With the recent vulnerabilities found in OpenSSL, I thought it'd make sense
for Apache to check for OpenSSL 0.9.6e or higher.

-Madhu

$ cvs diff acinclude.m4 
Index: acinclude.m4
===================================================================
RCS file: /home/cvspublic/httpd-2.0/acinclude.m4,v
retrieving revision 1.126
diff -u -r1.126 acinclude.m4
--- acinclude.m4        16 Jul 2002 18:33:05 -0000      1.126
+++ acinclude.m4        9 Aug 2002 16:54:30 -0000
@@ -430,7 +430,7 @@
         ap_ssltk_version="`$p/openssl version`"
         case "$ap_ssltk_version" in
             "OpenSSL "[[1-9]]* | \
-            "OpenSSL "0.9.[[6-9]]* | \
+            "OpenSSL "0.9.[[6-9]][[e-z]]* | \
             "OpenSSL "0.[[1-9]][[0-9]]* )
                 ap_cv_ssltk="`(cd $p/.. && pwd)`"
                 break
@@ -441,7 +441,7 @@
         esac
       done
       if test "x$ap_cv_ssltk" = "x"; then
-        AC_MSG_ERROR([requires OpenSSL 0.9.6 or higher])
+        AC_MSG_ERROR([requires OpenSSL 0.9.6e or higher])
       fi
     ])
     ap_ssltk_base="$ap_cv_ssltk"

Reply via email to