Date: Wed, 14 Feb 2024 18:06:20 +0000 From: bugzilla-noreply@freebsd.org To: ports-bugs@FreeBSD.org Subject: [Bug 277053] security/openiked: skip zlib version check Message-ID: <bug-277053-7788@https.bugs.freebsd.org/bugzilla/>
next in thread | raw e-mail | index | archive | help
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D277053 Bug ID: 277053 Summary: security/openiked: skip zlib version check Product: Ports & Packages Version: Latest Hardware: Any OS: Any Status: New Severity: Affects Only Me Priority: --- Component: Individual Port(s) Assignee: marcel@FreeBSD.org Reporter: hiroo.ono+freebsd@gmail.com Assignee: marcel@FreeBSD.org Flags: maintainer-feedback?(marcel@FreeBSD.org) Created attachment 248464 --> https://bugs.freebsd.org/bugzilla/attachment.cgi?id=3D248464&action= =3Dedit configure with --without-zlib-version-check option security/openiked 2.2 fails at configure by the error below: ---- checking for possibly buggy zlib... yes configure: error: *** zlib too old - check config.log *** Your reported zlib version has known security problems. It's possible your vendor has fixed these problems without changing the version number. If you are sure this is the case, you can disable the check by running "./configure --without-zlib-version-check". If you are in doubt, upgrade zlib to version 1.2.3 or greater. See http://www.gzip.org/zlib/ for details. ---- The zlib version in base is 1.2.13 in 13.2-RELEASE, and apparently newer in 13-STABLE, 14.0-RELEASE, 14-STABLE and CURRENT. So, we can use the option --without-zlib-version-check safely. The reason of configure failing is maybe FreeBSD wraps zlib with the zopen wrapper? --=20 You are receiving this mail because: You are the assignee for the bug.=
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?bug-277053-7788>