aboutsummaryrefslogtreecommitdiffstats
path: root/target/linux/bcm53xx/patches-5.10/033-v5.16-0016-ARM-dts-NSP-Fix-MX64-MX65-eeprom-node-name.patch
diff options
context:
space:
mode:
authorJosef Schlehofer <pepe.schlehofer@gmail.com>2022-06-06 22:08:42 +0200
committerChristian Lamparter <chunkeey@gmail.com>2022-06-25 00:05:21 +0200
commitc1868ef656cf7241eb34bd32d6792a6b8d0802bc (patch)
tree659677eefc5e4496c3685e2181a8e3ee08b9c308 /target/linux/bcm53xx/patches-5.10/033-v5.16-0016-ARM-dts-NSP-Fix-MX64-MX65-eeprom-node-name.patch
parent8a3fb457223b6a4f68c4ab28162529ae94c6480e (diff)
downloadupstream-c1868ef656cf7241eb34bd32d6792a6b8d0802bc.tar.gz
upstream-c1868ef656cf7241eb34bd32d6792a6b8d0802bc.tar.bz2
upstream-c1868ef656cf7241eb34bd32d6792a6b8d0802bc.zip
tools/libressl: update to version 3.4.3
Release notes: https://ftp.openbsd.org/pub/OpenBSD/LibreSSL/libressl-3.4.3-relnotes.txt ``` It includes the following security fix: * A malicious certificate can cause an infinite loop. Reported by and fix from Tavis Ormandy and David Benjamin, Google. ``` Signed-off-by: Josef Schlehofer <pepe.schlehofer@gmail.com> (cherry picked from commit 25534d5cc20a807ff776fdb18847344167ce081d)
Diffstat (limited to 'target/linux/bcm53xx/patches-5.10/033-v5.16-0016-ARM-dts-NSP-Fix-MX64-MX65-eeprom-node-name.patch')
0 files changed, 0 insertions, 0 deletions