Fixing "lucky 13" CVE-2013-0169 in gnutls28

Julien Cristau jcristau at debian.org
Sun Mar 17 18:19:19 UTC 2013


On Sun, Mar 17, 2013 at 16:00:29 +0100, Andreas Metzler wrote:

> On 2013-02-23 Julien Cristau <jcristau at debian.org> wrote:
> > The plan seems ok to me in general.
> 
> > On Sat, Feb 23, 2013 at 18:37:12 +0100, Andreas Metzler wrote:
> 
> > > +# workaround for guile testsuite failure.
> > > +ifneq (,$(filter $(DEB_BUILD_ARCH),armel armhf mipsel))
> > > +	DEB_CONFIGURE_EXTRA_FLAGS += --disable-largefile
> > > +endif
> > > +
> 
> > Disabling lfs because of guile sounds fairly bad though, assuming this
> > is what this does...
> 
> As you do not ssem to be convinced, how about plan B:
> 
> 1. Upload proposed packages.
> 2. If armel armhf mipsel break due to --disable-largefile stop using
> --disable-largefile there and stop providing guile-gnutls on these
> archs.
> 
OK I think I'm confused.  How would you detect breakage due to
disable-largefile?

Cheers,
Julien
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 836 bytes
Desc: Digital signature
URL: <http://lists.alioth.debian.org/pipermail/pkg-gnutls-maint/attachments/20130317/c48aabea/attachment.pgp>


More information about the Pkg-gnutls-maint mailing list