From 1be510f9529cb082f802408b472a77d074b394c0 Mon Sep 17 00:00:00 2001 From: Nicolas Vigier Date: Sun, 14 Apr 2013 13:46:12 +0000 Subject: Add zarb MLs html archives --- zarb-ml/mageia-dev/2012-February/011769.html | 122 +++++++++++++++++++++++++++ 1 file changed, 122 insertions(+) create mode 100644 zarb-ml/mageia-dev/2012-February/011769.html (limited to 'zarb-ml/mageia-dev/2012-February/011769.html') diff --git a/zarb-ml/mageia-dev/2012-February/011769.html b/zarb-ml/mageia-dev/2012-February/011769.html new file mode 100644 index 000000000..8c5ced8a9 --- /dev/null +++ b/zarb-ml/mageia-dev/2012-February/011769.html @@ -0,0 +1,122 @@ + + + + [Mageia-dev] [RFE] Bundled copies of system libraries - call for participation + + + + + + + + + +

[Mageia-dev] [RFE] Bundled copies of system libraries - call for participation

+ Pascal Terjan + pterjan at gmail.com +
+ Tue Feb 7 17:44:48 CET 2012 +

+
+ +
On Tue, Feb 7, 2012 at 16:41, Guillaume Rousse <guillomovitch at gmail.com> wrote:
+> Le 07/02/2012 17:19, David Walser a écrit :
+>
+>> Another thing that would be helpful related to this would be to have an
+>> install of rq in the Mageia infrastructure:
+>> https://fedorahosted.org/rq/
+>>
+>> It can be used to see when some code is affected by a security
+>> vulnerability if any other packages contain the same code.
+>
+> I guess you can use Sophie (http://sophie.zarb.org) for this kind of
+> queries.
+
+It has some more informations (symbols available in binaries, and
+source file names in the source tarballs, to find bundled copies of
+the vulnerable code)
+
+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
+

+ +
+More information about the Mageia-dev +mailing list
+ -- cgit v1.2.1