[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#692065: RFS: mcrypt/2.6.8-1.3 [RC][NMU]



On Friday 02 November 2012 17:58:08 you wrote:
> (...) 
> Again, determining the "right" solution would be best to discuss on
> the redhat bug or preferably with upstream.

Ok. I did post that on redhat bugzilla.
upstream did not publish anything for years...

> Until those things happen, I am going to suggest that we as potential
> sponsors wait for a "right" solution to work out.

Oh? This will take a while then.

I'm not sure it's smart to use the redhat patch, but it is safe.
And we need to be safe.
Some DD needs to apply the 2 nd patch of redhat [1] "80-width patch"
if we want this RC fixed soon. The first patch does not work.

I don't see the point to upload a version of just that to mentors.
Just use:
patch -p 1 < 80-width patch
, update the changelog and you're done with the NMU.

Cheers

[1] https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-4527

Attachment: signature.asc
Description: This is a digitally signed message part.


Reply to: