summaryrefslogtreecommitdiff
path: root/system/openssl/CVE-2019-1551.patch
diff options
context:
space:
mode:
authorMax Rees <maxcrees@me.com>2020-03-21 14:41:57 -0500
committerMax Rees <maxcrees@me.com>2020-03-21 16:41:33 -0500
commita44b1ab6ad91b2ad5780e67cae3065648c0a78a8 (patch)
treeaa4626713cb7aca082e9d88d0508f3f608e96b30 /system/openssl/CVE-2019-1551.patch
parent3e7d2c3bb270b56c4b30a5e580146c7a87cd9bf4 (diff)
downloadpackages-a44b1ab6ad91b2ad5780e67cae3065648c0a78a8.tar.gz
packages-a44b1ab6ad91b2ad5780e67cae3065648c0a78a8.tar.bz2
packages-a44b1ab6ad91b2ad5780e67cae3065648c0a78a8.tar.xz
packages-a44b1ab6ad91b2ad5780e67cae3065648c0a78a8.zip
system/unzip: change upstream to Debian (#123)
Debian's patches close several CVEs, including a few of which I wasn't even aware. They also include the patches we were already carrying: These were plucked directly from Debian so the names are the same: 10-unzip-handle-pkware-verify.patch 20-unzip-uidgid-fix.patch Our unzip-6.0-heap-overflow-infloop.patch is covered by Debian's: 14-cve-2015-7696.patch 15-cve-2015-7697.patch 16-fix-integer-underflow-csiz-decrypted.patch
Diffstat (limited to 'system/openssl/CVE-2019-1551.patch')
0 files changed, 0 insertions, 0 deletions