Date: Wed, 02 Mar 2016 04:28:17 +0000 From: bugzilla-noreply@freebsd.org To: freebsd-sparc64@FreeBSD.org Subject: [Bug 204527] security/openssl: 1.0.2 generates illegal instructions when compiled WITH_ASM on sparc64 Message-ID: <bug-204527-14-lpKac0tGtF@https.bugs.freebsd.org/bugzilla/> In-Reply-To: <bug-204527-14@https.bugs.freebsd.org/bugzilla/> References: <bug-204527-14@https.bugs.freebsd.org/bugzilla/>
next in thread | previous in thread | raw e-mail | index | archive | help
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D204527 --- Comment #8 from commit-hook@freebsd.org --- A commit references this bug: Author: delphij Date: Wed Mar 2 04:27:16 UTC 2016 New revision: 409910 URL: https://svnweb.freebsd.org/changeset/ports/409910 Log: MFH: r407415, r408778, r409885 (dinoex): - add new manpages Submitted by: olli hauer - mark options ASM broken on sparc64 PR: 204527 - Security update to 1.0.2g Security: https://www.openssl.org/news/secadv/20160301.txt Security: CVE-2016-0800 Security: CVE-2016-0705 Security: CVE-2016-0798 Security: CVE-2016-0797 Security: CVE-2016-0799 Security: CVE-2016-0702 Security: CVE-2016-0703 Security: CVE-2016-0704 Approved by: ports-secteam Changes: _U branches/2016Q1/ branches/2016Q1/security/openssl/Makefile branches/2016Q1/security/openssl/distinfo branches/2016Q1/security/openssl/pkg-plist --=20 You are receiving this mail because: You are on the CC list for the bug.=
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?bug-204527-14-lpKac0tGtF>