> the new patches that fix various buffer overflows in SSL code call abort()
> anytime attacker wants.

Sorry, I should read all my email first.

You're right, of course.




______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
Development Mailing List                       [EMAIL PROTECTED]
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to