No, just do it.
--
Senior Architect, Akamai Technologies
IM: richs...@jabber.at Twitter: RichSalz
> -Original Message-
> From: Philip Bellino [mailto:pbell...@mrv.com]
> Sent: Wednesday, June 29, 2016 3:00 PM
> To: openssl-dev@openssl.org
> Subject: Re: [openssl-dev
-Original Message-
From: openssl-dev [mailto:openssl-dev-boun...@openssl.org] On Behalf Of Salz,
Rich
Sent: Tuesday, June 28, 2016 11:23 AM
To: openssl-dev@openssl.org
Subject: Re: [openssl-dev] CVE-2016-2177
>Will you be releasing 1.0.2i soon to address this issue?
> https://web.nvd.ni
>Will you be releasing 1.0.2i soon to address this issue?
> https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-2177
Please see
https://www.openssl.org/blog/blog/2016/06/27/undefined-pointer-arithmetic/
Short answer: this is a LOW issue, and does not justify a release by itself.
--
Sen
Hello,
Will you be releasing 1.0.2i soon to address this issue?
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-2177
openssl -- openssl
OpenSSL through 1.0.2h incorrectly uses pointer arithmetic for heap-buffer
boundary checks, which might allow remote attackers to cause a denial of