[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#1025789: bullseye-pu: wolfssl/4.6.0+p1-0+deb11u1_4.6.0+p1-0+deb11u2.debdiff



Control: tag -1 - moreinfo
X-Debbugs-Cc: sirkilamole@msn.com

On Wed, 15 Mar 2023 21:28:46 +0000 Jonathan Wiltshire <jmw@debian.org> wrote:
On Thu, Dec 08, 2022 at 08:07:09PM -0800, Felix Lechner wrote:
> diff -Nru wolfssl-4.6.0+p1/debian/changelog.dch wolfssl-4.6.0+p1/debian/changelog.dch
> --- wolfssl-4.6.0+p1/debian/changelog.dch	1970-01-01 00:00:00.000000000 +0000
> +++ wolfssl-4.6.0+p1/debian/changelog.dch	2022-12-06 08:25:30.000000000 +0000
[...]

Stray file?

> diff -Nru wolfssl-4.6.0+p1/debian/patches/add-WOLFSSL_CHECK_SIG_FAULTS-macro.patch wolfssl-4.6.0+p1/debian/patches/add-WOLFSSL_CHECK_SIG_FAULTS-macro.patch
> --- wolfssl-4.6.0+p1/debian/patches/add-WOLFSSL_CHECK_SIG_FAULTS-macro.patch	1970-01-01 00:00:00.000000000 +0000
> +++ wolfssl-4.6.0+p1/debian/patches/add-WOLFSSL_CHECK_SIG_FAULTS-macro.patch	2022-12-06 08:25:30.000000000 +0000
> @@ -0,0 +1,154 @@
> +Description: PR 5498: CVE-2022-42961
> +Author: Jacob Barthelmeh <jacob@wolfssl.com>
> +Origin: backport

Origin would typically be a URL, and a description of what the patch fixes
(not just a bare CVE number) would be nice.
I have addressed the concerns with the attached debdiff.

Attachment: wolfssl_4.6.0+p1-0+deb11u2.debdiff.xz
Description: application/xz


Reply to: