Openwrt/package/libs
Jo-Philipp Wich 48d9137d31 openssl: update to v1.0.2d (CVE-2015-1793)
During certificate verification, OpenSSL (starting from version 1.0.1n and
1.0.2b) will attempt to find an alternative certificate chain if the first
attempt to build such a chain fails. An error in the implementation of this
logic can mean that an attacker could cause certain checks on untrusted
certificates to be bypassed, such as the CA flag, enabling them to use a valid
leaf certificate to act as a CA and "issue" an invalid certificate.

This issue will impact any application that verifies certificates including
SSL/TLS/DTLS clients and SSL/TLS/DTLS servers using client authentication.

Signed-off-by: Jo-Philipp Wich <jow@openwrt.org>

SVN-Revision: 46285
2015-07-09 13:04:27 +00:00
..
argp-standalone
cyassl cyassl: update to wolfssl 3.6.0 2015-07-03 23:20:36 +00:00
elfutils elfutils: bump to 0.163 2015-06-29 06:47:31 +00:00
gettext
gettext-full
gmp
libbsd
libconfig
libevent2
libiconv
libiconv-full libiconv-full: fix build with fortify source 2015-06-25 12:13:57 +00:00
libjson-c
libmnl
libnetfilter-conntrack
libnetfilter-cthelper
libnetfilter-cttimeout
libnetfilter-log
libnetfilter-queue
libnfnetlink
libnftnl
libnl
libnl-tiny libnl-tiny: honor CFLAGS when linking 2015-06-18 08:13:04 +00:00
libpcap libpcap: fixup libtool 2015-06-20 17:37:28 +00:00
libreadline
libroxml
librpc
libtool libtool: enable passthrough for SSP options 2015-06-19 13:45:48 +00:00
libubox libubox: fix MD5 for musl on big-endian platforms 2015-06-29 14:12:38 +00:00
libusb
libusb-compat libusb-compat: fix musl compatibility issues 2015-06-18 06:39:09 +00:00
lzo
ncurses
nettle
ocf-crypto-headers
openssl openssl: update to v1.0.2d (CVE-2015-1793) 2015-07-09 13:04:27 +00:00
polarssl
popt
sysfsutils
toolchain
uclibc++ uclibc++: link libssp_nonshared only for musl 2015-07-06 08:55:28 +00:00
uclient
ustream-ssl
zlib