#039;&#039;Yocto 1.7.1 - Dizzy&#039;&#039;&#039; &lt;br /&gt;
https://www.yoctoproject.org/downloads/core/dizzy171&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Yocto 1.7 - Dizzy&#039;&#039;&#039; &lt;br /&gt;
https://www.yoctoproject.org/downloads/core/dizzy17&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Yocto 1.6 - Daisy&#039;&#039;&#039; &lt;br /&gt;
https://www.yoctoproject.org/downloads/core/daisy16&lt;/div&gt;</summary>
		<author><name>SonaSarmadi</name></author>
	</entry>
	<entry>
		<id>https://wiki.yoctoproject.org/wiki/index.php?title=Security&amp;diff=14216</id>
		<title>Security</title>
		<link rel="alternate" type="text/html" href="https://wiki.yoctoproject.org/wiki/index.php?title=Security&amp;diff=14216"/>
		<updated>2015-03-02T11:07:10Z</updated>

		<summary type="html">&lt;p&gt;SonaSarmadi: /* Yocto Security Team */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Since the Yocto Project is intended to be flexible and meet the needs of many applications, we leave policy-making decisions around security to our end users. Our goal instead is to ship each release with metadata that follows best practices in that we do not release recipe versions which are known to have significant security vulnerabilities. Generally this is done by upgrading recipes to newer versions that are no longer vulnerable to these issues. &lt;br /&gt;
&lt;br /&gt;
Upgrading recipes to the newer versions in the maintenance branches is not always easy, this is why we provide a patch for the existing version instead if we detect a vulnerability in a package. The patches are added to the recipes, see example below:&lt;br /&gt;
&lt;br /&gt;
  poky/recipes-connectivity/bind/bind_9.9.5.bb&lt;br /&gt;
  &lt;br /&gt;
  SRC_URI = &amp;quot;ftp://ftp.isc.org/isc/bind9/${PV}/${BPN}-${PV}.tar.gz \&lt;br /&gt;
           file://conf.patch \&lt;br /&gt;
           ...&lt;br /&gt;
           file://bind9_9_5-CVE-2014-8500.patch \&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
We are tracking security vulnerabilities in the Yocto Project against the [http://nvd.nist.gov/home.cfm National Vulnerability Database]. &lt;br /&gt;
&lt;br /&gt;
We also track CVEs reported to the oss-security list (Open Source Software Security) http://www.openwall.com/lists/oss-security/&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Yocto Security Team ==&lt;br /&gt;
 &lt;br /&gt;
The purpose of creating a security team in the Yocto project is to discuss, sync and organize security related activities.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The team&#039;s main responsibilities among others are:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
*  Scanning of security forums/mailing list(s) to detect security vulnerabilities reported by community&lt;br /&gt;
*  Responsible for fixing CVEs in the Yocto releases &amp;amp; maintained branches&lt;br /&gt;
*  Evaluation of tools for security tests &lt;br /&gt;
*  Responsible for security related info in the Yocto documentations&lt;br /&gt;
*  Hardening of Yocto release&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;How to Contact Yocto&#039;s security team Securely&#039;&#039;&#039;&lt;br /&gt;
---------------------------------------------&lt;br /&gt;
We have set up two security-related mailing lists:&lt;br /&gt;
1) Public List&lt;br /&gt;
yocto [dash] security [at] yoctoproject[dot] com&lt;br /&gt;
This is a public mailing list for anyone to subscribe to. This list is an open list to discuss public security issues/patches.&lt;br /&gt;
&lt;br /&gt;
2) Private List&lt;br /&gt;
&#039;&#039;&#039;security [at] yoctoprojct [dot] org&#039;&#039;&#039;. (Forwards to the following addresses.)&lt;br /&gt;
 &lt;br /&gt;
For secure communications, please send your messages encrypted to &#039;&#039;&#039;sona [dot] sarmadi [at] enea [dot] com&#039;&#039;&#039; and &#039;&#039;&#039;mhalstead@linuxfoundation.org&#039;&#039;&#039; using the following GPG keys. Remember message headers are not encrypted so do not include sensitive information in the subject line.&lt;br /&gt;
&lt;br /&gt;
Download public keys: [https://pgp.mit.edu/pks/lookup?op=vindex&amp;amp;search=0x773EF6EF68716A14 Sona Sarmadi] [https://pgp.mit.edu/pks/lookup?op=vindex&amp;amp;search=0x3373170601861969 Michael Halstead]&lt;br /&gt;
&lt;br /&gt;
Anyone can contribute Yocto with security patches as before, but those volunteering to this security team will sync/organize security related activities and take more responsibility&lt;br /&gt;
&lt;br /&gt;
== Branches maintained with security fixes  ==&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! Major version&lt;br /&gt;
! Current Version&lt;br /&gt;
! Branch name&lt;br /&gt;
! BitBake version&lt;br /&gt;
! Maintainer&lt;br /&gt;
|-&lt;br /&gt;
|1.7&lt;br /&gt;
|1.7&lt;br /&gt;
|dizzy&lt;br /&gt;
|1.24&lt;br /&gt;
|Armin Kuster &amp;lt;akuster808@gmail.com&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
|1.6&lt;br /&gt;
|1.6.1&lt;br /&gt;
|daisy&lt;br /&gt;
|1.22&lt;br /&gt;
|Saul Wold &amp;lt;sgw@linux.intel.com&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
|1.5&lt;br /&gt;
|1.5.3&lt;br /&gt;
|dora&lt;br /&gt;
|1.20&lt;br /&gt;
|Robert Yang &amp;lt;liezhi.yang@windriver.com&amp;gt;&lt;br /&gt;
|- style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|1.4&lt;br /&gt;
|1.4.3[https://lists.yoctoproject.org/pipermail/yocto/2014-July/020699.html *]&lt;br /&gt;
|dylan&lt;br /&gt;
|1.18&lt;br /&gt;
|Paul Eggleton &amp;lt;paul.eggleton@linux.intel.com&amp;gt;&lt;br /&gt;
|- style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|1.3&lt;br /&gt;
|1.3.2&lt;br /&gt;
|danny&lt;br /&gt;
|1.16&lt;br /&gt;
|Ross Burton &amp;lt;ross.burton@intel.com&amp;gt;&lt;br /&gt;
|- style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
All CVEs (security patches) should be backported to all branches above (if at all possible). &lt;br /&gt;
Versions in grey are no longer actively maintained, but well-tested security patches may still be accepted for them.) &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
See [https://wiki.yoctoproject.org/wiki/Stable_branch_maintenance Stable branches maintenance]for detailed info regarding the policies and maintenance of Stable branch&lt;br /&gt;
&lt;br /&gt;
== Kernel security patches ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Kernel security patches are backported to Linux-yoco kernels regularly from https://www.kernel.org/&lt;br /&gt;
=== Linux-yocto ===&lt;br /&gt;
linux-yocto_3.10 &amp;amp; linux-yocto_3.14 (maintainer: Ross Burton)&lt;br /&gt;
&lt;br /&gt;
=== Vendor kernels ===&lt;br /&gt;
Kernel security patches are also backported to Linux-vendor kernels from https://www.kernel.org/&lt;br /&gt;
 &lt;br /&gt;
* meta-intel (meta-intel uses Linux-yocto)&lt;br /&gt;
* meta-fsl-ppc (maintainer: xxx)&lt;br /&gt;
* meta-fsl-arm (maintainer: xxx)&lt;br /&gt;
* meta-xilinx (maintainer: xxx)&lt;br /&gt;
* meta-ti (maintainer: xxx)&lt;br /&gt;
* etc&lt;br /&gt;
&lt;br /&gt;
== How to test ==&lt;br /&gt;
 &lt;br /&gt;
If there is any test case for the vulnerability by the upstream project or community&lt;br /&gt;
 - Run the test to reproduce the problem and verify the correction. &lt;br /&gt;
 - Run the regression test&lt;br /&gt;
&lt;br /&gt;
If there isn’t any test case and it is complicated and time consuming to write a testcase&lt;br /&gt;
 - Run the regressions test&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Regression test&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Build the core image for at least two architectures (preferably one big-endian and one little-endian)&lt;br /&gt;
* Run ptest (for those branches/packages that there is ptest mechanism)&lt;br /&gt;
&lt;br /&gt;
== Patch name convention and commit message ==&lt;br /&gt;
Security patches should have reference to the CVE identifier both in the patch file/s and the commit comment.&lt;br /&gt;
&lt;br /&gt;
Please make sure to add the package name in the subject and the reference to the CVE. Example for the commit comment: &lt;br /&gt;
&lt;br /&gt;
    bash: CVE-2014-6278&lt;br /&gt;
    &lt;br /&gt;
    &amp;lt;short description&amp;gt;&lt;br /&gt;
    &lt;br /&gt;
    &amp;lt;[YOCTO #xxx] if there is any&amp;gt;&lt;br /&gt;
    &lt;br /&gt;
    References&lt;br /&gt;
    E.g. [https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6278 link to CVE] or other useful info/blog/advisory.&lt;br /&gt;
    &lt;br /&gt;
    Signed-off-by: &lt;br /&gt;
    &lt;br /&gt;
For additional guidelines refer to: [http://openembedded.org/wiki/Commit_Patch_Message_Guidelines Commit Patch Message Guidelines]&lt;br /&gt;
&lt;br /&gt;
== Some security related links/useful tools ==&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
* [http://www.cvedetails.com CVE details] &lt;br /&gt;
* [http://www.cvedetails.com/vulnerability-list/vendor_id-33/product_id-47/year-2014/Linux-Linux-Kernel.html  CVE list, Linux kernel 2014]&lt;br /&gt;
* [https://www.yoctoproject.org/blogs/andrei-dinu/2013/meta-security-layer-now-available Meta-security-layer]&lt;br /&gt;
* [http://www.yoctoproject.org/docs/1.7/dev-manual/dev-manual.html#making-images-more-secure Making images more secure]&lt;br /&gt;
* [http://cvechecker.sourceforge.net Cvechecker]&lt;br /&gt;
&lt;br /&gt;
== Security Issues Addressed in Yocto Releases ==&lt;br /&gt;
&#039;&#039;&#039;Yocto 1.7.1 - Dizzy&#039;&#039;&#039; &lt;br /&gt;
https://www.yoctoproject.org/downloads/core/dizzy171&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Yocto 1.7 - Dizzy&#039;&#039;&#039; &lt;br /&gt;
https://www.yoctoproject.org/downloads/core/dizzy17&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Yocto 1.6 - Daisy&#039;&#039;&#039; &lt;br /&gt;
https://www.yoctoproject.org/downloads/core/daisy16&lt;/div&gt;</summary>
		<author><name>SonaSarmadi</name></author>
	</entry>
	<entry>
		<id>https://wiki.yoctoproject.org/wiki/index.php?title=Security&amp;diff=14210</id>
		<title>Security</title>
		<link rel="alternate" type="text/html" href="https://wiki.yoctoproject.org/wiki/index.php?title=Security&amp;diff=14210"/>
		<updated>2015-02-26T09:37:52Z</updated>

		<summary type="html">&lt;p&gt;SonaSarmadi: /* Yocto Security Team */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Since the Yocto Project is intended to be flexible and meet the needs of many applications, we leave policy-making decisions around security to our end users. Our goal instead is to ship each release with metadata that follows best practices in that we do not release recipe versions which are known to have significant security vulnerabilities. Generally this is done by upgrading recipes to newer versions that are no longer vulnerable to these issues. &lt;br /&gt;
&lt;br /&gt;
Upgrading recipes to the newer versions in the maintenance branches is not always easy, this is why we provide a patch for the existing version instead if we detect a vulnerability in a package. The patches are added to the recipes, see example below:&lt;br /&gt;
&lt;br /&gt;
  poky/recipes-connectivity/bind/bind_9.9.5.bb&lt;br /&gt;
  &lt;br /&gt;
  SRC_URI = &amp;quot;ftp://ftp.isc.org/isc/bind9/${PV}/${BPN}-${PV}.tar.gz \&lt;br /&gt;
           file://conf.patch \&lt;br /&gt;
           ...&lt;br /&gt;
           file://bind9_9_5-CVE-2014-8500.patch \&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
We are tracking security vulnerabilities in the Yocto Project against the [http://nvd.nist.gov/home.cfm National Vulnerability Database]. &lt;br /&gt;
&lt;br /&gt;
We also track CVEs reported to the oss-security list (Open Source Software Security) http://www.openwall.com/lists/oss-security/&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Yocto Security Team ==&lt;br /&gt;
 &lt;br /&gt;
The purpose of creating a security team in the Yocto project is to discuss, sync and organize security related activities.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The team&#039;s main responsibilities among others are:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
*  Scanning of security forums/mailing list(s) to detect security vulnerabilities reported by community&lt;br /&gt;
*  Responsible for fixing CVEs in the Yocto releases &amp;amp; maintained branches&lt;br /&gt;
*  Evaluation of tools for security tests &lt;br /&gt;
*  Responsible for security related info in the Yocto documentations&lt;br /&gt;
*  Hardening of Yocto release&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;How to Contact Yocto&#039;s security team Securely&#039;&#039;&#039;&lt;br /&gt;
---------------------------------------------&lt;br /&gt;
Please send private vulnerability reports to &#039;&#039;&#039;security [at] yoctoprojct [dot] org&#039;&#039;&#039;.&lt;br /&gt;
 &lt;br /&gt;
For secure communications, send your messages encrypted to &#039;&#039;&#039;sona [dot] sarmadi [at] enea [dot] com&#039;&#039;&#039; using the following GPG key:&lt;br /&gt;
&lt;br /&gt;
Download public key: [https://pgp.mit.edu/pks/lookup?op=vindex&amp;amp;search=0x773EF6EF68716A14 pgp.mit.edu]&lt;br /&gt;
&lt;br /&gt;
Anyone can contribute Yocto with security patches as before, but those volunteering to this security team will sync/organize security related activities and take more responsibility&lt;br /&gt;
&lt;br /&gt;
== Branches maintained with security fixes  ==&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! Major version&lt;br /&gt;
! Current Version&lt;br /&gt;
! Branch name&lt;br /&gt;
! BitBake version&lt;br /&gt;
! Maintainer&lt;br /&gt;
|-&lt;br /&gt;
|1.7&lt;br /&gt;
|1.7&lt;br /&gt;
|dizzy&lt;br /&gt;
|1.24&lt;br /&gt;
|Armin Kuster &amp;lt;akuster808@gmail.com&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
|1.6&lt;br /&gt;
|1.6.1&lt;br /&gt;
|daisy&lt;br /&gt;
|1.22&lt;br /&gt;
|Saul Wold &amp;lt;sgw@linux.intel.com&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
|1.5&lt;br /&gt;
|1.5.3&lt;br /&gt;
|dora&lt;br /&gt;
|1.20&lt;br /&gt;
|Robert Yang &amp;lt;liezhi.yang@windriver.com&amp;gt;&lt;br /&gt;
|- style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|1.4&lt;br /&gt;
|1.4.3[https://lists.yoctoproject.org/pipermail/yocto/2014-July/020699.html *]&lt;br /&gt;
|dylan&lt;br /&gt;
|1.18&lt;br /&gt;
|Paul Eggleton &amp;lt;paul.eggleton@linux.intel.com&amp;gt;&lt;br /&gt;
