Valid Sender ? - Re: cvs commit: ports/security/openssl Makefile
Kris Kennaway
kris at obsecurity.org
Tue Oct 4 10:45:14 PDT 2005
On Tue, Oct 04, 2005 at 07:00:53PM +0200, Dirk Meyer wrote:
> Kris Kennaway schrieb:,
>
> > > Log:
> > > - bump SHLIB version
> > > The API of openssl 0.9.8 ist compatible but not identical.
> > > This version bump might break build of all ports that try
> > > to include the opessl in base at the same time.
> > > That ports should be fixed.
> >
> > This change should probably have waited until after 6.0. It's going
> > to have significant follow-on effects that may prevent me from fixing
> > security vulnerabilities in 6.0-RELEASE packages. Do you think this
> > will not be the case?
>
> No ...
> As you might see in the cvs Revision 1.100 is tagged with RELEASE_6_0_0
> The update of openssl 0.9.8 was commited after this.
And when you commit a fix to some other port and then it has a
security vulnerability, I can't slip the tag without worrying whether
you've broken the package on 6.0 with the previous version of openssl.
Kris
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 187 bytes
Desc: not available
Url : http://lists.freebsd.org/pipermail/cvs-all/attachments/20051004/f1812fb2/attachment.bin
More information about the cvs-all
mailing list