diff options
author | Max Rees <maxcrees@me.com> | 2020-03-21 14:41:57 -0500 |
---|---|---|
committer | Max Rees <maxcrees@me.com> | 2020-03-21 16:41:33 -0500 |
commit | a44b1ab6ad91b2ad5780e67cae3065648c0a78a8 (patch) | |
tree | aa4626713cb7aca082e9d88d0508f3f608e96b30 /system/openssl/CVE-2019-1551.patch | |
parent | 3e7d2c3bb270b56c4b30a5e580146c7a87cd9bf4 (diff) | |
download | packages-a44b1ab6ad91b2ad5780e67cae3065648c0a78a8.tar.gz packages-a44b1ab6ad91b2ad5780e67cae3065648c0a78a8.tar.bz2 packages-a44b1ab6ad91b2ad5780e67cae3065648c0a78a8.tar.xz packages-a44b1ab6ad91b2ad5780e67cae3065648c0a78a8.zip |
system/unzip: change upstream to Debian (#123)
Debian's patches close several CVEs, including a few of which I wasn't
even aware. They also include the patches we were already carrying:
These were plucked directly from Debian so the names are the same:
10-unzip-handle-pkware-verify.patch
20-unzip-uidgid-fix.patch
Our unzip-6.0-heap-overflow-infloop.patch is covered by Debian's:
14-cve-2015-7696.patch
15-cve-2015-7697.patch
16-fix-integer-underflow-csiz-decrypted.patch
Diffstat (limited to 'system/openssl/CVE-2019-1551.patch')
0 files changed, 0 insertions, 0 deletions