|- style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|1.3&lt;br /&gt;
|1.3.2&lt;br /&gt;
|danny&lt;br /&gt;
|1.16&lt;br /&gt;
|Ross Burton &amp;lt;ross.burton@intel.com&amp;gt;&lt;br /&gt;
|- style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
All CVEs (security patches) should be backported to all branches above (if at all possible). &lt;br /&gt;
Versions in grey are no longer actively maintained, but well-tested security patches may still be accepted for them.) &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
See [https://wiki.yoctoproject.org/wiki/Stable_branch_maintenance Stable branches maintenance]for detailed info regarding the policies and maintenance of Stable branch&lt;br /&gt;
&lt;br /&gt;
== Kernel security patches ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Kernel security patches are backported to Linux-yoco kernels regularly from https://www.kernel.org/&lt;br /&gt;
=== Linux-yocto ===&lt;br /&gt;
linux-yocto_3.10 &amp;amp; linux-yocto_3.14 (maintainer: Ross Burton)&lt;br /&gt;
&lt;br /&gt;
=== Vendor kernels ===&lt;br /&gt;
Kernel security patches are also backported to Linux-vendor kernels from https://www.kernel.org/&lt;br /&gt;
 &lt;br /&gt;
* meta-intel (meta-intel uses Linux-yocto)&lt;br /&gt;
* meta-fsl-ppc (maintainer: xxx)&lt;br /&gt;
* meta-fsl-arm (maintainer: xxx)&lt;br /&gt;
* meta-xilinx (maintainer: xxx)&lt;br /&gt;
* meta-ti (maintainer: xxx)&lt;br /&gt;
* etc&lt;br /&gt;
&lt;br /&gt;
== How to test ==&lt;br /&gt;
 &lt;br /&gt;
If there is any test case for the vulnerability by the upstream project or community&lt;br /&gt;
 - Run the test to reproduce the problem and verify the correction. &lt;br /&gt;
 - Run the regression test&lt;br /&gt;
&lt;br /&gt;
If there isn’t any test case and it is complicated and time consuming to write a testcase&lt;br /&gt;
 - Run the regressions test&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Regression test&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Build the core image for at least two architectures (preferably one big-endian and one little-endian)&lt;br /&gt;
* Run ptest (for those branches/packages that there is ptest mechanism)&lt;br /&gt;
&lt;br /&gt;
== Patch name convention and commit message ==&lt;br /&gt;
Security patches should have reference to the CVE identifier both in the patch file/s and the commit comment.&lt;br /&gt;
&lt;br /&gt;
Please make sure to add the package name in the subject and the reference to the CVE. Example for the commit comment: &lt;br /&gt;
&lt;br /&gt;
    bash: CVE-2014-6278&lt;br /&gt;
    &lt;br /&gt;
    &amp;lt;short description&amp;gt;&lt;br /&gt;
    &lt;br /&gt;
    &amp;lt;[YOCTO #xxx] if there is any&amp;gt;&lt;br /&gt;
    &lt;br /&gt;
    References&lt;br /&gt;
    E.g. [https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6278 link to CVE] or other useful info/blog/advisory.&lt;br /&gt;
    &lt;br /&gt;
    Signed-off-by: &lt;br /&gt;
    &lt;br /&gt;
For additional guidelines refer to: [http://openembedded.org/wiki/Commit_Patch_Message_Guidelines Commit Patch Message Guidelines]&lt;br /&gt;
&lt;br /&gt;
== Some security related links/useful tools ==&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
* [http://www.cvedetails.com CVE details] &lt;br /&gt;
* [http://www.cvedetails.com/vulnerability-list/vendor_id-33/product_id-47/year-2014/Linux-Linux-Kernel.html  CVE list, Linux kernel 2014]&lt;br /&gt;
* [https://www.yoctoproject.org/blogs/andrei-dinu/2013/meta-security-layer-now-available Meta-security-layer]&lt;br /&gt;
* [http://www.yoctoproject.org/docs/1.7/dev-manual/dev-manual.html#making-images-more-secure Making images more secure]&lt;br /&gt;
* [http://cvechecker.sourceforge.net Cvechecker]&lt;br /&gt;
&lt;br /&gt;
== Security Issues Addressed in Yocto Releases ==&lt;br /&gt;
&#039;&#039;&#039;Yocto 1.7.1 - Dizzy&#039;&#039;&#039; &lt;br /&gt;
https://www.yoctoproject.org/downloads/core/dizzy171&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Yocto 1.7 - Dizzy&#039;&#039;&#039; &lt;br /&gt;
https://www.yoctoproject.org/downloads/core/dizzy17&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Yocto 1.6 - Daisy&#039;&#039;&#039; &lt;br /&gt;
https://www.yoctoproject.org/downloads/core/daisy16&lt;/div&gt;</summary>
		<author><name>SonaSarmadi</name></author>
	</entry>
	<entry>
		<id>https://wiki.yoctoproject.org/wiki/index.php?title=Security&amp;diff=14209</id>
		<title>Security</title>
		<link rel="alternate" type="text/html" href="https://wiki.yoctoproject.org/wiki/index.php?title=Security&amp;diff=14209"/>
		<updated>2015-02-26T09:36:00Z</updated>

		<summary type="html">&lt;p&gt;SonaSarmadi: /* Yocto Security Team */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Since the Yocto Project is intended to be flexible and meet the needs of many applications, we leave policy-making decisions around security to our end users. Our goal instead is to ship each release with metadata that follows best practices in that we do not release recipe versions which are known to have significant security vulnerabilities. Generally this is done by upgrading recipes to newer versions that are no longer vulnerable to these issues. &lt;br /&gt;
&lt;br /&gt;
Upgrading recipes to the newer versions in the maintenance branches is not always easy, this is why we provide a patch for the existing version instead if we detect a vulnerability in a package. The patches are added to the recipes, see example below:&lt;br /&gt;
&lt;br /&gt;
  poky/recipes-connectivity/bind/bind_9.9.5.bb&lt;br /&gt;
  &lt;br /&gt;
  SRC_URI = &amp;quot;ftp://ftp.isc.org/isc/bind9/${PV}/${BPN}-${PV}.tar.gz \&lt;br /&gt;
           file://conf.patch \&lt;br /&gt;
           ...&lt;br /&gt;
           file://bind9_9_5-CVE-2014-8500.patch \&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
We are tracking security vulnerabilities in the Yocto Project against the [http://nvd.nist.gov/home.cfm National Vulnerability Database]. &lt;br /&gt;
&lt;br /&gt;
We also track CVEs reported to the oss-security list (Open Source Software Security) http://www.openwall.com/lists/oss-security/&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Yocto Security Team ==&lt;br /&gt;
 &lt;br /&gt;
The purpose of creating a security team in the Yocto project is to discuss, sync and organize security related activities.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The team&#039;s main responsibilities among others are:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
*  Scanning of security forums/mailing list(s) to detect security vulnerabilities reported by community&lt;br /&gt;
*  Responsible for fixing CVEs in the Yocto releases &amp;amp; maintained branches&lt;br /&gt;
*  Evaluation of tools for security tests &lt;br /&gt;
*  Responsible for security related info in the Yocto documentations&lt;br /&gt;
*  Hardening of Yocto release&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;How to Contact Yocto&#039;s security team Securely&#039;&#039;&#039;&lt;br /&gt;
---------------------------------------------&lt;br /&gt;
Please send private vulnerability reports to &#039;&#039;&#039;security[at]yoctoprojct[dot]org&#039;&#039;&#039;.&lt;br /&gt;
 &lt;br /&gt;
For secure communications, send your messages encrypted to &#039;&#039;&#039;sona[dot]sarmadi[at]enea[dot]com&#039;&#039;&#039; using the following GPG key:&lt;br /&gt;
&lt;br /&gt;
Download public key: [https://pgp.mit.edu/pks/lookup?op=vindex&amp;amp;search=0x773EF6EF68716A14 pgp.mit.edu]&lt;br /&gt;
&lt;br /&gt;
Anyone can contribute Yocto with security patches as before, but those volunteering to this security team will sync/organize security related activities and take more responsibility&lt;br /&gt;
&lt;br /&gt;
== Branches maintained with security fixes  ==&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! Major version&lt;br /&gt;
! Current Version&lt;br /&gt;
! Branch name&lt;br /&gt;
! BitBake version&lt;br /&gt;
! Maintainer&lt;br /&gt;
|-&lt;br /&gt;
|1.7&lt;br /&gt;
|1.7&lt;br /&gt;
|dizzy&lt;br /&gt;
|1.24&lt;br /&gt;
|Armin Kuster &amp;lt;akuster808@gmail.com&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
|1.6&lt;br /&gt;
|1.6.1&lt;br /&gt;
|daisy&lt;br /&gt;
|1.22&lt;br /&gt;
|Saul Wold &amp;lt;sgw@linux.intel.com&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
|1.5&lt;br /&gt;
|1.5.3&lt;br /&gt;
|dora&lt;br /&gt;
|1.20&lt;br /&gt;
|Robert Yang &amp;lt;liezhi.yang@windriver.com&amp;gt;&lt;br /&gt;
|- style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|1.4&lt;br /&gt;
|1.4.3[https://lists.yoctoproject.org/pipermail/yocto/2014-July/020699.html *]&lt;br /&gt;
|dylan&lt;br /&gt;
|1.18&lt;br /&gt;
|Paul Eggleton &amp;lt;paul.eggleton@linux.intel.com&amp;gt;&lt;br /&gt;
|- style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|1.3&lt;br /&gt;
|1.3.2&lt;br /&gt;
|danny&lt;br /&gt;
|1.16&lt;br /&gt;
|Ross Burton &amp;lt;ross.burton@intel.com&amp;gt;&lt;br /&gt;
|- style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
All CVEs (security patches) should be backported to all branches above (if at all possible). &lt;br /&gt;
Versions in grey are no longer actively maintained, but well-tested security patches may still be accepted for them.) &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
See [https://wiki.yoctoproject.org/wiki/Stable_branch_maintenance Stable branches maintenance]for detailed info regarding the policies and maintenance of Stable branch&lt;br /&gt;
&lt;br /&gt;
== Kernel security patches ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Kernel security patches are backported to Linux-yoco kernels regularly from https://www.kernel.org/&lt;br /&gt;
=== Linux-yocto ===&lt;br /&gt;
linux-yocto_3.10 &amp;amp; linux-yocto_3.14 (maintainer: Ross Burton)&lt;br /&gt;
&lt;br /&gt;
=== Vendor kernels ===&lt;br /&gt;
Kernel security patches are also backported to Linux-vendor kernels from https://www.kernel.org/&lt;br /&gt;
 &lt;br /&gt;
* meta-intel (meta-intel uses Linux-yocto)&lt;br /&gt;
* meta-fsl-ppc (maintainer: xxx)&lt;br /&gt;
* meta-fsl-arm (maintainer: xxx)&lt;br /&gt;
* meta-xilinx (maintainer: xxx)&lt;br /&gt;
* meta-ti (maintainer: xxx)&lt;br /&gt;
* etc&lt;br /&gt;
&lt;br /&gt;
== How to test ==&lt;br /&gt;
 &lt;br /&gt;
If there is any test case for the vulnerability by the upstream project or community&lt;br /&gt;
 - Run the test to reproduce the problem and verify the correction. &lt;br /&gt;
 - Run the regression test&lt;br /&gt;
&lt;br /&gt;
If there isn’t any test case and it is complicated and time consuming to write a testcase&lt;br /&gt;
 - Run the regressions test&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Regression test&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Build the core image for at least two architectures (preferably one big-endian and one little-endian)&lt;br /&gt;
* Run ptest (for those branches/packages that there is ptest mechanism)&lt;br /&gt;
&lt;br /&gt;
== Patch name convention and commit message ==&lt;br /&gt;
Security patches should have reference to the CVE identifier both in the patch file/s and the commit comment.&lt;br /&gt;
&lt;br /&gt;
Please make sure to add the package name in the subject and the reference to the CVE. Example for the commit comment: &lt;br /&gt;
&lt;br /&gt;
    bash: CVE-2014-6278&lt;br /&gt;
    &lt;br /&gt;
    &amp;lt;short description&amp;gt;&lt;br /&gt;
    &lt;br /&gt;
    &amp;lt;[YOCTO #xxx] if there is any&amp;gt;&lt;br /&gt;
    &lt;br /&gt;
    References&lt;br /&gt;
    E.g. [https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6278 link to CVE] or other useful info/blog/advisory.&lt;br /&gt;
    &lt;br /&gt;
    Signed-off-by: &lt;br /&gt;
    &lt;br /&gt;
For additional guidelines refer to: [http://openembedded.org/wiki/Commit_Patch_Message_Guidelines Commit Patch Message Guidelines]&lt;br /&gt;
&lt;br /&gt;
== Some security related links/useful tools ==&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
* [http://www.cvedetails.com CVE details] &lt;br /&gt;
* [http://www.cvedetails.com/vulnerability-list/vendor_id-33/product_id-47/year-2014/Linux-Linux-Kernel.html  CVE list, Linux kernel 2014]&lt;br /&gt;
* [https://www.yoctoproject.org/blogs/andrei-dinu/2013/meta-security-layer-now-available Meta-security-layer]&lt;br /&gt;
* [http://www.yoctoproject.org/docs/1.7/dev-manual/dev-manual.html#making-images-more-secure Making images more secure]&lt;br /&gt;
* [http://cvechecker.sourceforge.net Cvechecker]&lt;br /&gt;
&lt;br /&gt;
== Security Issues Addressed in Yocto Releases ==&lt;br /&gt;
&#039;&#039;&#039;Yocto 1.7.1 - Dizzy&#039;&#039;&#039; &lt;br /&gt;
https://www.yoctoproject.org/downloads/core/dizzy171&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Yocto 1.7 - Dizzy&#039;&#039;&#039; &lt;br /&gt;
https://www.yoctoproject.org/downloads/core/dizzy17&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Yocto 1.6 - Daisy&#039;&#039;&#039; &lt;br /&gt;
https://www.yoctoproject.org/downloads/core/daisy16&lt;/div&gt;</summary>
		<author><name>SonaSarmadi</name></author>
	</entry>
	<entry>
		<id>https://wiki.yoctoproject.org/wiki/index.php?title=Security&amp;diff=14208</id>
		<title>Security</title>
		<link rel="alternate" type="text/html" href="https://wiki.yoctoproject.org/wiki/index.php?title=Security&amp;diff=14208"/>
		<updated>2015-02-25T12:50:21Z</updated>

		<summary type="html">&lt;p&gt;SonaSarmadi: /* Yocto Security Team */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Since the Yocto Project is intended to be flexible and meet the needs of many applications, we leave policy-making decisions around security to our end users. Our goal instead is to ship each release with metadata that follows best practices in that we do not release recipe versions which are known to have significant security vulnerabilities. Generally this is done by upgrading recipes to newer versions that are no longer vulnerable to these issues. &lt;br /&gt;
&lt;br /&gt;
Upgrading recipes to the newer versions in the maintenance branches is not always easy, this is why we provide a patch for the existing version instead if we detect a vulnerability in a package. The patches are added to the recipes, see example below:&lt;br /&gt;
&lt;br /&gt;
  poky/recipes-connectivity/bind/bind_9.9.5.bb&lt;br /&gt;
