generic-poky/meta/recipes-connectivity/openssl
Yue Tao 381c6b8957 openssl: fix for CVE-2010-5298
Race condition in the ssl3_read_bytes function in s3_pkt.c in OpenSSL
through 1.0.1g, when SSL_MODE_RELEASE_BUFFERS is enabled, allows remote
attackers to inject data across sessions or cause a denial of service
(use-after-free and parsing error) via an SSL connection in a
multithreaded environment.

http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-5298

(From OE-Core master rev: 751f81ed8dc488c500837aeb3eb41ebf3237e10b)

(From OE-Core rev: 3cc799213e6528fc9fb4a0c40a01a1817484f499)

Signed-off-by: Yue Tao <Yue.Tao@windriver.com>
Signed-off-by: Roy Li <rongqing.li@windriver.com>
Signed-off-by: Saul Wold <sgw@linux.intel.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Signed-off-by: Paul Eggleton <paul.eggleton@linux.intel.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
2014-06-10 17:12:24 +01:00
..
openssl-1.0.1e openssl: fix for CVE-2010-5298 2014-06-10 17:12:24 +01:00
ocf-linux.inc recipes: Fix ALLOW_EMPTY with no package specified 2013-03-05 13:14:52 +00:00
ocf-linux_20120127.bb ocf-linux: Update to 20120127 2012-12-03 14:47:56 +00:00
openssl.inc openssl: use PACKAGECONFIG to disable perl bits 2014-02-09 11:04:15 +00:00
openssl_1.0.1e.bb openssl: fix for CVE-2010-5298 2014-06-10 17:12:24 +01:00