Interesting - I had no idea that this was how the Fedora team handled
things. Many thanks for enlightening me on this!
With all this in mind, it would probably be best for me to use some of
the custom RPMs that are out there. Can you possibly recommend the best
source considering that the official link seems to be dead.
-----Original Message-----
From: David Good [mailto:dgood@fsautomation.com]
Sent: 27 May 2004 02:39
To: users@subversion.tigris.org
Subject: Re: Re: Fedora RPMs
I haven't really looked into it yet, but from past experience I would
guess that they backported the buffer overflow fix to 1.0.2 to make the
1.0.2-2.1 RPM. That's how they usually handle that sort of thing
-- they'll backport security and major bugfixes but not changes in
functionality. For that, you'll have to wait for Fedora Core 3 or use
one of the custom RPMs. If all you want is to avoid major security
holes, though, just use the updated Fedora RPM.
---------------------------------------------------------------------
To unsubscribe, e-mail: users-unsubscribe@subversion.tigris.org
For additional commands, e-mail: users-help@subversion.tigris.org
Received on Thu May 27 14:17:51 2004