  &lt;br /&gt;
  SRC_URI = &amp;quot;ftp://ftp.isc.org/isc/bind9/${PV}/${BPN}-${PV}.tar.gz \&lt;br /&gt;
           file://conf.patch \&lt;br /&gt;
           ...&lt;br /&gt;
           file://bind9_9_5-CVE-2014-8500.patch \&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
We are tracking security vulnerabilities in the Yocto Project against the [http://nvd.nist.gov/home.cfm National Vulnerability Database]. &lt;br /&gt;
&lt;br /&gt;
We also track CVEs reported to the oss-security list (Open Source Software Security) http://www.openwall.com/lists/oss-security/&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Yocto Security Team ==&lt;br /&gt;
 &lt;br /&gt;
The purpose of creating a security team in the Yocto project is to discuss, sync and organize security related activities.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The team&#039;s main responsibilities among others are:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
*  Scanning of security forums/mailing list(s) to detect security vulnerabilities reported by community&lt;br /&gt;
*  Responsible for fixing CVEs in the Yocto releases &amp;amp; maintained branches&lt;br /&gt;
*  Evaluation of tools for security tests &lt;br /&gt;
*  Responsible for security related info in the Yocto documentations&lt;br /&gt;
*  Hardening of Yocto release&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;How to Contact Yocto&#039;s security team Securely&#039;&#039;&#039;&lt;br /&gt;
---------------------------------------------&lt;br /&gt;
Please send private vulnerability reports to &#039;&#039;&#039;security@yoctoprojct.org&#039;&#039;&#039;.&lt;br /&gt;
 &lt;br /&gt;
For secure communications, send your messages encrypted to &#039;&#039;&#039;sona.sarmadi@enea.com&#039;&#039;&#039; using the following GPG key:&lt;br /&gt;
&lt;br /&gt;
Download public key: [https://pgp.mit.edu/pks/lookup?op=vindex&amp;amp;search=0x773EF6EF68716A14 pgp.mit.edu]&lt;br /&gt;
&lt;br /&gt;
Anyone can contribute Yocto with security patches as before, but those volunteering to this security team will sync/organize security related activities and take more responsibility&lt;br /&gt;
&lt;br /&gt;
== Branches maintained with security fixes  ==&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! Major version&lt;br /&gt;
! Current Version&lt;br /&gt;
! Branch name&lt;br /&gt;
! BitBake version&lt;br /&gt;
! Maintainer&lt;br /&gt;
|-&lt;br /&gt;
|1.7&lt;br /&gt;
|1.7&lt;br /&gt;
|dizzy&lt;br /&gt;
|1.24&lt;br /&gt;
|Armin Kuster &amp;lt;akuster808@gmail.com&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
|1.6&lt;br /&gt;
|1.6.1&lt;br /&gt;
|daisy&lt;br /&gt;
|1.22&lt;br /&gt;
|Saul Wold &amp;lt;sgw@linux.intel.com&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
|1.5&lt;br /&gt;
|1.5.3&lt;br /&gt;
|dora&lt;br /&gt;
|1.20&lt;br /&gt;
|Robert Yang &amp;lt;liezhi.yang@windriver.com&amp;gt;&lt;br /&gt;
|- style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|1.4&lt;br /&gt;
|1.4.3[https://lists.yoctoproject.org/pipermail/yocto/2014-July/020699.html *]&lt;br /&gt;
|dylan&lt;br /&gt;
|1.18&lt;br /&gt;
|Paul Eggleton &amp;lt;paul.eggleton@linux.intel.com&amp;gt;&lt;br /&gt;
|- style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|1.3&lt;br /&gt;
|1.3.2&lt;br /&gt;
|danny&lt;br /&gt;
|1.16&lt;br /&gt;
|Ross Burton &amp;lt;ross.burton@intel.com&amp;gt;&lt;br /&gt;
|- style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
All CVEs (security patches) should be backported to all branches above (if at all possible). &lt;br /&gt;
Versions in grey are no longer actively maintained, but well-tested security patches may still be accepted for them.) &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
See [https://wiki.yoctoproject.org/wiki/Stable_branch_maintenance Stable branches maintenance]for detailed info regarding the policies and maintenance of Stable branch&lt;br /&gt;
&lt;br /&gt;
== Kernel security patches ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Kernel security patches are backported to Linux-yoco kernels regularly from https://www.kernel.org/&lt;br /&gt;
=== Linux-yocto ===&lt;br /&gt;
linux-yocto_3.10 &amp;amp; linux-yocto_3.14 (maintainer: Ross Burton)&lt;br /&gt;
&lt;br /&gt;
=== Vendor kernels ===&lt;br /&gt;
Kernel security patches are also backported to Linux-vendor kernels from https://www.kernel.org/&lt;br /&gt;
 &lt;br /&gt;
* meta-intel (meta-intel uses Linux-yocto)&lt;br /&gt;
* meta-fsl-ppc (maintainer: xxx)&lt;br /&gt;
* meta-fsl-arm (maintainer: xxx)&lt;br /&gt;
* meta-xilinx (maintainer: xxx)&lt;br /&gt;
* meta-ti (maintainer: xxx)&lt;br /&gt;
* etc&lt;br /&gt;
&lt;br /&gt;
== How to test ==&lt;br /&gt;
 &lt;br /&gt;
If there is any test case for the vulnerability by the upstream project or community&lt;br /&gt;
 - Run the test to reproduce the problem and verify the correction. &lt;br /&gt;
 - Run the regression test&lt;br /&gt;
&lt;br /&gt;
If there isn’t any test case and it is complicated and time consuming to write a testcase&lt;br /&gt;
 - Run the regressions test&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Regression test&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Build the core image for at least two architectures (preferably one big-endian and one little-endian)&lt;br /&gt;
* Run ptest (for those branches/packages that there is ptest mechanism)&lt;br /&gt;
&lt;br /&gt;
== Patch name convention and commit message ==&lt;br /&gt;
Security patches should have reference to the CVE identifier both in the patch file/s and the commit comment.&lt;br /&gt;
&lt;br /&gt;
Please make sure to add the package name in the subject and the reference to the CVE. Example for the commit comment: &lt;br /&gt;
&lt;br /&gt;
    bash: CVE-2014-6278&lt;br /&gt;
    &lt;br /&gt;
    &amp;lt;short description&amp;gt;&lt;br /&gt;
    &lt;br /&gt;
    &amp;lt;[YOCTO #xxx] if there is any&amp;gt;&lt;br /&gt;
    &lt;br /&gt;
    References&lt;br /&gt;
    E.g. [https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6278 link to CVE] or other useful info/blog/advisory.&lt;br /&gt;
    &lt;br /&gt;
    Signed-off-by: &lt;br /&gt;
    &lt;br /&gt;
For additional guidelines refer to: [http://openembedded.org/wiki/Commit_Patch_Message_Guidelines Commit Patch Message Guidelines]&lt;br /&gt;
&lt;br /&gt;
== Some security related links/useful tools ==&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
* [http://www.cvedetails.com CVE details] &lt;br /&gt;
* [http://www.cvedetails.com/vulnerability-list/vendor_id-33/product_id-47/year-2014/Linux-Linux-Kernel.html  CVE list, Linux kernel 2014]&lt;br /&gt;
* [https://www.yoctoproject.org/blogs/andrei-dinu/2013/meta-security-layer-now-available Meta-security-layer]&lt;br /&gt;
* [http://www.yoctoproject.org/docs/1.7/dev-manual/dev-manual.html#making-images-more-secure Making images more secure]&lt;br /&gt;
* [http://cvechecker.sourceforge.net Cvechecker]&lt;br /&gt;
&lt;br /&gt;
== Security Issues Addressed in Yocto Releases ==&lt;br /&gt;
&#039;&#039;&#039;Yocto 1.7.1 - Dizzy&#039;&#039;&#039; &lt;br /&gt;
https://www.yoctoproject.org/downloads/core/dizzy171&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Yocto 1.7 - Dizzy&#039;&#039;&#039; &lt;br /&gt;
https://www.yoctoproject.org/downloads/core/dizzy17&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Yocto 1.6 - Daisy&#039;&#039;&#039; &lt;br /&gt;
https://www.yoctoproject.org/downloads/core/daisy16&lt;/div&gt;</summary>
		<author><name>SonaSarmadi</name></author>
	</entry>
	<entry>
		<id>https://wiki.yoctoproject.org/wiki/index.php?title=Security&amp;diff=14207</id>
		<title>Security</title>
		<link rel="alternate" type="text/html" href="https://wiki.yoctoproject.org/wiki/index.php?title=Security&amp;diff=14207"/>
		<updated>2015-02-25T12:49:55Z</updated>

		<summary type="html">&lt;p&gt;SonaSarmadi: /* Yocto Security Team */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Since the Yocto Project is intended to be flexible and meet the needs of many applications, we leave policy-making decisions around security to our end users. Our goal instead is to ship each release with metadata that follows best practices in that we do not release recipe versions which are known to have significant security vulnerabilities. Generally this is done by upgrading recipes to newer versions that are no longer vulnerable to these issues. &lt;br /&gt;
&lt;br /&gt;
Upgrading recipes to the newer versions in the maintenance branches is not always easy, this is why we provide a patch for the existing version instead if we detect a vulnerability in a package. The patches are added to the recipes, see example below:&lt;br /&gt;
&lt;br /&gt;
  poky/recipes-connectivity/bind/bind_9.9.5.bb&lt;br /&gt;
  &lt;br /&gt;
  SRC_URI = &amp;quot;ftp://ftp.isc.org/isc/bind9/${PV}/${BPN}-${PV}.tar.gz \&lt;br /&gt;
           file://conf.patch \&lt;br /&gt;
           ...&lt;br /&gt;
           file://bind9_9_5-CVE-2014-8500.patch \&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
We are tracking security vulnerabilities in the Yocto Project against the [http://nvd.nist.gov/home.cfm National Vulnerability Database]. &lt;br /&gt;
&lt;br /&gt;
We also track CVEs reported to the oss-security list (Open Source Software Security) http://www.openwall.com/lists/oss-security/&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Yocto Security Team ==&lt;br /&gt;
 &lt;br /&gt;
The purpose of creating a security team in the Yocto project is to discuss, sync and organize security related activities.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The team&#039;s main responsibilities among others are:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
*  Scanning of security forums/mailing list(s) to detect security vulnerabilities reported by community&lt;br /&gt;
*  Responsible for fixing CVEs in the Yocto releases &amp;amp; maintained branches&lt;br /&gt;
*  Evaluation of tools for security tests &lt;br /&gt;
*  Responsible for security related info in the Yocto documentations&lt;br /&gt;
*  Hardening of Yocto release&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;How to Contact Yocto&#039;s security team Securely&#039;&#039;&#039;&lt;br /&gt;
---------------------------------------------&lt;br /&gt;
Please send private vulnerability reports to &#039;&#039;&#039;security@yoctoprojct.org&#039;&#039;&#039;.&lt;br /&gt;
 &lt;br /&gt;
For secure communications, send your messages encrypted to &#039;&#039;&#039;sona.sarmadi@enea.com&#039;&#039;&#039; with the following GPG key:&lt;br /&gt;
&lt;br /&gt;
Download public key: [https://pgp.mit.edu/pks/lookup?op=vindex&amp;amp;search=0x773EF6EF68716A14 pgp.mit.edu]&lt;br /&gt;
&lt;br /&gt;
Anyone can contribute Yocto with security patches as before, but those volunteering to this security team will sync/organize security related activities and take more responsibility&lt;br /&gt;
&lt;br /&gt;
== Branches maintained with security fixes  ==&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! Major version&lt;br /&gt;
! Current Version&lt;br /&gt;
! Branch name&lt;br /&gt;
! BitBake version&lt;br /&gt;
! Maintainer&lt;br /&gt;
|-&lt;br /&gt;
|1.7&lt;br /&gt;
|1.7&lt;br /&gt;
|dizzy&lt;br /&gt;
|1.24&lt;br /&gt;
|Armin Kuster &amp;lt;akuster808@gmail.com&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
|1.6&lt;br /&gt;
|1.6.1&lt;br /&gt;
|daisy&lt;br /&gt;
|1.22&lt;br /&gt;
|Saul Wold &amp;lt;sgw@linux.intel.com&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
|1.5&lt;br /&gt;
|1.5.3&lt;br /&gt;
|dora&lt;br /&gt;
|1.20&lt;br /&gt;
|Robert Yang &amp;lt;liezhi.yang@windriver.com&amp;gt;&lt;br /&gt;
|- style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|1.4&lt;br /&gt;
|1.4.3[https://lists.yoctoproject.org/pipermail/yocto/2014-July/020699.html *]&lt;br /&gt;
|dylan&lt;br /&gt;
|1.18&lt;br /&gt;
|Paul Eggleton &amp;lt;paul.eggleton@linux.intel.com&amp;gt;&lt;br /&gt;
|- style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|1.3&lt;br /&gt;
|1.3.2&lt;br /&gt;
|danny&lt;br /&gt;
|1.16&lt;br /&gt;
|Ross Burton &amp;lt;ross.burton@intel.com&amp;gt;&lt;br /&gt;
|- style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
All CVEs (security patches) should be backported to all branches above (if at all possible). &lt;br /&gt;
Versions in grey are no longer actively maintained, but well-tested security patches may still be accepted for them.) &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
See [https://wiki.yoctoproject.org/wiki/Stable_branch_maintenance Stable branches maintenance]for detailed info regarding the policies and maintenance of Stable branch&lt;br /&gt;
&lt;br /&gt;
== Kernel security patches ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Kernel security patches are backported to Linux-yoco kernels regularly from https://www.kernel.org/&lt;br /&gt;
=== Linux-yocto ===&lt;br /&gt;
linux-yocto_3.10 &amp;amp; linux-yocto_3.14 (maintainer: Ross Burton)&lt;br /&gt;
&lt;br /&gt;
=== Vendor kernels ===&lt;br /&gt;
Kernel security patches are also backported to Linux-vendor kernels from https://www.kernel.org/&lt;br /&gt;
 &lt;br /&gt;
* meta-intel (meta-intel uses Linux-yocto)&lt;br /&gt;
* meta-fsl-ppc (maintainer: xxx)&lt;br /&gt;
* meta-fsl-arm (maintainer: xxx)&lt;br /&gt;
* meta-xilinx (maintainer: xxx)&lt;br /&gt;
* meta-ti (maintainer: xxx)&lt;br /&gt;
* etc&lt;br /&gt;
&lt;br /&gt;
== How to test ==&lt;br /&gt;
 &lt;br /&gt;
If there is any test case for the vulnerability by the upstream project or community&lt;br /&gt;
 - Run the test to reproduce the problem and verify the correction. &lt;br /&gt;
 - Run the regression test&lt;br /&gt;
&lt;br /&gt;
If there isn’t any test case and it is complicated and time consuming to write a testcase&lt;br /&gt;
 - Run the regressions test&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Regression test&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Build the core image for at least two architectures (preferably one big-endian and one little-endian)&lt;br /&gt;
* Run ptest (for those branches/packages that there is ptest mechanism)&lt;br /&gt;
&lt;br /&gt;
== Patch name convention and commit message ==&lt;br /&gt;
Security patches should have reference to the CVE identifier both in the patch file/s and the commit comment.&lt;br /&gt;
&lt;br /&gt;
