generic-poky/meta/recipes-connectivity/openssl
Paul Eggleton d6f29c0154 openssl: use upstream fix for CVE-2014-0198
This replaces the fix for CVE-2014-0198 with one borrowed from Fedora,
which is the same as the patch which was actually applied upstream for
the issue, i.e.:

https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=b107586c0c3447ea22dba8698ebbcd81bb29d48c

(From OE-Core rev: 21fa437a37dad14145b6c8c8c16c95f1b074e09c)

Signed-off-by: Paul Eggleton <paul.eggleton@linux.intel.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
2014-06-10 17:12:24 +01:00
..
openssl-1.0.1e openssl: use upstream fix for CVE-2014-0198 2014-06-10 17:12:24 +01:00
ocf-linux.inc recipes: Fix ALLOW_EMPTY with no package specified 2013-03-05 13:14:52 +00:00
ocf-linux_20120127.bb ocf-linux: Update to 20120127 2012-12-03 14:47:56 +00:00
openssl.inc openssl: use PACKAGECONFIG to disable perl bits 2014-02-09 11:04:15 +00:00
openssl_1.0.1e.bb openssl: use upstream fix for CVE-2014-0198 2014-06-10 17:12:24 +01:00