Re: Packages Updates

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Darvin,

Darvin Denmian wrote:
> 
> Mark -> this solution is based in a php compilation, right? And if i
> need newest version of php compiled by RedHat?

I've done it both ways, though where I worked for some time, we built, because
we needed to include SSL support. If you want to install binaries, the rpm
command has a flag to allow you to specify an alternate base directory for the
install. Remember, you can always check where the binary (or source) wants to
dump its files by rpm -qlp <packagename> - make sure to put in the p, that
tells it to look in the packages, not in the installed packages d/b.
> 
> Another questio:
> 
> Like in OpenSuse systems, i like to know the reason why i need to
> upgrade a package, eg:
> 
> bind -> bind: spoofing signed mesages
> 
> Patch: bind Type: security Version: 426
> 
> This update improves the verification of return values of openssl
> functions. Prior this update it was possible to spoof answers signed
> with DSA and
> NSEC3DSA. (CVE-2009-0025)
> 
> References:
> 464462 (bugzilla): bug number 464462
> 
> 
> There is something like this in Red Hat systems?

I'd look at the project site, such as php's home page. They should have a list
of security and bug fixes. For that matter, I *think* that CERT has such lists,
and recommended patch releases. (You *do* know CERT, right?
<http://www.cert.org>, sponsored by Carnigie Mellon Univ, and the US gov't?)

	mark

	mark

-- 
redhat-list mailing list
unsubscribe mailto:redhat-list-request@xxxxxxxxxx?subject=unsubscribe
https://www.redhat.com/mailman/listinfo/redhat-list

[Index of Archives]     [CentOS]     [Kernel Development]     [PAM]     [Fedora Users]     [Red Hat Development]     [Big List of Linux Books]     [Linux Admin]     [Gimp]     [Asterisk PBX]     [Yosemite News]     [Red Hat Crash Utility]


  Powered by Linux