Please make sure to add the package name in the subject and the reference to the CVE. Example for the commit comment: &lt;br /&gt;
&lt;br /&gt;
    bash: CVE-2014-6278&lt;br /&gt;
    &lt;br /&gt;
    &amp;lt;short description&amp;gt;&lt;br /&gt;
    &lt;br /&gt;
    &amp;lt;[YOCTO #xxx] if there is any&amp;gt;&lt;br /&gt;
    &lt;br /&gt;
    References&lt;br /&gt;
    E.g. [https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6278 link to CVE] or other useful info/blog/advisory.&lt;br /&gt;
    &lt;br /&gt;
    Signed-off-by: &lt;br /&gt;
    &lt;br /&gt;
For additional guidelines refer to: [http://openembedded.org/wiki/Commit_Patch_Message_Guidelines Commit Patch Message Guidelines]&lt;br /&gt;
&lt;br /&gt;
== Some security related links/useful tools ==&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
* [http://www.cvedetails.com CVE details] &lt;br /&gt;
* [http://www.cvedetails.com/vulnerability-list/vendor_id-33/product_id-47/year-2014/Linux-Linux-Kernel.html  CVE list, Linux kernel 2014]&lt;br /&gt;
* [https://www.yoctoproject.org/blogs/andrei-dinu/2013/meta-security-layer-now-available Meta-security-layer]&lt;br /&gt;
* [http://www.yoctoproject.org/docs/1.7/dev-manual/dev-manual.html#making-images-more-secure Making images more secure]&lt;br /&gt;
* [http://cvechecker.sourceforge.net Cvechecker]&lt;br /&gt;
&lt;br /&gt;
== Security Issues Addressed in Yocto Releases ==&lt;br /&gt;
&#039;&#039;&#039;Yocto 1.7.1 - Dizzy&#039;&#039;&#039; &lt;br /&gt;
https://www.yoctoproject.org/downloads/core/dizzy171&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Yocto 1.7 - Dizzy&#039;&#039;&#039; &lt;br /&gt;
https://www.yoctoproject.org/downloads/core/dizzy17&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Yocto 1.6 - Daisy&#039;&#039;&#039; &lt;br /&gt;
https://www.yoctoproject.org/downloads/core/daisy16&lt;/div&gt;</summary>
		<author><name>SonaSarmadi</name></author>
	</entry>
	<entry>
		<id>https://wiki.yoctoproject.org/wiki/index.php?title=Security&amp;diff=14206</id>
		<title>Security</title>
		<link rel="alternate" type="text/html" href="https://wiki.yoctoproject.org/wiki/index.php?title=Security&amp;diff=14206"/>
		<updated>2015-02-25T12:49:37Z</updated>

		<summary type="html">&lt;p&gt;SonaSarmadi: /* Yocto Security Team */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Since the Yocto Project is intended to be flexible and meet the needs of many applications, we leave policy-making decisions around security to our end users. Our goal instead is to ship each release with metadata that follows best practices in that we do not release recipe versions which are known to have significant security vulnerabilities. Generally this is done by upgrading recipes to newer versions that are no longer vulnerable to these issues. &lt;br /&gt;
&lt;br /&gt;
Upgrading recipes to the newer versions in the maintenance branches is not always easy, this is why we provide a patch for the existing version instead if we detect a vulnerability in a package. The patches are added to the recipes, see example below:&lt;br /&gt;
&lt;br /&gt;
  poky/recipes-connectivity/bind/bind_9.9.5.bb&lt;br /&gt;
  &lt;br /&gt;
  SRC_URI = &amp;quot;ftp://ftp.isc.org/isc/bind9/${PV}/${BPN}-${PV}.tar.gz \&lt;br /&gt;
           file://conf.patch \&lt;br /&gt;
           ...&lt;br /&gt;
           file://bind9_9_5-CVE-2014-8500.patch \&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
We are tracking security vulnerabilities in the Yocto Project against the [http://nvd.nist.gov/home.cfm National Vulnerability Database]. &lt;br /&gt;
&lt;br /&gt;
We also track CVEs reported to the oss-security list (Open Source Software Security) http://www.openwall.com/lists/oss-security/&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Yocto Security Team ==&lt;br /&gt;
 &lt;br /&gt;
The purpose of creating a security team in the Yocto project is to discuss, sync and organize security related activities.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The team&#039;s main responsibilities among others are:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
*  Scanning of security forums/mailing list(s) to detect security vulnerabilities reported by community&lt;br /&gt;
*  Responsible for fixing CVEs in the Yocto releases &amp;amp; maintained branches&lt;br /&gt;
*  Evaluation of tools for security tests &lt;br /&gt;
*  Responsible for security related info in the Yocto documentations&lt;br /&gt;
*  Hardening of Yocto release&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;How to Contact Yocto&#039;s security team Securely&#039;&#039;&#039;&lt;br /&gt;
---------------------------------------------&lt;br /&gt;
Please send private vulnerability reports to &#039;&#039;&#039;security@yoctoprojct.org&#039;&#039;&#039;.&lt;br /&gt;
 &lt;br /&gt;
For secure communications, send your messages encrypted to &#039;&#039;&#039;sona.sarmadi@enea.com&#039;&#039;&#039; with the following GPG key:&lt;br /&gt;
&lt;br /&gt;
Download public key:[https://pgp.mit.edu/pks/lookup?op=vindex&amp;amp;search=0x773EF6EF68716A14 pgp.mit.edu]&lt;br /&gt;
&lt;br /&gt;
Anyone can contribute Yocto with security patches as before, but those volunteering to this security team will sync/organize security related activities and take more responsibility&lt;br /&gt;
&lt;br /&gt;
== Branches maintained with security fixes  ==&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! Major version&lt;br /&gt;
! Current Version&lt;br /&gt;
! Branch name&lt;br /&gt;
! BitBake version&lt;br /&gt;
! Maintainer&lt;br /&gt;
|-&lt;br /&gt;
|1.7&lt;br /&gt;
|1.7&lt;br /&gt;
|dizzy&lt;br /&gt;
|1.24&lt;br /&gt;
|Armin Kuster &amp;lt;akuster808@gmail.com&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
|1.6&lt;br /&gt;
|1.6.1&lt;br /&gt;
|daisy&lt;br /&gt;
|1.22&lt;br /&gt;
|Saul Wold &amp;lt;sgw@linux.intel.com&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
|1.5&lt;br /&gt;
|1.5.3&lt;br /&gt;
|dora&lt;br /&gt;
|1.20&lt;br /&gt;
|Robert Yang &amp;lt;liezhi.yang@windriver.com&amp;gt;&lt;br /&gt;
|- style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|1.4&lt;br /&gt;
|1.4.3[https://lists.yoctoproject.org/pipermail/yocto/2014-July/020699.html *]&lt;br /&gt;
|dylan&lt;br /&gt;
|1.18&lt;br /&gt;
|Paul Eggleton &amp;lt;paul.eggleton@linux.intel.com&amp;gt;&lt;br /&gt;
|- style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|1.3&lt;br /&gt;
|1.3.2&lt;br /&gt;
|danny&lt;br /&gt;
|1.16&lt;br /&gt;
|Ross Burton &amp;lt;ross.burton@intel.com&amp;gt;&lt;br /&gt;
|- style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
All CVEs (security patches) should be backported to all branches above (if at all possible). &lt;br /&gt;
Versions in grey are no longer actively maintained, but well-tested security patches may still be accepted for them.) &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
See [https://wiki.yoctoproject.org/wiki/Stable_branch_maintenance Stable branches maintenance]for detailed info regarding the policies and maintenance of Stable branch&lt;br /&gt;
&lt;br /&gt;
== Kernel security patches ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Kernel security patches are backported to Linux-yoco kernels regularly from https://www.kernel.org/&lt;br /&gt;
=== Linux-yocto ===&lt;br /&gt;
linux-yocto_3.10 &amp;amp; linux-yocto_3.14 (maintainer: Ross Burton)&lt;br /&gt;
&lt;br /&gt;
=== Vendor kernels ===&lt;br /&gt;
Kernel security patches are also backported to Linux-vendor kernels from https://www.kernel.org/&lt;br /&gt;
 &lt;br /&gt;
* meta-intel (meta-intel uses Linux-yocto)&lt;br /&gt;
* meta-fsl-ppc (maintainer: xxx)&lt;br /&gt;
* meta-fsl-arm (maintainer: xxx)&lt;br /&gt;
* meta-xilinx (maintainer: xxx)&lt;br /&gt;
* meta-ti (maintainer: xxx)&lt;br /&gt;
* etc&lt;br /&gt;
&lt;br /&gt;
== How to test ==&lt;br /&gt;
 &lt;br /&gt;
If there is any test case for the vulnerability by the upstream project or community&lt;br /&gt;
 - Run the test to reproduce the problem and verify the correction. &lt;br /&gt;
 - Run the regression test&lt;br /&gt;
&lt;br /&gt;
If there isn’t any test case and it is complicated and time consuming to write a testcase&lt;br /&gt;
 - Run the regressions test&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Regression test&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Build the core image for at least two architectures (preferably one big-endian and one little-endian)&lt;br /&gt;
* Run ptest (for those branches/packages that there is ptest mechanism)&lt;br /&gt;
&lt;br /&gt;
== Patch name convention and commit message ==&lt;br /&gt;
Security patches should have reference to the CVE identifier both in the patch file/s and the commit comment.&lt;br /&gt;
&lt;br /&gt;
Please make sure to add the package name in the subject and the reference to the CVE. Example for the commit comment: &lt;br /&gt;
&lt;br /&gt;
    bash: CVE-2014-6278&lt;br /&gt;
    &lt;br /&gt;
    &amp;lt;short description&amp;gt;&lt;br /&gt;
    &lt;br /&gt;
    &amp;lt;[YOCTO #xxx] if there is any&amp;gt;&lt;br /&gt;
    &lt;br /&gt;
    References&lt;br /&gt;
    E.g. [https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6278 link to CVE] or other useful info/blog/advisory.&lt;br /&gt;
    &lt;br /&gt;
    Signed-off-by: &lt;br /&gt;
    &lt;br /&gt;
For additional guidelines refer to: [http://openembedded.org/wiki/Commit_Patch_Message_Guidelines Commit Patch Message Guidelines]&lt;br /&gt;
&lt;br /&gt;
== Some security related links/useful tools ==&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
* [http://www.cvedetails.com CVE details] &lt;br /&gt;
* [http://www.cvedetails.com/vulnerability-list/vendor_id-33/product_id-47/year-2014/Linux-Linux-Kernel.html  CVE list, Linux kernel 2014]&lt;br /&gt;
* [https://www.yoctoproject.org/blogs/andrei-dinu/2013/meta-security-layer-now-available Meta-security-layer]&lt;br /&gt;
* [http://www.yoctoproject.org/docs/1.7/dev-manual/dev-manual.html#making-images-more-secure Making images more secure]&lt;br /&gt;
* [http://cvechecker.sourceforge.net Cvechecker]&lt;br /&gt;
&lt;br /&gt;
== Security Issues Addressed in Yocto Releases ==&lt;br /&gt;
&#039;&#039;&#039;Yocto 1.7.1 - Dizzy&#039;&#039;&#039; &lt;br /&gt;
https://www.yoctoproject.org/downloads/core/dizzy171&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Yocto 1.7 - Dizzy&#039;&#039;&#039; &lt;br /&gt;
https://www.yoctoproject.org/downloads/core/dizzy17&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Yocto 1.6 - Daisy&#039;&#039;&#039; &lt;br /&gt;
https://www.yoctoproject.org/downloads/core/daisy16&lt;/div&gt;</summary>
		<author><name>SonaSarmadi</name></author>
	</entry>
	<entry>
		<id>https://wiki.yoctoproject.org/wiki/index.php?title=Security&amp;diff=14205</id>
		<title>Security</title>
		<link rel="alternate" type="text/html" href="https://wiki.yoctoproject.org/wiki/index.php?title=Security&amp;diff=14205"/>
		<updated>2015-02-25T12:47:08Z</updated>

		<summary type="html">&lt;p&gt;SonaSarmadi: /* Yocto Security Team */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Since the Yocto Project is intended to be flexible and meet the needs of many applications, we leave policy-making decisions around security to our end users. Our goal instead is to ship each release with metadata that follows best practices in that we do not release recipe versions which are known to have significant security vulnerabilities. Generally this is done by upgrading recipes to newer versions that are no longer vulnerable to these issues. &lt;br /&gt;
&lt;br /&gt;
Upgrading recipes to the newer versions in the maintenance branches is not always easy, this is why we provide a patch for the existing version instead if we detect a vulnerability in a package. The patches are added to the recipes, see example below:&lt;br /&gt;
&lt;br /&gt;
  poky/recipes-connectivity/bind/bind_9.9.5.bb&lt;br /&gt;
  &lt;br /&gt;
  SRC_URI = &amp;quot;ftp://ftp.isc.org/isc/bind9/${PV}/${BPN}-${PV}.tar.gz \&lt;br /&gt;
           file://conf.patch \&lt;br /&gt;
           ...&lt;br /&gt;
           file://bind9_9_5-CVE-2014-8500.patch \&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
We are tracking security vulnerabilities in the Yocto Project against the [http://nvd.nist.gov/home.cfm National Vulnerability Database]. &lt;br /&gt;
&lt;br /&gt;
We also track CVEs reported to the oss-security list (Open Source Software Security) http://www.openwall.com/lists/oss-security/&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Yocto Security Team ==&lt;br /&gt;
 &lt;br /&gt;
The purpose of creating a security team in the Yocto project is to discuss, sync and organize security related activities.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The team&#039;s main responsibilities among others are:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
*  Scanning of security forums/mailing list(s) to detect security vulnerabilities reported by community&lt;br /&gt;
*  Responsible for fixing CVEs in the Yocto releases &amp;amp; maintained branches&lt;br /&gt;
*  Evaluation of tools for security tests &lt;br /&gt;
*  Responsible for security related info in the Yocto documentations&lt;br /&gt;
*  Hardening of Yocto release&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;How to Contact Yocto&#039;s security team Securely&#039;&#039;&#039;&lt;br /&gt;
---------------------------------------------&lt;br /&gt;
Please send private vulnerability reports to &#039;&#039;&#039;security@yoctoprojct.org&#039;&#039;&#039;.&lt;br /&gt;
 &lt;br /&gt;
For secure communications, send your messages encrypted to &#039;&#039;&#039;sona.sarmadi@enea.com&#039;&#039;&#039; with the following GPG key:&lt;br /&gt;
&lt;br /&gt;
Download public key:[pgp.mit.edu][https://pgp.mit.edu/pks/lookup?op=vindex&amp;amp;search=0x773EF6EF68716A14]&lt;br /&gt;
&lt;br /&gt;
Anyone can contribute Yocto with security patches as before, but those volunteering to this security team will sync/organize security related activities and take more responsibility&lt;br /&gt;
&lt;br /&gt;
== Branches maintained with security fixes  ==&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! Major version&lt;br /&gt;
! Current Version&lt;br /&gt;
! Branch name&lt;br /&gt;
! BitBake version&lt;br /&gt;
! Maintainer&lt;br /&gt;
|-&lt;br /&gt;
