[Bug 798738] Review request: mysqlenum - is an automatic blind SQL injection tool.
bugzilla at redhat.com
bugzilla at redhat.com
Sat Mar 3 11:11:53 UTC 2012
Please do not reply directly to this email. All additional
comments should be made in the comments box of this bug.
https://bugzilla.redhat.com/show_bug.cgi?id=798738
Athmane Madjoudj <athmanem at gmail.com> changed:
What |Removed |Added
----------------------------------------------------------------------------
CC| |athmanem at gmail.com
Blocks| |563471(FE-SECLAB)
--- Comment #4 from Athmane Madjoudj <athmanem at gmail.com> 2012-03-03 06:11:52 EST ---
Here's some comments:
- Source0 should be point to upstream ie:
http://www.andreafabrizi.it/download.php?file=mysqlenum-0.3.tar.gz
- Use %{version} macro instead of hard coded version (eg: in Source0)
- %{_sysconfdir}/mysqlenum.conf should be marked as %config
I added FE-SECLAB blocker since this package is in Security Lab spin wishlist.
--
Configure bugmail: https://bugzilla.redhat.com/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are on the CC list for the bug.
More information about the package-review
mailing list