diff options
author | Magnus Kroken <mkroken@gmail.com> | 2016-09-26 17:21:52 +0200 |
---|---|---|
committer | John Crispin <john@phrozen.org> | 2016-09-27 17:50:22 +0200 |
commit | b1f39d3d7ee7ba0714e45af64a935b01877a5175 (patch) | |
tree | 0ba98cf9341cac670180e2a0a127f4dc4d62437c /target/linux/ar71xx/config-4.4 | |
parent | 142ec7ada939313cc890f94df5fc6903f2660635 (diff) | |
download | upstream-b1f39d3d7ee7ba0714e45af64a935b01877a5175.tar.gz upstream-b1f39d3d7ee7ba0714e45af64a935b01877a5175.tar.bz2 upstream-b1f39d3d7ee7ba0714e45af64a935b01877a5175.zip |
openssl: update to 1.0.2j
A bug fix which included a CRL sanity check was added to OpenSSL 1.1.0
but was omitted from OpenSSL 1.0.2i. As a result any attempt to use
CRLs in OpenSSL 1.0.2i will crash with a null pointer exception.
Patches applied upstream:
* 301-fix_no_nextprotoneg_build.patch
* 302-Fix_typo_introduced_by_a03f81f4.patch
Security advisory: https://www.openssl.org/news/secadv/20160926.txt
Signed-off-by: Magnus Kroken <mkroken@gmail.com>
Diffstat (limited to 'target/linux/ar71xx/config-4.4')
0 files changed, 0 insertions, 0 deletions