On Fri, Dec 03, 2010 at 09:50:49AM -0500, Erik Tkal wrote:

> That's a pretty bold statement and doesn't always apply in a product
> environment.

I have a production environment. The non-security issues in the unpatched
1.0.0b release create substantial interoperability issues with servers
and clients that support EECDH key agreement. These issues are more
severe than the CVEs fixed in either 1.0.0b or 1.0.0c. Therefore, if you
have deployed 1.0.0b, you really must IMHO upgrade to 1.0.0c.


> I have not deployed 1.0.0b (because of the pending issues); I'm still
> at 1.0.0a and have to decide whether to patch the vulnerabilities,
> or risk updating OpenSSL completely and retesting all of its consumers.

Starting with 1.0.0, the stable release gets no new features, just bug
fixes, so backporting just the CVE patches is not necessary, you can
just deploy 1.0.0c shared libraries (and include files) in the locations
where your previously had 1.0.0a libraries (and include files).

-- 
        Viktor.
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           majord...@openssl.org

Reply via email to