I feel it was pretty appropriate. We upgraded to 0.9.6e when we
saw the vuln. Now they can do a DOS instead of a Buffer Overflow
correct? The consensus in my development team was that was much better
to be able to crash the application that be able to obtain access to the
box. The only bad thing you could say it the fact that our release date
was the same day that g came out.. Oh well. :)

- 
Andrew T. Finnell
Active Solutions L.L.C
[EMAIL PROTECTED] 

> -----Original Message-----
> From: [EMAIL PROTECTED] 
> [mailto:[EMAIL PROTECTED]] On Behalf Of Aleksey Sanin
> Sent: Friday, August 09, 2002 9:53 PM
> To: [EMAIL PROTECTED]
> Subject: Re: [ANNOUNCE] OpenSSL 0.9.6g released
> 
> 
> >
> >
> >> The issue here is responsiveness yet maintaining stability and 
> >> compilability in the releases.  There should only have been _ONE_ 
> >> release, not _THREE_.
> >
> Please, raise your hands everyone who never was in the same 
> situation! 
> This is the life,
> move forward! Now OpenSSL team has a stable release and an 
> expirience on 
> how to
> deal with such situation. Cross your fingers and they will 
> never do it 
> again :)
> 
> 
> Aleksey Sanin
> 
> BTW, thanks for creating patches and new release(s) soo quickly!
> 
> ______________________________________________________________________
> OpenSSL Project                                 http://www.openssl.org
> User Support Mailing List                    [EMAIL PROTECTED]
> Automated List Manager                           [EMAIL PROTECTED]
> 


______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    [EMAIL PROTECTED]
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to