From d3b8b5be3455d734e5681f98f22e5705dfe02ba4 Mon Sep 17 00:00:00 2001 From: Hauke Mehrtens Date: Wed, 15 Aug 2018 22:17:11 +0200 Subject: openssl: update to version 1.0.2p This fixes the following security problems: * CVE-2018-0732: Client DoS due to large DH parameter * CVE-2018-0737: Cache timing vulnerability in RSA Key Generation Signed-off-by: Hauke Mehrtens --- package/libs/openssl/patches/200-parallel_build.patch | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) (limited to 'package/libs/openssl/patches/200-parallel_build.patch') diff --git a/package/libs/openssl/patches/200-parallel_build.patch b/package/libs/openssl/patches/200-parallel_build.patch index 0616551..37134e4 100644 --- a/package/libs/openssl/patches/200-parallel_build.patch +++ b/package/libs/openssl/patches/200-parallel_build.patch @@ -173,7 +173,7 @@ apps: @(cd ..; $(MAKE) DIRS=apps all) -@@ -586,7 +586,7 @@ $(DTLSTEST)$(EXE_EXT): $(DTLSTEST).o ssl +@@ -593,7 +593,7 @@ $(DTLSTEST)$(EXE_EXT): $(DTLSTEST).o ssl # fi dummytest$(EXE_EXT): dummytest.o $(DLIBCRYPTO) -- cgit v1.1