[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: [PATCH] gnu: glibc: Update patches following upstream's master branc
From: |
Ludovic Courtès |
Subject: |
Re: [PATCH] gnu: glibc: Update patches following upstream's master branch. |
Date: |
Tue, 14 May 2024 11:22:23 +0200 |
User-agent: |
Gnus/5.13 (Gnus v5.13) |
Hi,
Josselin Poiret <dev@jpoiret.xyz> skribis:
> From: Josselin Poiret <dev@jpoiret.xyz>
>
> * gnu/packages/patches/glibc-2.39-git-updates.patch: New patch.
> * gnu/local.mk (dist_patch_DATA): Register it.
> * gnu/packages/base.scm (glibc): Use it.
>
> Change-Id: I13ff3fa2eddd8296d138f87c9069487e9543b3bd
> ---
> How about the following patch?
[...]
> + (patches (search-patches "glibc-2.39-git-updates.patch"
> + "glibc-ldd-powerpc.patch"
> "glibc-2.38-ldd-x86_64.patch"
> "glibc-dl-cache.patch"
> "glibc-2.37-versioned-locpath.patch"
As discussed on IRC, I would suggest one file per security fix, with
“CVE-xyz” in the file name so that ‘guix lint’ can recognize it.
But if that’s too tedious/inconvenient, let’s do it like you did here.
In that case, we also need to add the ‘lint-hidden-cve’ package
property.
So I’d say you can go ahead with one of these two approaches. Either
way, what matters here is to make sure we remove the glibc graft.
Thank you!
Ludo’.
- Re: Core updates status, Josselin Poiret, 2024/05/05
- Re: Core updates status, Andreas Enge, 2024/05/08
- Re: Core updates status, Felix Lechner, 2024/05/08
- Re: Core updates status, Maxim Cournoyer, 2024/05/09
- Re: Core updates status, Andreas Enge, 2024/05/10
- Re: Core updates status, Efraim Flashner, 2024/05/13