diff options
author | Eneas U de Queiroz <cotequeiroz@gmail.com> | 2019-09-17 10:52:11 -0300 |
---|---|---|
committer | Petr Štetiar <ynezz@true.cz> | 2019-09-23 07:42:30 +0200 |
commit | b610572a9baf18a913231e5d90348af873986ddc (patch) | |
tree | d145d426dabbceba8bd37fcdafcd25ff2cc6db90 /target/linux/generic/hack-4.14/400-mt29f_spinand-fix-memleak.patch | |
parent | 0b9f3c28ef6c37b42abdd02c19c96fe34d81ea33 (diff) | |
download | upstream-b610572a9baf18a913231e5d90348af873986ddc.tar.gz upstream-b610572a9baf18a913231e5d90348af873986ddc.tar.bz2 upstream-b610572a9baf18a913231e5d90348af873986ddc.zip |
openssl: bump to 1.1.1d
This version fixes 3 low-severity vulnerabilities:
- CVE-2019-1547: ECDSA remote timing attack
- CVE-2019-1549: Fork Protection
- CVE-2019-1563: Padding Oracle in PKCS7_dataDecode and
CMS_decrypt_set1_pkey
Patches were refreshed.
Signed-off-by: Eneas U de Queiroz <cotequeiroz@gmail.com>
(cherry picked from commit d868d0a5d7e1d76bb1a8980346d222fae55fa18b)
Diffstat (limited to 'target/linux/generic/hack-4.14/400-mt29f_spinand-fix-memleak.patch')
0 files changed, 0 insertions, 0 deletions