On Tue, 04 Mar 2003 12:12:42 -0600 "Steve Bremer" <[EMAIL PROTECTED]>
wrote:
> Typically, Red Hat will back port security patches from the current 
> version of XYZ software to the version of XYZ software release with 
> their distribution.  Why do they do this?  If they were to package the
> new version of XYZ software, it may have new bugs in addition to 
> the security fix.  These new bugs could introduce compatibility 
> problems with the existing software on the system.

This is exactly what Red Hat does, and why. Additionally, some
applications, like OpenSSL, don't always maintain binary compatibility
when going up a revision.  So updating to the brand-spanking-new OpenSSL
means that Red Hat would also have to release errata for Apache's
mod_ssl, OpenSSH, sendmail...anything linked against OpenSSL. if they
back-port the bugfix, test will take less time, and require fewer
errata packages to be released.

In some uncommon instances, a major package can be updated without as
much churn - like the kernel - if it's a back-port from a newer release
(i.e. the current 7,.x kernel errata is actual the 8.0 kernel
recompiled against 7.x), and doesn't impact binary compatibility on the
target release. 

-- 
----------------------------------
--         Kevin Sonney         --
--  ICQ: 4855069  AIM: ksonney  --
----------------------------------
320C 0336 3BC4 13EC 4AEC  6AF2 525F CED7 7BB6 12C9
 Seuss is God. We thought Clapton was, but it was grumpy, weird,
 wife-dumping, flawed genius Ted. -- Berkley Breathed, 2001

Attachment: pgp00000.pgp
Description: PGP signature

Reply via email to