Comment 7 for bug 2018252

Revision history for this message
Alex Gaynor (alex-gaynor) wrote :

Hi Steve,

Can you explain a bit more on what you're looking for in terms of a test plan?

As the SRU states, it's been in upstream for nearly a year, and backported to Debian and RHEL (EPEL) already as well (for something like 6 months). Therefore it's received widespread real-world testing.

I've also manually verified that without this patch, CSRs generated by the package raise an exception on parsing with pyca/cryptography 40, but with the patch they are parsed successfully. pyca/cryptography enforces validity of CSR version.