forked from rpms/openssl
- keep the beta status in version number at 3 so we do not have to rebuild
openssh and possibly other dependencies with too strict version check
This commit is contained in:
parent
654ccf4a2f
commit
a9fcedd3fb
@ -60,6 +60,7 @@ Patch47: openssl-0.9.8j-readme-warning.patch
|
|||||||
Patch48: openssl-0.9.8j-bad-mime.patch
|
Patch48: openssl-0.9.8j-bad-mime.patch
|
||||||
Patch49: openssl-1.0.0-beta4-algo-doc.patch
|
Patch49: openssl-1.0.0-beta4-algo-doc.patch
|
||||||
Patch50: openssl-1.0.0-beta4-dtls1-abi.patch
|
Patch50: openssl-1.0.0-beta4-dtls1-abi.patch
|
||||||
|
Patch51: openssl-1.0.0-beta4-version.patch
|
||||||
# Backported fixes including security fixes
|
# Backported fixes including security fixes
|
||||||
Patch60: openssl-1.0.0-beta4-reneg.patch
|
Patch60: openssl-1.0.0-beta4-reneg.patch
|
||||||
|
|
||||||
@ -139,6 +140,7 @@ from other formats to the formats used by the OpenSSL toolkit.
|
|||||||
%patch48 -p1 -b .bad-mime
|
%patch48 -p1 -b .bad-mime
|
||||||
%patch49 -p1 -b .algo-doc
|
%patch49 -p1 -b .algo-doc
|
||||||
%patch50 -p1 -b .dtls1-abi
|
%patch50 -p1 -b .dtls1-abi
|
||||||
|
%patch51 -p1 -b .version
|
||||||
|
|
||||||
%patch60 -p1 -b .reneg
|
%patch60 -p1 -b .reneg
|
||||||
|
|
||||||
@ -389,6 +391,10 @@ rm -rf $RPM_BUILD_ROOT/%{_libdir}/fipscanister.*
|
|||||||
%postun -p /sbin/ldconfig
|
%postun -p /sbin/ldconfig
|
||||||
|
|
||||||
%changelog
|
%changelog
|
||||||
|
* Fri Nov 13 2009 Tomas Mraz <tmraz@redhat.com> 1.0.0-0.12.beta4
|
||||||
|
- keep the beta status in version number at 3 so we do not have to rebuild
|
||||||
|
openssh and possibly other dependencies with too strict version check
|
||||||
|
|
||||||
* Thu Nov 12 2009 Tomas Mraz <tmraz@redhat.com> 1.0.0-0.11.beta4
|
* Thu Nov 12 2009 Tomas Mraz <tmraz@redhat.com> 1.0.0-0.11.beta4
|
||||||
- update to new upstream version, no soname bump needed
|
- update to new upstream version, no soname bump needed
|
||||||
- fix CVE-2009-3555 - note that the fix is bypassed if SSL_OP_ALL is used
|
- fix CVE-2009-3555 - note that the fix is bypassed if SSL_OP_ALL is used
|
||||||
|
Loading…
Reference in New Issue
Block a user