Le 28/07/2014 16:03, Peter Robinson a écrit :
>>> If the udpate broke packages: a) it should not have been updated on stable
>>> releases (was it?),
>>
>> Two updates have been filed hours ago,
>>
>>   https://admin.fedoraproject.org/updates/json-c-0.12-1.fc20
>>   https://admin.fedoraproject.org/updates/json-c-0.12-1.el6
>>
>> and it seems the upgrade has not been examined at all. I've mentioned in
>> bugzilla that there are tools such as rpmsodiff and abi-compliance-checker.
> 
> There is no way an intrusive change such as this should be going
> through to a stable release such as F-20, even worse for an EPEL
> release. If it's deemed that a change such as this needs to go through
> to a stable release due to something severe such as a security issue
> it needs to announced before it happens and coordinated widely before
> randomly being pushed without any details with dependent libraries and
> applications.
> 
> Peter
> 

And despite the update claims to fix CVE-2013-6371, this one was already
fixed in
https://admin.fedoraproject.org/updates/FEDORA-2014-5006

Remi.

-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Reply via email to