Return-Path: X-Original-To: apmail-couchdb-user-archive@www.apache.org Delivered-To: apmail-couchdb-user-archive@www.apache.org Received: from mail.apache.org (hermes.apache.org [140.211.11.3]) by minotaur.apache.org (Postfix) with SMTP id C394C6CBC for ; Wed, 22 Jun 2011 09:38:04 +0000 (UTC) Received: (qmail 26752 invoked by uid 500); 22 Jun 2011 09:38:03 -0000 Delivered-To: apmail-couchdb-user-archive@couchdb.apache.org Received: (qmail 26645 invoked by uid 500); 22 Jun 2011 09:38:02 -0000 Mailing-List: contact user-help@couchdb.apache.org; run by ezmlm Precedence: bulk List-Help: List-Unsubscribe: List-Post: List-Id: Reply-To: user@couchdb.apache.org Delivered-To: mailing list user@couchdb.apache.org Received: (qmail 26637 invoked by uid 99); 22 Jun 2011 09:38:02 -0000 Received: from nike.apache.org (HELO nike.apache.org) (192.87.106.230) by apache.org (qpsmtpd/0.29) with ESMTP; Wed, 22 Jun 2011 09:38:02 +0000 X-ASF-Spam-Status: No, hits=-2.3 required=5.0 tests=RCVD_IN_DNSWL_MED X-Spam-Check-By: apache.org Received-SPF: unknown (nike.apache.org: error in processing during lookup of N.Breunese@vpro.nl) Received: from [145.58.30.185] (HELO out1b.mail.omroep.nl) (145.58.30.185) by apache.org (qpsmtpd/0.29) with ESMTP; Wed, 22 Jun 2011 09:37:53 +0000 Received: from localhost (ou1bclean [10.10.30.159]) by out1b.mail.omroep.nl (Postfix MTA - NPO ICT) with ESMTP id B17B2400A82 for ; Wed, 22 Jun 2011 11:37:33 +0200 (CEST) X-Virus-Scanned: NPO ICT Received: from zeefje.vpro.nl (zeefje.vpro.nl [145.58.168.41]) by out1b.mail.omroep.nl (Postfix MTA - NPO ICT) with ESMTP id 99BCE400A92 for ; Wed, 22 Jun 2011 11:37:33 +0200 (CEST) X-ASG-Debug-ID: 1308735452-00848408f19b40b0001-z14J5S Received: from mail.vpro.nl (mail.vpro.nl [145.58.171.81]) by zeefje.vpro.nl with ESMTP id l4AqyiLAgiwU0bBX for ; Wed, 22 Jun 2011 11:37:32 +0200 (CEST) X-Barracuda-Envelope-From: N.Breunese@vpro.nl X-Barracuda-Apparent-Source-IP: 145.58.171.81 Received: from VS-EX-01.intra.vpro.nl ([145.58.171.81]) by VS-EX-01.intra.vpro.nl ([145.58.171.81]) with mapi; Wed, 22 Jun 2011 11:37:32 +0200 From: Nils Breunese To: "user@couchdb.apache.org" Date: Wed, 22 Jun 2011 11:37:32 +0200 Subject: Re: Update CouchDB package from 0.11.2 to 1.0.2 in EPEL 5 repository Thread-Topic: Update CouchDB package from 0.11.2 to 1.0.2 in EPEL 5 repository X-ASG-Orig-Subj: Re: Update CouchDB package from 0.11.2 to 1.0.2 in EPEL 5 repository Thread-Index: AcwwwAKv9k/ZwPoNRUOufk9UJluE5w== Message-ID: References: In-Reply-To: Accept-Language: nl-NL Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: acceptlanguage: nl-NL Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 X-Barracuda-Connect: mail.vpro.nl[145.58.171.81] X-Barracuda-Start-Time: 1308735452 X-Barracuda-URL: http://145.58.168.41:80/cgi-mod/mark.cgi X-Virus-Scanned: by bsmtpd at vpro.nl X-Barracuda-Bayes: SPAM GLOBAL 0.9984 1.0000 4.3244 X-Barracuda-Spam-Score: 4.32 X-Barracuda-Spam-Status: No, SCORE=4.32 using global scores of TAG_LEVEL=1000.0 QUARANTINE_LEVEL=1000.0 KILL_LEVEL=9.0 tests= X-Barracuda-Spam-Report: Code version 3.2, rules version 3.2.2.66781 Rule breakdown below pts rule name description ---- ---------------------- -------------------------------------------------- X-Virus-Checked: Checked by ClamAV on apache.org Peter Lemenkov wrote: > As per Fedora EPEL policy I would like to inform you that I plan to > upgrade CouchDB package from ancient, no longer supported and > containing known security flaw 0.11.2 version to 1.0.2 one. > > I'm pretty sure that almost nobody is still using 0.11.2 nowadays > (which means that nobody is using the package from EPEL 5 repository, > even me), so this upgrade seems to be harmless. If anyone has any > objections, speak now or forever hold your peace. I know for a fact that someone is still using the 0.11.2 package from EPEL = 5, but I don't think it's a problem to update the package to 1.x. People ca= n always choose to not upgrade. Any particular reason the package won't be = upgraded to 1.1.0 yet? Nils. ------------------------------------------------------------------------ VPRO www.vpro.nl ------------------------------------------------------------------------