diff options
author | Magnus Kroken <mkroken@gmail.com> | 2016-09-24 11:36:49 +0200 |
---|---|---|
committer | Hauke Mehrtens <hauke@hauke-m.de> | 2016-09-24 13:28:59 +0200 |
commit | 6926325829a2f58059ca8e614c892062fbbae393 (patch) | |
tree | 42cb599d97a50e447d611c847295288f90f54251 /target/linux | |
parent | c15d70c6d6a00529a119a41b97953eac9c41a8fc (diff) | |
download | upstream-6926325829a2f58059ca8e614c892062fbbae393.tar.gz upstream-6926325829a2f58059ca8e614c892062fbbae393.tar.bz2 upstream-6926325829a2f58059ca8e614c892062fbbae393.zip |
openssl: update to 1.0.2i
Drop 302-fix_no_cmac_build.patch, it has been applied upstream.
Security fixes:
* (Severity: High) OCSP Status Request extension unbounded memory growth (CVE-2016-6304)
* (Severity: Moderate) SSL_peek() hang on empty record (CVE-2016-6305)
* 10 Low severity issues
Security advisory: https://www.openssl.org/news/secadv/20160922.txt
Changelog: https://www.openssl.org/news/cl102.txt
Signed-off-by: Magnus Kroken <mkroken@gmail.com>
Signed-off-by: Hauke Mehrtens <hauke@hauke-m.de>
Diffstat (limited to 'target/linux')
0 files changed, 0 insertions, 0 deletions