diff options
author | Josef Schlehofer <pepe.schlehofer@gmail.com> | 2022-06-06 22:08:42 +0200 |
---|---|---|
committer | Christian Lamparter <chunkeey@gmail.com> | 2022-06-25 00:05:21 +0200 |
commit | c1868ef656cf7241eb34bd32d6792a6b8d0802bc (patch) | |
tree | 659677eefc5e4496c3685e2181a8e3ee08b9c308 /target/linux/bcm53xx/patches-5.10/033-v5.16-0016-ARM-dts-NSP-Fix-MX64-MX65-eeprom-node-name.patch | |
parent | 8a3fb457223b6a4f68c4ab28162529ae94c6480e (diff) | |
download | upstream-c1868ef656cf7241eb34bd32d6792a6b8d0802bc.tar.gz upstream-c1868ef656cf7241eb34bd32d6792a6b8d0802bc.tar.bz2 upstream-c1868ef656cf7241eb34bd32d6792a6b8d0802bc.zip |
tools/libressl: update to version 3.4.3
Release notes:
https://ftp.openbsd.org/pub/OpenBSD/LibreSSL/libressl-3.4.3-relnotes.txt
```
It includes the following security fix:
* A malicious certificate can cause an infinite loop.
Reported by and fix from Tavis Ormandy and David Benjamin, Google.
```
Signed-off-by: Josef Schlehofer <pepe.schlehofer@gmail.com>
(cherry picked from commit 25534d5cc20a807ff776fdb18847344167ce081d)
Diffstat (limited to 'target/linux/bcm53xx/patches-5.10/033-v5.16-0016-ARM-dts-NSP-Fix-MX64-MX65-eeprom-node-name.patch')
0 files changed, 0 insertions, 0 deletions