[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Re: [SECURITY] [DSA 253-1] New OpenSSL packages fix timing-based attack vulnerability



On Mon, 2003-02-24 at 15:00, Martin Schulze wrote:
> For the old stable distribution (potato) this problem has been fixed
> in version 0.9.6c-0.potato.5.  Please note that this updates the
> version from potato-proposed-updates that superseds the version in
> potato.

Hmm. Now that a date is being set for stopping potato security support
(if I read that thread correctly), how about mentioning this in every
sinlge DSA?

WARNING: security support for the Debian 2.2 (potato) release will not
be continued after blubberblubber. Please upgrade to the current stable
3.0 (woody) release.

Something like that. Or would this just annoy people forced to stay with
potato for some reasons (like having 4000 machines or so).

cheers
-- vbi

-- 
pub  1024D/92082481 2002-02-22 Adrian von Bidder 
     Key fingerprint = EFE3 96F4 18F5 8D65 8494  28FC 1438 5168 9208 2481

Attachment: signature.asc
Description: This is a digitally signed message part


Reply to: