Bug 80589 - RFE: latest openssl
RFE: latest openssl
Status: CLOSED RAWHIDE
Product: Red Hat Public Beta
Classification: Retired
Component: openssl (Show other bugs)
phoebe
i386 Linux
medium Severity medium
: ---
: ---
Assigned To: Nalin Dahyabhai
Brian Brock
http://www.openssl.org/
: FutureFeature
Depends On:
Blocks:
  Show dependency treegraph
 
Reported: 2002-12-28 08:58 EST by Christopher McCrory
Modified: 2007-04-18 12:49 EDT (History)
1 user (show)

See Also:
Fixed In Version:
Doc Type: Enhancement
Doc Text:
Story Points: ---
Clone Of:
Environment:
Last Closed: 2003-01-09 17:36:58 EST
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)

  None (edit)
Description Christopher McCrory 2002-12-28 08:58:31 EST
From Bugzilla Helper:
User-Agent: Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.2.1) Gecko/20021218

Description of problem:
Use latest OpenSSL version 0.9.6h ( or 0.9.7-beta6 )


From: http://httpd.apache.org/

If you are running an SSL-enabled web server using OpenSSL, upgrade to at least
version 0.9.6e of OpenSSL and recompile all applications that use OpenSSL.


_I_ know that RedHat has backported the security fixes, but I run into people
that don't/can't seem to grasp that.  

If not for RH 8.0.92+  then please consider it for RH AS 'nextversion'

Version-Release number of selected component (if applicable):

openssl-0.9.6b-30


Additional info:
Comment 1 Peter van Egdom 2002-12-28 11:02:58 EST
see Bugzilla bug id # 69634
Comment 2 Bill Nottingham 2003-01-01 00:20:53 EST
We are not going to update to a beta version, and 0.9.6<whatever> isn't
particularly interesting. We'll look at 0.9.7 if a final version comes out in
enough time.
Comment 3 Peter van Egdom 2003-01-04 04:52:26 EST
According to "http://www.openssl.org/" OpenSSL version 0.9.7 is available.
Comment 4 Bill Nottingham 2003-01-09 17:36:58 EST
And, in rawhide... is 0.9.7. ;)

Note You need to log in before you can comment on or make changes to this bug.