|1.7&lt;br /&gt;
|1.7&lt;br /&gt;
|dizzy&lt;br /&gt;
|1.24&lt;br /&gt;
|Armin Kuster &amp;lt;akuster808@gmail.com&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
|1.6&lt;br /&gt;
|1.6.1&lt;br /&gt;
|daisy&lt;br /&gt;
|1.22&lt;br /&gt;
|Saul Wold &amp;lt;sgw@linux.intel.com&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
|1.5&lt;br /&gt;
|1.5.3&lt;br /&gt;
|dora&lt;br /&gt;
|1.20&lt;br /&gt;
|Robert Yang &amp;lt;liezhi.yang@windriver.com&amp;gt;&lt;br /&gt;
|- style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|1.4&lt;br /&gt;
|1.4.3[https://lists.yoctoproject.org/pipermail/yocto/2014-July/020699.html *]&lt;br /&gt;
|dylan&lt;br /&gt;
|1.18&lt;br /&gt;
|Paul Eggleton &amp;lt;paul.eggleton@linux.intel.com&amp;gt;&lt;br /&gt;
|- style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|1.3&lt;br /&gt;
|1.3.2&lt;br /&gt;
|danny&lt;br /&gt;
|1.16&lt;br /&gt;
|Ross Burton &amp;lt;ross.burton@intel.com&amp;gt;&lt;br /&gt;
|- style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
All CVEs (security patches) should be backported to all branches above (if at all possible). &lt;br /&gt;
Versions in grey are no longer actively maintained, but well-tested security patches may still be accepted for them.) &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
See [https://wiki.yoctoproject.org/wiki/Stable_branch_maintenance Stable branches maintenance]for detailed info regarding the policies and maintenance of Stable branch&lt;br /&gt;
&lt;br /&gt;
== Kernel security patches ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Kernel security patches are backported to Linux-yoco kernels regularly from https://www.kernel.org/&lt;br /&gt;
=== Linux-yocto ===&lt;br /&gt;
linux-yocto_3.10 &amp;amp; linux-yocto_3.14 (maintainer: Ross Burton)&lt;br /&gt;
&lt;br /&gt;
=== Vendor kernels ===&lt;br /&gt;
Kernel security patches are also backported to Linux-vendor kernels from https://www.kernel.org/&lt;br /&gt;
 &lt;br /&gt;
* meta-intel (meta-intel uses Linux-yocto)&lt;br /&gt;
* meta-fsl-ppc (maintainer: xxx)&lt;br /&gt;
* meta-fsl-arm (maintainer: xxx)&lt;br /&gt;
* meta-xilinx (maintainer: xxx)&lt;br /&gt;
* meta-ti (maintainer: xxx)&lt;br /&gt;
* etc&lt;br /&gt;
&lt;br /&gt;
== How to test ==&lt;br /&gt;
 &lt;br /&gt;
If there is any test case for the vulnerability by the upstream project or community&lt;br /&gt;
 - Run the test to reproduce the problem and verify the correction. &lt;br /&gt;
 - Run the regression test&lt;br /&gt;
&lt;br /&gt;
If there isn’t any test case and it is complicated and time consuming to write a testcase&lt;br /&gt;
 - Run the regressions test&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Regression test&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Build the core image for at least two architectures (preferably one big-endian and one little-endian)&lt;br /&gt;
* Run ptest (for those branches/packages that there is ptest mechanism)&lt;br /&gt;
&lt;br /&gt;
== Patch name convention and commit message ==&lt;br /&gt;
Security patches should have reference to the CVE identifier both in the patch file/s and the commit comment.&lt;br /&gt;
&lt;br /&gt;
Please make sure to add the package name in the subject and the reference to the CVE. Example for the commit comment: &lt;br /&gt;
&lt;br /&gt;
    bash: CVE-2014-6278&lt;br /&gt;
    &lt;br /&gt;
    &amp;lt;short description&amp;gt;&lt;br /&gt;
    &lt;br /&gt;
    &amp;lt;[YOCTO #xxx] if there is any&amp;gt;&lt;br /&gt;
    &lt;br /&gt;
    References&lt;br /&gt;
    E.g. [https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6278 link to CVE] or other useful info/blog/advisory.&lt;br /&gt;
    &lt;br /&gt;
    Signed-off-by: &lt;br /&gt;
    &lt;br /&gt;
For additional guidelines refer to: [http://openembedded.org/wiki/Commit_Patch_Message_Guidelines Commit Patch Message Guidelines]&lt;br /&gt;
&lt;br /&gt;
== Some security related links/useful tools ==&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
* [http://www.cvedetails.com CVE details] &lt;br /&gt;
* [http://www.cvedetails.com/vulnerability-list/vendor_id-33/product_id-47/year-2014/Linux-Linux-Kernel.html  CVE list, Linux kernel 2014]&lt;br /&gt;
* [https://www.yoctoproject.org/blogs/andrei-dinu/2013/meta-security-layer-now-available Meta-security-layer]&lt;br /&gt;
* [http://www.yoctoproject.org/docs/1.7/dev-manual/dev-manual.html#making-images-more-secure Making images more secure]&lt;br /&gt;
* [http://cvechecker.sourceforge.net Cvechecker]&lt;br /&gt;
&lt;br /&gt;
== Security Issues Addressed in Yocto Releases ==&lt;br /&gt;
&#039;&#039;&#039;Yocto 1.7.1 - Dizzy&#039;&#039;&#039; &lt;br /&gt;
https://www.yoctoproject.org/downloads/core/dizzy171&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Yocto 1.7 - Dizzy&#039;&#039;&#039; &lt;br /&gt;
https://www.yoctoproject.org/downloads/core/dizzy17&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Yocto 1.6 - Daisy&#039;&#039;&#039; &lt;br /&gt;
https://www.yoctoproject.org/downloads/core/daisy16&lt;/div&gt;</summary>
		<author><name>SonaSarmadi</name></author>
	</entry>
	<entry>
		<id>https://wiki.yoctoproject.org/wiki/index.php?title=Security&amp;diff=14204</id>
		<title>Security</title>
		<link rel="alternate" type="text/html" href="https://wiki.yoctoproject.org/wiki/index.php?title=Security&amp;diff=14204"/>
		<updated>2015-02-25T12:46:16Z</updated>

		<summary type="html">&lt;p&gt;SonaSarmadi: /* Yocto Security Team */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Since the Yocto Project is intended to be flexible and meet the needs of many applications, we leave policy-making decisions around security to our end users. Our goal instead is to ship each release with metadata that follows best practices in that we do not release recipe versions which are known to have significant security vulnerabilities. Generally this is done by upgrading recipes to newer versions that are no longer vulnerable to these issues. &lt;br /&gt;
&lt;br /&gt;
Upgrading recipes to the newer versions in the maintenance branches is not always easy, this is why we provide a patch for the existing version instead if we detect a vulnerability in a package. The patches are added to the recipes, see example below:&lt;br /&gt;
&lt;br /&gt;
  poky/recipes-connectivity/bind/bind_9.9.5.bb&lt;br /&gt;
  &lt;br /&gt;
  SRC_URI = &amp;quot;ftp://ftp.isc.org/isc/bind9/${PV}/${BPN}-${PV}.tar.gz \&lt;br /&gt;
           file://conf.patch \&lt;br /&gt;
           ...&lt;br /&gt;
           file://bind9_9_5-CVE-2014-8500.patch \&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
We are tracking security vulnerabilities in the Yocto Project against the [http://nvd.nist.gov/home.cfm National Vulnerability Database]. &lt;br /&gt;
&lt;br /&gt;
We also track CVEs reported to the oss-security list (Open Source Software Security) http://www.openwall.com/lists/oss-security/&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Yocto Security Team ==&lt;br /&gt;
 &lt;br /&gt;
The purpose of creating a security team in the Yocto project is to discuss, sync and organize security related activities.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The team&#039;s main responsibilities among others are:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
*  Scanning of security forums/mailing list(s) to detect security vulnerabilities reported by community&lt;br /&gt;
*  Responsible for fixing CVEs in the Yocto releases &amp;amp; maintained branches&lt;br /&gt;
*  Evaluation of tools for security tests &lt;br /&gt;
*  Responsible for security related info in the Yocto documentations&lt;br /&gt;
*  Hardening of Yocto release&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;How to Contact Yocto&#039;s security team Securely&#039;&#039;&#039;&lt;br /&gt;
---------------------------------------------&lt;br /&gt;
Please send private vulnerability reports to &#039;&#039;&#039;security@yoctoprojct.org&#039;&#039;&#039;.&lt;br /&gt;
 &lt;br /&gt;
For secure communications, send your messages encrypted to &#039;&#039;&#039;sona.sarmadi@enea.com&#039;&#039;&#039; with the following GPG key:&lt;br /&gt;
&lt;br /&gt;
Download public key [[here]:[https://pgp.mit.edu/pks/lookup?op=vindex&amp;amp;search=0x773EF6EF68716A14]]&lt;br /&gt;
&lt;br /&gt;
Anyone can contribute Yocto with security patches as before, but those volunteering to this security team will sync/organize security related activities and take more responsibility&lt;br /&gt;
&lt;br /&gt;
== Branches maintained with security fixes  ==&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! Major version&lt;br /&gt;
! Current Version&lt;br /&gt;
! Branch name&lt;br /&gt;
! BitBake version&lt;br /&gt;
! Maintainer&lt;br /&gt;
|-&lt;br /&gt;
|1.7&lt;br /&gt;
|1.7&lt;br /&gt;
|dizzy&lt;br /&gt;
|1.24&lt;br /&gt;
|Armin Kuster &amp;lt;akuster808@gmail.com&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
|1.6&lt;br /&gt;
|1.6.1&lt;br /&gt;
|daisy&lt;br /&gt;
|1.22&lt;br /&gt;
|Saul Wold &amp;lt;sgw@linux.intel.com&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
|1.5&lt;br /&gt;
|1.5.3&lt;br /&gt;
|dora&lt;br /&gt;
|1.20&lt;br /&gt;
|Robert Yang &amp;lt;liezhi.yang@windriver.com&amp;gt;&lt;br /&gt;
|- style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|1.4&lt;br /&gt;
|1.4.3[https://lists.yoctoproject.org/pipermail/yocto/2014-July/020699.html *]&lt;br /&gt;
|dylan&lt;br /&gt;
|1.18&lt;br /&gt;
|Paul Eggleton &amp;lt;paul.eggleton@linux.intel.com&amp;gt;&lt;br /&gt;
|- style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|1.3&lt;br /&gt;
|1.3.2&lt;br /&gt;
|danny&lt;br /&gt;
|1.16&lt;br /&gt;
|Ross Burton &amp;lt;ross.burton@intel.com&amp;gt;&lt;br /&gt;
|- style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
All CVEs (security patches) should be backported to all branches above (if at all possible). &lt;br /&gt;
Versions in grey are no longer actively maintained, but well-tested security patches may still be accepted for them.) &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
See [https://wiki.yoctoproject.org/wiki/Stable_branch_maintenance Stable branches maintenance]for detailed info regarding the policies and maintenance of Stable branch&lt;br /&gt;
&lt;br /&gt;
== Kernel security patches ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Kernel security patches are backported to Linux-yoco kernels regularly from https://www.kernel.org/&lt;br /&gt;
=== Linux-yocto ===&lt;br /&gt;
linux-yocto_3.10 &amp;amp; linux-yocto_3.14 (maintainer: Ross Burton)&lt;br /&gt;
&lt;br /&gt;
=== Vendor kernels ===&lt;br /&gt;
Kernel security patches are also backported to Linux-vendor kernels from https://www.kernel.org/&lt;br /&gt;
 &lt;br /&gt;
* meta-intel (meta-intel uses Linux-yocto)&lt;br /&gt;
* meta-fsl-ppc (maintainer: xxx)&lt;br /&gt;
* meta-fsl-arm (maintainer: xxx)&lt;br /&gt;
* meta-xilinx (maintainer: xxx)&lt;br /&gt;
* meta-ti (maintainer: xxx)&lt;br /&gt;
* etc&lt;br /&gt;
&lt;br /&gt;
== How to test ==&lt;br /&gt;
 &lt;br /&gt;
If there is any test case for the vulnerability by the upstream project or community&lt;br /&gt;
 - Run the test to reproduce the problem and verify the correction. &lt;br /&gt;
 - Run the regression test&lt;br /&gt;
&lt;br /&gt;
If there isn’t any test case and it is complicated and time consuming to write a testcase&lt;br /&gt;
 - Run the regressions test&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Regression test&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Build the core image for at least two architectures (preferably one big-endian and one little-endian)&lt;br /&gt;
* Run ptest (for those branches/packages that there is ptest mechanism)&lt;br /&gt;
&lt;br /&gt;
== Patch name convention and commit message ==&lt;br /&gt;
Security patches should have reference to the CVE identifier both in the patch file/s and the commit comment.&lt;br /&gt;
&lt;br /&gt;
Please make sure to add the package name in the subject and the reference to the CVE. Example for the commit comment: &lt;br /&gt;
&lt;br /&gt;
    bash: CVE-2014-6278&lt;br /&gt;
    &lt;br /&gt;
    &amp;lt;short description&amp;gt;&lt;br /&gt;
    &lt;br /&gt;
    &amp;lt;[YOCTO #xxx] if there is any&amp;gt;&lt;br /&gt;
    &lt;br /&gt;
    References&lt;br /&gt;
    E.g. [https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6278 link to CVE] or other useful info/blog/advisory.&lt;br /&gt;
    &lt;br /&gt;
    Signed-off-by: &lt;br /&gt;
    &lt;br /&gt;
For additional guidelines refer to: [http://openembedded.org/wiki/Commit_Patch_Message_Guidelines Commit Patch Message Guidelines]&lt;br /&gt;
&lt;br /&gt;
== Some security related links/useful tools ==&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
* [http://www.cvedetails.com CVE details] &lt;br /&gt;
* [http://www.cvedetails.com/vulnerability-list/vendor_id-33/product_id-47/year-2014/Linux-Linux-Kernel.html  CVE list, Linux kernel 2014]&lt;br /&gt;
* [https://www.yoctoproject.org/blogs/andrei-dinu/2013/meta-security-layer-now-available Meta-security-layer]&lt;br /&gt;
* [http://www.yoctoproject.org/docs/1.7/dev-manual/dev-manual.html#making-images-more-secure Making images more secure]&lt;br /&gt;
* [http://cvechecker.sourceforge.net Cvechecker]&lt;br /&gt;
&lt;br /&gt;
== Security Issues Addressed in Yocto Releases ==&lt;br /&gt;
&#039;&#039;&#039;Yocto 1.7.1 - Dizzy&#039;&#039;&#039; &lt;br /&gt;
https://www.yoctoproject.org/downloads/core/dizzy171&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Yocto 1.7 - Dizzy&#039;&#039;&#039; &lt;br /&gt;
https://www.yoctoproject.org/downloads/core/dizzy17&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Yocto 1.6 - Daisy&#039;&#039;&#039; &lt;br /&gt;
https://www.yoctoproject.org/downloads/core/daisy16&lt;/div&gt;</summary>
		<author><name>SonaSarmadi</name></author>
	</entry>
	<entry>
		<id>https://wiki.yoctoproject.org/wiki/index.php?title=Security&amp;diff=14203</id>
		<title>Security</title>
		<link rel="alternate" type="text/html" href="https://wiki.yoctoproject.org/wiki/index.php?title=Security&amp;diff=14203"/>
		<updated>2015-02-25T12:45:28Z</updated>

		<summary type="html">&lt;p&gt;SonaSarmadi: /* Yocto Security Team */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Since the Yocto Project is intended to be flexible and meet the needs of many applications, we leave policy-making decisions around security to our end users. Our goal instead is to ship each release with metadata that follows best practices in that we do not release recipe versions which are known to have significant security vulnerabilities. Generally this is done by upgrading recipes to newer versions that are no longer vulnerable to these issues. &lt;br /&gt;
&lt;br /&gt;
Upgrading recipes to the newer versions in the maintenance branches is not always easy, this is why we provide a patch for the existing version instead if we detect a vulnerability in a package. The patches are added to the recipes, see example below:&lt;br /&gt;
&lt;br /&gt;
  poky/recipes-connectivity/bind/bind_9.9.5.bb&lt;br /&gt;
  &lt;br /&gt;
  SRC_URI = &amp;quot;ftp://ftp.isc.org/isc/bind9/${PV}/${BPN}-${PV}.tar.gz \&lt;br /&gt;
           file://conf.patch \&lt;br /&gt;
           ...&lt;br /&gt;
           file://bind9_9_5-CVE-2014-8500.patch \&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
We are tracking security vulnerabilities in the Yocto Project against the [http://nvd.nist.gov/home.cfm National Vulnerability Database]. &lt;br /&gt;
&lt;br /&gt;
We also track CVEs reported to the oss-security list (Open Source Software Security) http://www.openwall.com/lists/oss-security/&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Yocto Security Team ==&lt;br /&gt;
 &lt;br /&gt;
The purpose of creating a security team in the Yocto project is to discuss, sync and organize security related activities.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The team&#039;s main responsibilities among others are:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
*  Scanning of security forums/mailing list(s) to detect security vulnerabilities reported by community&lt;br /&gt;
*  Responsible for fixing CVEs in the Yocto releases &amp;amp; maintained branches&lt;br /&gt;
*  Evaluation of tools for security tests &lt;br /&gt;
*  Responsible for security related info in the Yocto documentations&lt;br /&gt;
*  Hardening of Yocto release&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;How to Contact Yocto&#039;s security team Securely&#039;&#039;&#039;&lt;br /&gt;
---------------------------------------------&lt;br /&gt;
Please send private vulnerability reports to &#039;&#039;&#039;security@yoctoprojct.org&#039;&#039;&#039;.&lt;br /&gt;
 &lt;br /&gt;
For secure communications, send your messages encrypted to &#039;&#039;&#039;sona.sarmadi@enea.com&#039;&#039;&#039; with the following GPG key:&lt;br /&gt;
&lt;br /&gt;
Download public key [here]:[https://pgp.mit.edu/pks/lookup?op=vindex&amp;amp;search=0x773EF6EF68716A14]&lt;br /&gt;
&lt;br /&gt;
Anyone can contribute Yocto with security patches as before, but those volunteering to this security team will sync/organize security related activities and take more responsibility&lt;br /&gt;
&lt;br /&gt;
== Branches maintained with security fixes  ==&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! Major version&lt;br /&gt;
! Current Version&lt;br /&gt;
! Branch name&lt;br /&gt;
! BitBake version&lt;br /&gt;
! Maintainer&lt;br /&gt;
|-&lt;br /&gt;
|1.7&lt;br /&gt;
|1.7&lt;br /&gt;
|dizzy&lt;br /&gt;
|1.24&lt;br /&gt;
|Armin Kuster &amp;lt;akuster808@gmail.com&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
|1.6&lt;br /&gt;
|1.6.1&lt;br /&gt;
|daisy&lt;br /&gt;
|1.22&lt;br /&gt;
|Saul Wold &amp;lt;sgw@linux.intel.com&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
|1.5&lt;br /&gt;
|1.5.3&lt;br /&gt;
|dora&lt;br /&gt;
|1.20&lt;br /&gt;
|Robert Yang &amp;lt;liezhi.yang@windriver.com&amp;gt;&lt;br /&gt;
|- style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|1.4&lt;br /&gt;
|1.4.3[https://lists.yoctoproject.org/pipermail/yocto/2014-July/020699.html *]&lt;br /&gt;
|dylan&lt;br /&gt;
|1.18&lt;br /&gt;
|Paul Eggleton &amp;lt;paul.eggleton@linux.intel.com&amp;gt;&lt;br /&gt;
|- style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|1.3&lt;br /&gt;
|1.3.2&lt;br /&gt;
|danny&lt;br /&gt;
|1.16&lt;br /&gt;
|Ross Burton &amp;lt;ross.burton@intel.com&amp;gt;&lt;br /&gt;
|- style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
All CVEs (security patches) should be backported to all branches above (if at all possible). &lt;br /&gt;
Versions in grey are no longer actively maintained, but well-tested security patches may still be accepted for them.) &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
See [https://wiki.yoctoproject.org/wiki/Stable_branch_maintenance Stable branches maintenance]for detailed info regarding the policies and maintenance of Stable branch&lt;br /&gt;
&lt;br /&gt;
== Kernel security patches ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Kernel security patches are backported to Linux-yoco kernels regularly from https://www.kernel.org/&lt;br /&gt;
=== Linux-yocto ===&lt;br /&gt;
linux-yocto_3.10 &amp;amp; linux-yocto_3.14 (maintainer: Ross Burton)&lt;br /&gt;
&lt;br /&gt;
=== Vendor kernels ===&lt;br /&gt;
Kernel security patches are also backported to Linux-vendor kernels from https://www.kernel.org/&lt;br /&gt;
 &lt;br /&gt;
* meta-intel (meta-intel uses Linux-yocto)&lt;br /&gt;
* meta-fsl-ppc (maintainer: xxx)&lt;br /&gt;
* meta-fsl-arm (maintainer: xxx)&lt;br /&gt;
* meta-xilinx (maintainer: xxx)&lt;br /&gt;
* meta-ti (maintainer: xxx)&lt;br /&gt;
* etc&lt;br /&gt;
&lt;br /&gt;
== How to test ==&lt;br /&gt;
 &lt;br /&gt;
If there is any test case for the vulnerability by the upstream project or community&lt;br /&gt;
 - Run the test to reproduce the problem and verify the correction. &lt;br /&gt;
 - Run the regression test&lt;br /&gt;
&lt;br /&gt;
If there isn’t any test case and it is complicated and time consuming to write a testcase&lt;br /&gt;
 - Run the regressions test&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Regression test&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Build the core image for at least two architectures (preferably one big-endian and one little-endian)&lt;br /&gt;
* Run ptest (for those branches/packages that there is ptest mechanism)&lt;br /&gt;
&lt;br /&gt;
== Patch name convention and commit message ==&lt;br /&gt;
Security patches should have reference to the CVE identifier both in the patch file/s and the commit comment.&lt;br /&gt;
&lt;br /&gt;
Please make sure to add the package name in the subject and the reference to the CVE. Example for the commit comment: &lt;br /&gt;
&lt;br /&gt;
    bash: CVE-2014-6278&lt;br /&gt;
    &lt;br /&gt;
    &amp;lt;short description&amp;gt;&lt;br /&gt;
    &lt;br /&gt;
    &amp;lt;[YOCTO #xxx] if there is any&amp;gt;&lt;br /&gt;
    &lt;br /&gt;
    References&lt;br /&gt;
    E.g. [https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6278 link to CVE] or other useful info/blog/advisory.&lt;br /&gt;
    &lt;br /&gt;
    Signed-off-by: &lt;br /&gt;
    &lt;br /&gt;
For additional guidelines refer to: [http://openembedded.org/wiki/Commit_Patch_Message_Guidelines Commit Patch Message Guidelines]&lt;br /&gt;
&lt;br /&gt;
== Some security related links/useful tools ==&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
* [http://www.cvedetails.com CVE details] &lt;br /&gt;
* [http://www.cvedetails.com/vulnerability-list/vendor_id-33/product_id-47/year-2014/Linux-Linux-Kernel.html  CVE list, Linux kernel 2014]&lt;br /&gt;
* [https://www.yoctoproject.org/blogs/andrei-dinu/2013/meta-security-layer-now-available Meta-security-layer]&lt;br /&gt;
* [http://www.yoctoproject.org/docs/1.7/dev-manual/dev-manual.html#making-images-more-secure Making images more secure]&lt;br /&gt;
* [http://cvechecker.sourceforge.net Cvechecker]&lt;br /&gt;
&lt;br /&gt;
== Security Issues Addressed in Yocto Releases ==&lt;br /&gt;
&#039;&#039;&#039;Yocto 1.7.1 - Dizzy&#039;&#039;&#039; &lt;br /&gt;
https://www.yoctoproject.org/downloads/core/dizzy171&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Yocto 1.7 - Dizzy&#039;&#039;&#039; &lt;br /&gt;
https://www.yoctoproject.org/downloads/core/dizzy17&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Yocto 1.6 - Daisy&#039;&#039;&#039; &lt;br /&gt;
https://www.yoctoproject.org/downloads/core/daisy16&lt;/div&gt;</summary>
		<author><name>SonaSarmadi</name></author>
	</entry>
	<entry>
		<id>https://wiki.yoctoproject.org/wiki/index.php?title=Security&amp;diff=14202</id>
		<title>Security</title>
		<link rel="alternate" type="text/html" href="https://wiki.yoctoproject.org/wiki/index.php?title=Security&amp;diff=14202"/>
		<updated>2015-02-25T12:44:02Z</updated>

		<summary type="html">&lt;p&gt;SonaSarmadi: /* Yocto Security Team */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Since the Yocto Project is intended to be flexible and meet the needs of many applications, we leave policy-making decisions around security to our end users. Our goal instead is to ship each release with metadata that follows best practices in that we do not release recipe versions which are known to have significant security vulnerabilities. Generally this is done by upgrading recipes to newer versions that are no longer vulnerable to these issues. &lt;br /&gt;
&lt;br /&gt;
Upgrading recipes to the newer versions in the maintenance branches is not always easy, this is why we provide a patch for the existing version instead if we detect a vulnerability in a package. The patches are added to the recipes, see example below:&lt;br /&gt;
&lt;br /&gt;
  poky/recipes-connectivity/bind/bind_9.9.5.bb&lt;br /&gt;
  &lt;br /&gt;
  SRC_URI = &amp;quot;ftp://ftp.isc.org/isc/bind9/${PV}/${BPN}-${PV}.tar.gz \&lt;br /&gt;
           file://conf.patch \&lt;br /&gt;
           ...&lt;br /&gt;
           file://bind9_9_5-CVE-2014-8500.patch \&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
We are tracking security vulnerabilities in the Yocto Project against the [http://nvd.nist.gov/home.cfm National Vulnerability Database]. &lt;br /&gt;
&lt;br /&gt;
We also track CVEs reported to the oss-security list (Open Source Software Security) http://www.openwall.com/lists/oss-security/&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Yocto Security Team ==&lt;br /&gt;
 &lt;br /&gt;
The purpose of creating a security team in the Yocto project is to discuss, sync and organize security related activities.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The team&#039;s main responsibilities among others are:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
*  Scanning of security forums/mailing list(s) to detect security vulnerabilities reported by community&lt;br /&gt;
*  Responsible for fixing CVEs in the Yocto releases &amp;amp; maintained branches&lt;br /&gt;
*  Evaluation of tools for security tests &lt;br /&gt;
*  Responsible for security related info in the Yocto documentations&lt;br /&gt;
*  Hardening of Yocto release&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;How to Contact Yocto&#039;s security team Securely&#039;&#039;&#039;&lt;br /&gt;
---------------------------------------------&lt;br /&gt;
Please send private vulnerability reports to &#039;&#039;&#039;security@yoctoprojct.org&#039;&#039;&#039;.&lt;br /&gt;
 &lt;br /&gt;
For secure communications, send your messages encrypted to &#039;&#039;&#039;sona.sarmadi@enea.com&#039;&#039;&#039; with the following GPG key:&lt;br /&gt;
&lt;br /&gt;
Download public key: [pgp.mit.edu][https://pgp.mit.edu/pks/lookup?op=vindex&amp;amp;search=0x773EF6EF68716A14]&lt;br /&gt;
&lt;br /&gt;
Anyone can contribute Yocto with security patches as before, but those volunteering to this security team will sync/organize security related activities and take more responsibility&lt;br /&gt;
&lt;br /&gt;
== Branches maintained with security fixes  ==&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! Major version&lt;br /&gt;
! Current Version&lt;br /&gt;
! Branch name&lt;br /&gt;
! BitBake version&lt;br /&gt;
! Maintainer&lt;br /&gt;
|-&lt;br /&gt;
|1.7&lt;br /&gt;
|1.7&lt;br /&gt;
|dizzy&lt;br /&gt;
|1.24&lt;br /&gt;
|Armin Kuster &amp;lt;akuster808@gmail.com&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
|1.6&lt;br /&gt;
|1.6.1&lt;br /&gt;
|daisy&lt;br /&gt;
|1.22&lt;br /&gt;
|Saul Wold &amp;lt;sgw@linux.intel.com&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
|1.5&lt;br /&gt;
|1.5.3&lt;br /&gt;
|dora&lt;br /&gt;
|1.20&lt;br /&gt;
|Robert Yang &amp;lt;liezhi.yang@windriver.com&amp;gt;&lt;br /&gt;
|- style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|1.4&lt;br /&gt;
|1.4.3[https://lists.yoctoproject.org/pipermail/yocto/2014-July/020699.html *]&lt;br /&gt;
|dylan&lt;br /&gt;
|1.18&lt;br /&gt;
|Paul Eggleton &amp;lt;paul.eggleton@linux.intel.com&amp;gt;&lt;br /&gt;
|- style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|1.3&lt;br /&gt;
|1.3.2&lt;br /&gt;
|danny&lt;br /&gt;
|1.16&lt;br /&gt;
|Ross Burton &amp;lt;ross.burton@intel.com&amp;gt;&lt;br /&gt;
|- style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
All CVEs (security patches) should be backported to all branches above (if at all possible). &lt;br /&gt;
Versions in grey are no longer actively maintained, but well-tested security patches may still be accepted for them.) &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
See [https://wiki.yoctoproject.org/wiki/Stable_branch_maintenance Stable branches maintenance]for detailed info regarding the policies and maintenance of Stable branch&lt;br /&gt;
&lt;br /&gt;
== Kernel security patches ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Kernel security patches are backported to Linux-yoco kernels regularly from https://www.kernel.org/&lt;br /&gt;
=== Linux-yocto ===&lt;br /&gt;
linux-yocto_3.10 &amp;amp; linux-yocto_3.14 (maintainer: Ross Burton)&lt;br /&gt;
&lt;br /&gt;
=== Vendor kernels ===&lt;br /&gt;
Kernel security patches are also backported to Linux-vendor kernels from https://www.kernel.org/&lt;br /&gt;
 &lt;br /&gt;
* meta-intel (meta-intel uses Linux-yocto)&lt;br /&gt;
* meta-fsl-ppc (maintainer: xxx)&lt;br /&gt;
* meta-fsl-arm (maintainer: xxx)&lt;br /&gt;
* meta-xilinx (maintainer: xxx)&lt;br /&gt;
* meta-ti (maintainer: xxx)&lt;br /&gt;
* etc&lt;br /&gt;
&lt;br /&gt;
== How to test ==&lt;br /&gt;
 &lt;br /&gt;
If there is any test case for the vulnerability by the upstream project or community&lt;br /&gt;
 - Run the test to reproduce the problem and verify the correction. &lt;br /&gt;
