Hello,

today appeared another serious vulnerability in openssl. More info is
here http://ccsinjection.lepidum.co.jp. Users are advised to update to
openssl 1.0.1h.
Signed-off-by: Martin Strbacka <martin.strba...@nic.cz>
---
diff --git a/package/libs/openssl/Makefile b/package/libs/openssl/Makefile
index 26833a3..fff260b 100644
--- a/package/libs/openssl/Makefile
+++ b/package/libs/openssl/Makefile
@@ -8,7 +8,7 @@
 include $(TOPDIR)/rules.mk

 PKG_NAME:=openssl
-PKG_VERSION:=1.0.1g
+PKG_VERSION:=1.0.1h
 PKG_RELEASE:=1
 PKG_USE_MIPS16:=0

@@ -18,7 +18,7 @@ PKG_SOURCE:=$(PKG_NAME)-$(PKG_VERSION).tar.gz
 PKG_SOURCE_URL:=http://www.openssl.org/source/ \
        ftp://ftp.funet.fi/pub/crypt/mirrors/ftp.openssl.org/source \
        ftp://ftp.sunet.se/pub/security/tools/net/openssl/source/
-PKG_MD5SUM:=de62b43dfcd858e66a74bee1c834e959
+PKG_MD5SUM:=8d6d684a9430d5cc98a62a5d8fbda8cf

 PKG_LICENSE:=SSLEAY OPENSSL
 PKG_LICENSE_FILES:=LICENSE
_______________________________________________
openwrt-devel mailing list
openwrt-devel@lists.openwrt.org
https://lists.openwrt.org/cgi-bin/mailman/listinfo/openwrt-devel

Reply via email to