Fixing "lucky 13" CVE-2013-0169 in gnutls28
Julien Cristau
jcristau at debian.org
Sun Mar 17 18:19:19 UTC 2013
On Sun, Mar 17, 2013 at 16:00:29 +0100, Andreas Metzler wrote:
> On 2013-02-23 Julien Cristau <jcristau at debian.org> wrote:
> > The plan seems ok to me in general.
>
> > On Sat, Feb 23, 2013 at 18:37:12 +0100, Andreas Metzler wrote:
>
> > > +# workaround for guile testsuite failure.
> > > +ifneq (,$(filter $(DEB_BUILD_ARCH),armel armhf mipsel))
> > > + DEB_CONFIGURE_EXTRA_FLAGS += --disable-largefile
> > > +endif
> > > +
>
> > Disabling lfs because of guile sounds fairly bad though, assuming this
> > is what this does...
>
> As you do not ssem to be convinced, how about plan B:
>
> 1. Upload proposed packages.
> 2. If armel armhf mipsel break due to --disable-largefile stop using
> --disable-largefile there and stop providing guile-gnutls on these
> archs.
>
OK I think I'm confused. How would you detect breakage due to
disable-largefile?
Cheers,
Julien
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 836 bytes
Desc: Digital signature
URL: <http://lists.alioth.debian.org/pipermail/pkg-gnutls-maint/attachments/20130317/c48aabea/attachment.pgp>
More information about the Pkg-gnutls-maint
mailing list