 - Run the regression test&lt;br /&gt;
&lt;br /&gt;
If there isn’t any test case and it is complicated and time consuming to write a testcase&lt;br /&gt;
 - Run the regressions test&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Regression test&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Build the core image for at least two architectures (preferably one big-endian and one little-endian)&lt;br /&gt;
* Run ptest (for those branches/packages that there is ptest mechanism)&lt;br /&gt;
&lt;br /&gt;
== Patch name convention and commit message ==&lt;br /&gt;
Security patches should have reference to the CVE identifier both in the patch file/s and the commit comment.&lt;br /&gt;
&lt;br /&gt;
Please make sure to add the package name in the subject and the reference to the CVE. Example for the commit comment: &lt;br /&gt;
&lt;br /&gt;
    bash: CVE-2014-6278&lt;br /&gt;
    &lt;br /&gt;
    &amp;lt;short description&amp;gt;&lt;br /&gt;
    &lt;br /&gt;
    &amp;lt;[YOCTO #xxx] if there is any&amp;gt;&lt;br /&gt;
    &lt;br /&gt;
    References&lt;br /&gt;
    E.g. [https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6278 link to CVE] or other useful info/blog/advisory.&lt;br /&gt;
    &lt;br /&gt;
    Signed-off-by: &lt;br /&gt;
    &lt;br /&gt;
For additional guidelines refer to: [http://openembedded.org/wiki/Commit_Patch_Message_Guidelines Commit Patch Message Guidelines]&lt;br /&gt;
&lt;br /&gt;
== Some security related links/useful tools ==&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
* [http://www.cvedetails.com CVE details] &lt;br /&gt;
* [http://www.cvedetails.com/vulnerability-list/vendor_id-33/product_id-47/year-2014/Linux-Linux-Kernel.html  CVE list, Linux kernel 2014]&lt;br /&gt;
* [https://www.yoctoproject.org/blogs/andrei-dinu/2013/meta-security-layer-now-available Meta-security-layer]&lt;br /&gt;
* [http://www.yoctoproject.org/docs/1.7/dev-manual/dev-manual.html#making-images-more-secure Making images more secure]&lt;br /&gt;
* [http://cvechecker.sourceforge.net Cvechecker]&lt;br /&gt;
&lt;br /&gt;
== Security Issues Addressed in Yocto Releases ==&lt;br /&gt;
&#039;&#039;&#039;Yocto 1.7.1 - Dizzy&#039;&#039;&#039; &lt;br /&gt;
https://www.yoctoproject.org/downloads/core/dizzy171&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Yocto 1.7 - Dizzy&#039;&#039;&#039; &lt;br /&gt;
https://www.yoctoproject.org/downloads/core/dizzy17&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Yocto 1.6 - Daisy&#039;&#039;&#039; &lt;br /&gt;
https://www.yoctoproject.org/downloads/core/daisy16&lt;/div&gt;</summary>
		<author><name>SonaSarmadi</name></author>
	</entry>
	<entry>
		<id>https://wiki.yoctoproject.org/wiki/index.php?title=Security&amp;diff=14201</id>
		<title>Security</title>
		<link rel="alternate" type="text/html" href="https://wiki.yoctoproject.org/wiki/index.php?title=Security&amp;diff=14201"/>
		<updated>2015-02-25T12:43:27Z</updated>

		<summary type="html">&lt;p&gt;SonaSarmadi: /* yocto Security Team */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Since the Yocto Project is intended to be flexible and meet the needs of many applications, we leave policy-making decisions around security to our end users. Our goal instead is to ship each release with metadata that follows best practices in that we do not release recipe versions which are known to have significant security vulnerabilities. Generally this is done by upgrading recipes to newer versions that are no longer vulnerable to these issues. &lt;br /&gt;
&lt;br /&gt;
Upgrading recipes to the newer versions in the maintenance branches is not always easy, this is why we provide a patch for the existing version instead if we detect a vulnerability in a package. The patches are added to the recipes, see example below:&lt;br /&gt;
&lt;br /&gt;
  poky/recipes-connectivity/bind/bind_9.9.5.bb&lt;br /&gt;
  &lt;br /&gt;
  SRC_URI = &amp;quot;ftp://ftp.isc.org/isc/bind9/${PV}/${BPN}-${PV}.tar.gz \&lt;br /&gt;
           file://conf.patch \&lt;br /&gt;
           ...&lt;br /&gt;
           file://bind9_9_5-CVE-2014-8500.patch \&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
We are tracking security vulnerabilities in the Yocto Project against the [http://nvd.nist.gov/home.cfm National Vulnerability Database]. &lt;br /&gt;
&lt;br /&gt;
We also track CVEs reported to the oss-security list (Open Source Software Security) http://www.openwall.com/lists/oss-security/&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Yocto Security Team ==&lt;br /&gt;
 &lt;br /&gt;
The purpose of creating a security team in the Yocto project is to discuss, sync and organize security related activities.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The team&#039;s main responsibilities among others are:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
*  Scanning of security forums/mailing list(s) to detect security vulnerabilities reported by community&lt;br /&gt;
*  Responsible for fixing CVEs in the Yocto releases &amp;amp; maintained branches&lt;br /&gt;
*  Evaluation of tools for security tests &lt;br /&gt;
*  Responsible for security related info in the Yocto documentations&lt;br /&gt;
*  Hardening of Yocto release&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;How to Contact Yocto&#039;s security team Securely&#039;&#039;&#039;&lt;br /&gt;
---------------------------------------------&lt;br /&gt;
Please send private vulnerability reports to security@yoctoprojct.org.&lt;br /&gt;
 &lt;br /&gt;
For secure communications, send your messages encrypted to sona.sarmadi@enea.com with the following GPG key:&lt;br /&gt;
&lt;br /&gt;
Download public key: [pgp.mit.edu][https://pgp.mit.edu/pks/lookup?op=vindex&amp;amp;search=0x773EF6EF68716A14]&lt;br /&gt;
&lt;br /&gt;
Anyone can contribute Yocto with security patches as before, but those volunteering to this security team will sync/organize security related activities and take more responsibility&lt;br /&gt;
&lt;br /&gt;
== Branches maintained with security fixes  ==&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! Major version&lt;br /&gt;
! Current Version&lt;br /&gt;
! Branch name&lt;br /&gt;
! BitBake version&lt;br /&gt;
! Maintainer&lt;br /&gt;
|-&lt;br /&gt;
|1.7&lt;br /&gt;
|1.7&lt;br /&gt;
|dizzy&lt;br /&gt;
|1.24&lt;br /&gt;
|Armin Kuster &amp;lt;akuster808@gmail.com&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
|1.6&lt;br /&gt;
|1.6.1&lt;br /&gt;
|daisy&lt;br /&gt;
|1.22&lt;br /&gt;
|Saul Wold &amp;lt;sgw@linux.intel.com&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
|1.5&lt;br /&gt;
|1.5.3&lt;br /&gt;
|dora&lt;br /&gt;
|1.20&lt;br /&gt;
|Robert Yang &amp;lt;liezhi.yang@windriver.com&amp;gt;&lt;br /&gt;
|- style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|1.4&lt;br /&gt;
|1.4.3[https://lists.yoctoproject.org/pipermail/yocto/2014-July/020699.html *]&lt;br /&gt;
|dylan&lt;br /&gt;
|1.18&lt;br /&gt;
|Paul Eggleton &amp;lt;paul.eggleton@linux.intel.com&amp;gt;&lt;br /&gt;
|- style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|1.3&lt;br /&gt;
|1.3.2&lt;br /&gt;
|danny&lt;br /&gt;
|1.16&lt;br /&gt;
|Ross Burton &amp;lt;ross.burton@intel.com&amp;gt;&lt;br /&gt;
|- style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
All CVEs (security patches) should be backported to all branches above (if at all possible). &lt;br /&gt;
Versions in grey are no longer actively maintained, but well-tested security patches may still be accepted for them.) &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
See [https://wiki.yoctoproject.org/wiki/Stable_branch_maintenance Stable branches maintenance]for detailed info regarding the policies and maintenance of Stable branch&lt;br /&gt;
&lt;br /&gt;
== Kernel security patches ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Kernel security patches are backported to Linux-yoco kernels regularly from https://www.kernel.org/&lt;br /&gt;
=== Linux-yocto ===&lt;br /&gt;
linux-yocto_3.10 &amp;amp; linux-yocto_3.14 (maintainer: Ross Burton)&lt;br /&gt;
&lt;br /&gt;
=== Vendor kernels ===&lt;br /&gt;
Kernel security patches are also backported to Linux-vendor kernels from https://www.kernel.org/&lt;br /&gt;
 &lt;br /&gt;
* meta-intel (meta-intel uses Linux-yocto)&lt;br /&gt;
* meta-fsl-ppc (maintainer: xxx)&lt;br /&gt;
* meta-fsl-arm (maintainer: xxx)&lt;br /&gt;
* meta-xilinx (maintainer: xxx)&lt;br /&gt;
* meta-ti (maintainer: xxx)&lt;br /&gt;
* etc&lt;br /&gt;
&lt;br /&gt;
== How to test ==&lt;br /&gt;
 &lt;br /&gt;
If there is any test case for the vulnerability by the upstream project or community&lt;br /&gt;
 - Run the test to reproduce the problem and verify the correction. &lt;br /&gt;
 - Run the regression test&lt;br /&gt;
&lt;br /&gt;
If there isn’t any test case and it is complicated and time consuming to write a testcase&lt;br /&gt;
 - Run the regressions test&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Regression test&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Build the core image for at least two architectures (preferably one big-endian and one little-endian)&lt;br /&gt;
* Run ptest (for those branches/packages that there is ptest mechanism)&lt;br /&gt;
&lt;br /&gt;
== Patch name convention and commit message ==&lt;br /&gt;
Security patches should have reference to the CVE identifier both in the patch file/s and the commit comment.&lt;br /&gt;
&lt;br /&gt;
Please make sure to add the package name in the subject and the reference to the CVE. Example for the commit comment: &lt;br /&gt;
&lt;br /&gt;
    bash: CVE-2014-6278&lt;br /&gt;
    &lt;br /&gt;
    &amp;lt;short description&amp;gt;&lt;br /&gt;
    &lt;br /&gt;
    &amp;lt;[YOCTO #xxx] if there is any&amp;gt;&lt;br /&gt;
    &lt;br /&gt;
    References&lt;br /&gt;
    E.g. [https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6278 link to CVE] or other useful info/blog/advisory.&lt;br /&gt;
    &lt;br /&gt;
    Signed-off-by: &lt;br /&gt;
    &lt;br /&gt;
For additional guidelines refer to: [http://openembedded.org/wiki/Commit_Patch_Message_Guidelines Commit Patch Message Guidelines]&lt;br /&gt;
&lt;br /&gt;
== Some security related links/useful tools ==&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
* [http://www.cvedetails.com CVE details] &lt;br /&gt;
* [http://www.cvedetails.com/vulnerability-list/vendor_id-33/product_id-47/year-2014/Linux-Linux-Kernel.html  CVE list, Linux kernel 2014]&lt;br /&gt;
* [https://www.yoctoproject.org/blogs/andrei-dinu/2013/meta-security-layer-now-available Meta-security-layer]&lt;br /&gt;
* [http://www.yoctoproject.org/docs/1.7/dev-manual/dev-manual.html#making-images-more-secure Making images more secure]&lt;br /&gt;
* [http://cvechecker.sourceforge.net Cvechecker]&lt;br /&gt;
&lt;br /&gt;
== Security Issues Addressed in Yocto Releases ==&lt;br /&gt;
&#039;&#039;&#039;Yocto 1.7.1 - Dizzy&#039;&#039;&#039; &lt;br /&gt;
https://www.yoctoproject.org/downloads/core/dizzy171&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Yocto 1.7 - Dizzy&#039;&#039;&#039; &lt;br /&gt;
https://www.yoctoproject.org/downloads/core/dizzy17&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Yocto 1.6 - Daisy&#039;&#039;&#039; &lt;br /&gt;
https://www.yoctoproject.org/downloads/core/daisy16&lt;/div&gt;</summary>
		<author><name>SonaSarmadi</name></author>
	</entry>
	<entry>
		<id>https://wiki.yoctoproject.org/wiki/index.php?title=Security&amp;diff=14200</id>
		<title>Security</title>
		<link rel="alternate" type="text/html" href="https://wiki.yoctoproject.org/wiki/index.php?title=Security&amp;diff=14200"/>
		<updated>2015-02-25T12:43:02Z</updated>

		<summary type="html">&lt;p&gt;SonaSarmadi: /* yocto Security Team */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Since the Yocto Project is intended to be flexible and meet the needs of many applications, we leave policy-making decisions around security to our end users. Our goal instead is to ship each release with metadata that follows best practices in that we do not release recipe versions which are known to have significant security vulnerabilities. Generally this is done by upgrading recipes to newer versions that are no longer vulnerable to these issues. &lt;br /&gt;
&lt;br /&gt;
Upgrading recipes to the newer versions in the maintenance branches is not always easy, this is why we provide a patch for the existing version instead if we detect a vulnerability in a package. The patches are added to the recipes, see example below:&lt;br /&gt;
&lt;br /&gt;
  poky/recipes-connectivity/bind/bind_9.9.5.bb&lt;br /&gt;
  &lt;br /&gt;
  SRC_URI = &amp;quot;ftp://ftp.isc.org/isc/bind9/${PV}/${BPN}-${PV}.tar.gz \&lt;br /&gt;
           file://conf.patch \&lt;br /&gt;
           ...&lt;br /&gt;
           file://bind9_9_5-CVE-2014-8500.patch \&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
We are tracking security vulnerabilities in the Yocto Project against the [http://nvd.nist.gov/home.cfm National Vulnerability Database]. &lt;br /&gt;
&lt;br /&gt;
We also track CVEs reported to the oss-security list (Open Source Software Security) http://www.openwall.com/lists/oss-security/&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== yocto Security Team ==&lt;br /&gt;
 &lt;br /&gt;
The purpose of creating a security team in the Yocto project is to discuss, sync and organize security related activities.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The team&#039;s main responsibilities among others are:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
*  Scanning of security forums/mailing list(s) to detect security vulnerabilities reported by community&lt;br /&gt;
*  Responsible for fixing CVEs in the Yocto releases &amp;amp; maintained branches&lt;br /&gt;
*  Evaluation of tools for security tests &lt;br /&gt;
*  Responsible for security related info in the Yocto documentations&lt;br /&gt;
*  Hardening of Yocto release&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;How to Contact Yocto&#039;s security team Securely&#039;&#039;&#039;&lt;br /&gt;
---------------------------------------------&lt;br /&gt;
Please send private vulnerability reports to security@yoctoprojct.org.&lt;br /&gt;
 &lt;br /&gt;
For secure communications, send your messages encrypted to sona.sarmadi@enea.com with the following GPG key:&lt;br /&gt;
&lt;br /&gt;
