Hi, My name is Sona Sarmadi and I am responsible for security in Enea Linux.
Our goal is to apply security patches to the Linux kernels in our distribution, in order to test and make the patches available for our customers as soon as possible. When we apply a patch, we always build an image (e.g. for P4080) and run ptest to verify the patch. So far we have fixed security patches for chip-vendor-supplied kernels in our own layer meta-enea, but we would like to change this policy and apply the security patches directly in the hardware-specific layer, e.g. meta-fsl-ppc, and upstream them to the layer maintainers. In this way, others can also get the patch. There are more advantages with fixing the patches in the hardware-specific layer and upstreaming them compared to fixing them in our own meta-enea layer. We are very interested in your maintenance policy and your opinion about receiving patches from Enea. Best Regards Sona Sona Sarmadi Software Engineer/Security Responsible for Enea Linux Enea Jan Stenbecks torg 17, Box 1033, SE-164 21 Kista, Sweden Direct: +46 8 5071 4475 Mobile: +46 70 971 4475 [email protected] www.enea.com This message, including attachments, is CONFIDENTIAL. It may also be privileged or otherwise protected by law. If you received this email by mistake please let us know by reply and then delete it from your system; you should not copy it or disclose its contents to anyone. -- _______________________________________________ meta-freescale mailing list [email protected] https://lists.yoctoproject.org/listinfo/meta-freescale