Download public key: [pgp.mit.edu][https://pgp.mit.edu/pks/lookup?op=vindex&amp;amp;search=0x773EF6EF68716A14]&lt;br /&gt;
&lt;br /&gt;
Anyone can contribute Yocto with security patches as before, but those volunteering to this security team will sync/organize security related activities and take more responsibility&lt;br /&gt;
&lt;br /&gt;
== Branches maintained with security fixes  ==&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! Major version&lt;br /&gt;
! Current Version&lt;br /&gt;
! Branch name&lt;br /&gt;
! BitBake version&lt;br /&gt;
! Maintainer&lt;br /&gt;
|-&lt;br /&gt;
|1.7&lt;br /&gt;
|1.7&lt;br /&gt;
|dizzy&lt;br /&gt;
|1.24&lt;br /&gt;
|Armin Kuster &amp;lt;akuster808@gmail.com&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
|1.6&lt;br /&gt;
|1.6.1&lt;br /&gt;
|daisy&lt;br /&gt;
|1.22&lt;br /&gt;
|Saul Wold &amp;lt;sgw@linux.intel.com&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
|1.5&lt;br /&gt;
|1.5.3&lt;br /&gt;
|dora&lt;br /&gt;
|1.20&lt;br /&gt;
|Robert Yang &amp;lt;liezhi.yang@windriver.com&amp;gt;&lt;br /&gt;
|- style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|1.4&lt;br /&gt;
|1.4.3[https://lists.yoctoproject.org/pipermail/yocto/2014-July/020699.html *]&lt;br /&gt;
|dylan&lt;br /&gt;
|1.18&lt;br /&gt;
|Paul Eggleton &amp;lt;paul.eggleton@linux.intel.com&amp;gt;&lt;br /&gt;
|- style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|1.3&lt;br /&gt;
|1.3.2&lt;br /&gt;
|danny&lt;br /&gt;
|1.16&lt;br /&gt;
|Ross Burton &amp;lt;ross.burton@intel.com&amp;gt;&lt;br /&gt;
|- style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
All CVEs (security patches) should be backported to all branches above (if at all possible). &lt;br /&gt;
Versions in grey are no longer actively maintained, but well-tested security patches may still be accepted for them.) &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
See [https://wiki.yoctoproject.org/wiki/Stable_branch_maintenance Stable branches maintenance]for detailed info regarding the policies and maintenance of Stable branch&lt;br /&gt;
&lt;br /&gt;
== Kernel security patches ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Kernel security patches are backported to Linux-yoco kernels regularly from https://www.kernel.org/&lt;br /&gt;
=== Linux-yocto ===&lt;br /&gt;
linux-yocto_3.10 &amp;amp; linux-yocto_3.14 (maintainer: Ross Burton)&lt;br /&gt;
&lt;br /&gt;
=== Vendor kernels ===&lt;br /&gt;
Kernel security patches are also backported to Linux-vendor kernels from https://www.kernel.org/&lt;br /&gt;
 &lt;br /&gt;
* meta-intel (meta-intel uses Linux-yocto)&lt;br /&gt;
* meta-fsl-ppc (maintainer: xxx)&lt;br /&gt;
* meta-fsl-arm (maintainer: xxx)&lt;br /&gt;
* meta-xilinx (maintainer: xxx)&lt;br /&gt;
* meta-ti (maintainer: xxx)&lt;br /&gt;
* etc&lt;br /&gt;
&lt;br /&gt;
== How to test ==&lt;br /&gt;
 &lt;br /&gt;
If there is any test case for the vulnerability by the upstream project or community&lt;br /&gt;
 - Run the test to reproduce the problem and verify the correction. &lt;br /&gt;
 - Run the regression test&lt;br /&gt;
&lt;br /&gt;
If there isn’t any test case and it is complicated and time consuming to write a testcase&lt;br /&gt;
 - Run the regressions test&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Regression test&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Build the core image for at least two architectures (preferably one big-endian and one little-endian)&lt;br /&gt;
* Run ptest (for those branches/packages that there is ptest mechanism)&lt;br /&gt;
&lt;br /&gt;
== Patch name convention and commit message ==&lt;br /&gt;
Security patches should have reference to the CVE identifier both in the patch file/s and the commit comment.&lt;br /&gt;
&lt;br /&gt;
Please make sure to add the package name in the subject and the reference to the CVE. Example for the commit comment: &lt;br /&gt;
&lt;br /&gt;
    bash: CVE-2014-6278&lt;br /&gt;
    &lt;br /&gt;
    &amp;lt;short description&amp;gt;&lt;br /&gt;
    &lt;br /&gt;
    &amp;lt;[YOCTO #xxx] if there is any&amp;gt;&lt;br /&gt;
    &lt;br /&gt;
    References&lt;br /&gt;
    E.g. [https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6278 link to CVE] or other useful info/blog/advisory.&lt;br /&gt;
    &lt;br /&gt;
    Signed-off-by: &lt;br /&gt;
    &lt;br /&gt;
For additional guidelines refer to: [http://openembedded.org/wiki/Commit_Patch_Message_Guidelines Commit Patch Message Guidelines]&lt;br /&gt;
&lt;br /&gt;
== Some security related links/useful tools ==&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
* [http://www.cvedetails.com CVE details] &lt;br /&gt;
* [http://www.cvedetails.com/vulnerability-list/vendor_id-33/product_id-47/year-2014/Linux-Linux-Kernel.html  CVE list, Linux kernel 2014]&lt;br /&gt;
* [https://www.yoctoproject.org/blogs/andrei-dinu/2013/meta-security-layer-now-available Meta-security-layer]&lt;br /&gt;
* [http://www.yoctoproject.org/docs/1.7/dev-manual/dev-manual.html#making-images-more-secure Making images more secure]&lt;br /&gt;
* [http://cvechecker.sourceforge.net Cvechecker]&lt;br /&gt;
&lt;br /&gt;
== Security Issues Addressed in Yocto Releases ==&lt;br /&gt;
&#039;&#039;&#039;Yocto 1.7.1 - Dizzy&#039;&#039;&#039; &lt;br /&gt;
https://www.yoctoproject.org/downloads/core/dizzy171&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Yocto 1.7 - Dizzy&#039;&#039;&#039; &lt;br /&gt;
https://www.yoctoproject.org/downloads/core/dizzy17&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Yocto 1.6 - Daisy&#039;&#039;&#039; &lt;br /&gt;
https://www.yoctoproject.org/downloads/core/daisy16&lt;/div&gt;</summary>
		<author><name>SonaSarmadi</name></author>
	</entry>
	<entry>
		<id>https://wiki.yoctoproject.org/wiki/index.php?title=Security&amp;diff=14199</id>
		<title>Security</title>
		<link rel="alternate" type="text/html" href="https://wiki.yoctoproject.org/wiki/index.php?title=Security&amp;diff=14199"/>
		<updated>2015-02-25T12:41:29Z</updated>

		<summary type="html">&lt;p&gt;SonaSarmadi: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Since the Yocto Project is intended to be flexible and meet the needs of many applications, we leave policy-making decisions around security to our end users. Our goal instead is to ship each release with metadata that follows best practices in that we do not release recipe versions which are known to have significant security vulnerabilities. Generally this is done by upgrading recipes to newer versions that are no longer vulnerable to these issues. &lt;br /&gt;
&lt;br /&gt;
Upgrading recipes to the newer versions in the maintenance branches is not always easy, this is why we provide a patch for the existing version instead if we detect a vulnerability in a package. The patches are added to the recipes, see example below:&lt;br /&gt;
&lt;br /&gt;
  poky/recipes-connectivity/bind/bind_9.9.5.bb&lt;br /&gt;
  &lt;br /&gt;
  SRC_URI = &amp;quot;ftp://ftp.isc.org/isc/bind9/${PV}/${BPN}-${PV}.tar.gz \&lt;br /&gt;
           file://conf.patch \&lt;br /&gt;
           ...&lt;br /&gt;
           file://bind9_9_5-CVE-2014-8500.patch \&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
We are tracking security vulnerabilities in the Yocto Project against the [http://nvd.nist.gov/home.cfm National Vulnerability Database]. &lt;br /&gt;
&lt;br /&gt;
We also track CVEs reported to the oss-security list (Open Source Software Security) http://www.openwall.com/lists/oss-security/&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== yocto Security Team ==&lt;br /&gt;
 &lt;br /&gt;
The purpose of creating a security team in the Yocto project is to discuss, sync and organize security related activities.&lt;br /&gt;
&lt;br /&gt;
The team&#039;s main responsibility among others is:&lt;br /&gt;
&lt;br /&gt;
*  Scanning of security forums/mailing list(s) to detect security vulnerabilities reported by community&lt;br /&gt;
*  Responsible for fixing CVEs in the Yocto releases &amp;amp; maintained branches&lt;br /&gt;
*  Evaluation of tools for security tests &lt;br /&gt;
*  Responsible for security related info in the Yocto documentations&lt;br /&gt;
*  Hardening of Yocto release&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;How to Contact Yocto&#039;s security team Securely&#039;&#039;&#039;&lt;br /&gt;
---------------------------------------------&lt;br /&gt;
Please send private vulnerability reports to security@yoctoprojct.org.&lt;br /&gt;
 &lt;br /&gt;
For secure communications, send your messages encrypted to sona.sarmadi@enea.com with the following GPG key:&lt;br /&gt;
&lt;br /&gt;
Download public key: [pgp.mit.edu][https://pgp.mit.edu/pks/lookup?op=vindex&amp;amp;search=0x773EF6EF68716A14]&lt;br /&gt;
&lt;br /&gt;
Anyone can contribute Yocto with security patches as before, but those volunteering to this security team will sync/organize security related activities and take more responsibility&lt;br /&gt;
&lt;br /&gt;
== Branches maintained with security fixes  ==&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! Major version&lt;br /&gt;
! Current Version&lt;br /&gt;
! Branch name&lt;br /&gt;
! BitBake version&lt;br /&gt;
! Maintainer&lt;br /&gt;
|-&lt;br /&gt;
|1.7&lt;br /&gt;
|1.7&lt;br /&gt;
|dizzy&lt;br /&gt;
|1.24&lt;br /&gt;
|Armin Kuster &amp;lt;akuster808@gmail.com&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
|1.6&lt;br /&gt;
|1.6.1&lt;br /&gt;
|daisy&lt;br /&gt;
|1.22&lt;br /&gt;
|Saul Wold &amp;lt;sgw@linux.intel.com&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
|1.5&lt;br /&gt;
|1.5.3&lt;br /&gt;
|dora&lt;br /&gt;
|1.20&lt;br /&gt;
|Robert Yang &amp;lt;liezhi.yang@windriver.com&amp;gt;&lt;br /&gt;
|- style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|1.4&lt;br /&gt;
|1.4.3[https://lists.yoctoproject.org/pipermail/yocto/2014-July/020699.html *]&lt;br /&gt;
|dylan&lt;br /&gt;
|1.18&lt;br /&gt;
|Paul Eggleton &amp;lt;paul.eggleton@linux.intel.com&amp;gt;&lt;br /&gt;
|- style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|1.3&lt;br /&gt;
|1.3.2&lt;br /&gt;
|danny&lt;br /&gt;
|1.16&lt;br /&gt;
|Ross Burton &amp;lt;ross.burton@intel.com&amp;gt;&lt;br /&gt;
|- style=&amp;quot;color: slategray;&amp;quot;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
All CVEs (security patches) should be backported to all branches above (if at all possible). &lt;br /&gt;
Versions in grey are no longer actively maintained, but well-tested security patches may still be accepted for them.) &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
See [https://wiki.yoctoproject.org/wiki/Stable_branch_maintenance Stable branches maintenance]for detailed info regarding the policies and maintenance of Stable branch&lt;br /&gt;
&lt;br /&gt;
== Kernel security patches ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Kernel security patches are backported to Linux-yoco kernels regularly from https://www.kernel.org/&lt;br /&gt;
=== Linux-yocto ===&lt;br /&gt;
linux-yocto_3.10 &amp;amp; linux-yocto_3.14 (maintainer: Ross Burton)&lt;br /&gt;
&lt;br /&gt;
=== Vendor kernels ===&lt;br /&gt;
Kernel security patches are also backported to Linux-vendor kernels from https://www.kernel.org/&lt;br /&gt;
 &lt;br /&gt;
* meta-intel (meta-intel uses Linux-yocto)&lt;br /&gt;
* meta-fsl-ppc (maintainer: xxx)&lt;br /&gt;
* meta-fsl-arm (maintainer: xxx)&lt;br /&gt;
* meta-xilinx (maintainer: xxx)&lt;br /&gt;
* meta-ti (maintainer: xxx)&lt;br /&gt;
* etc&lt;br /&gt;
&lt;br /&gt;
== How to test ==&lt;br /&gt;
 &lt;br /&gt;
If there is any test case for the vulnerability by the upstream project or community&lt;br /&gt;
 - Run the test to reproduce the problem and verify the correction. &lt;br /&gt;
 - Run the regression test&lt;br /&gt;
&lt;br /&gt;
If there isn’t any test case and it is complicated and time consuming to write a testcase&lt;br /&gt;
 - Run the regressions test&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Regression test&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Build the core image for at least two architectures (preferably one big-endian and one little-endian)&lt;br /&gt;
* Run ptest (for those branches/packages that there is ptest mechanism)&lt;br /&gt;
&lt;br /&gt;
== Patch name convention and commit message ==&lt;br /&gt;
Security patches should have reference to the CVE identifier both in the patch file/s and the commit comment.&lt;br /&gt;
&lt;br /&gt;
Please make sure to add the package name in the subject and the reference to the CVE. Example for the commit comment: &lt;br /&gt;
&lt;br /&gt;
    bash: CVE-2014-6278&lt;br /&gt;
    &lt;br /&gt;
    &amp;lt;short description&amp;gt;&lt;br /&gt;
    &lt;br /&gt;
    &amp;lt;[YOCTO #xxx] if there is any&amp;gt;&lt;br /&gt;
    &lt;br /&gt;
    References&lt;br /&gt;
    E.g. [https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6278 link to CVE] or other useful info/blog/advisory.&lt;br /&gt;
    &lt;br /&gt;
    Signed-off-by: &lt;br /&gt;
    &lt;br /&gt;
For additional guidelines refer to: [http://openembedded.org/wiki/Commit_Patch_Message_Guidelines Commit Patch Message Guidelines]&lt;br /&gt;
&lt;br /&gt;
== Some security related links/useful tools ==&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
* [http://www.cvedetails.com CVE details] &lt;br /&gt;
* [http://www.cvedetails.com/vulnerability-list/vendor_id-33/product_id-47/year-2014/Linux-Linux-Kernel.html  CVE list, Linux kernel 2014]&lt;br /&gt;
* [https://www.yoctoproject.org/blogs/andrei-dinu/2013/meta-security-layer-now-available Meta-security-layer]&lt;br /&gt;
* [http://www.yoctoproject.org/docs/1.7/dev-manual/dev-manual.html#making-images-more-secure Making images more secure]&lt;br /&gt;
* [http://cvechecker.sourceforge.net Cvechecker]&lt;br /&gt;
&lt;br /&gt;
== Security Issues Addressed in Yocto Releases ==&lt;br /&gt;
&#039;&#039;&#039;Yocto 1.7.1 - Dizzy&#039;&#039;&#039; &lt;br /&gt;
https://www.yoctoproject.org/downloads/core/dizzy171&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Yocto 1.7 - Dizzy&#039;&#039;&#039; &lt;br /&gt;
https://www.yoctoproject.org/downloads/core/dizzy17&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Yocto 1.6 - Daisy&#039;&#039;&#039; &lt;br /&gt;
https://www.yoctoproject.org/downloads/core/daisy16&lt;/div&gt;</summary>
		<author><name>SonaSarmadi</name></author>
	</entry>
</feed>