aboutsummaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorHauke Mehrtens <hauke@hauke-m.de>2014-06-05 21:32:36 +0000
committerHauke Mehrtens <hauke@hauke-m.de>2014-06-05 21:32:36 +0000
commita56519e1b9066038f0d7139cb16fd755535baf0c (patch)
tree9297681a9a27bcb37b2bbca685c8cb7aa809704a
parentbffd80e3e1f3f41236f65ccdbe5a75457b93d4d5 (diff)
downloadupstream-a56519e1b9066038f0d7139cb16fd755535baf0c.tar.gz
upstream-a56519e1b9066038f0d7139cb16fd755535baf0c.tar.bz2
upstream-a56519e1b9066038f0d7139cb16fd755535baf0c.zip
openssl: version bump to 1.0.1h
today appeared another serious vulnerability in openssl. More info is here http://ccsinjection.lepidum.co.jp. Users are advised to update to openssl 1.0.1h. Signed-off-by: Martin Strbacka <martin.strbacka@nic.cz> Signed-off-by: Hauke Mehrtens <hauke@hauke-m.de> SVN-Revision: 41026
-rw-r--r--package/libs/openssl/Makefile4
1 files changed, 2 insertions, 2 deletions
diff --git a/package/libs/openssl/Makefile b/package/libs/openssl/Makefile
index 26833a30b7..fff260bc97 100644
--- a/package/libs/openssl/Makefile
+++ b/package/libs/openssl/Makefile
@@ -8,7 +8,7 @@
include $(TOPDIR)/rules.mk
PKG_NAME:=openssl
-PKG_VERSION:=1.0.1g
+PKG_VERSION:=1.0.1h
PKG_RELEASE:=1
PKG_USE_MIPS16:=0
@@ -18,7 +18,7 @@ PKG_SOURCE:=$(PKG_NAME)-$(PKG_VERSION).tar.gz
PKG_SOURCE_URL:=http://www.openssl.org/source/ \
ftp://ftp.funet.fi/pub/crypt/mirrors/ftp.openssl.org/source \
ftp://ftp.sunet.se/pub/security/tools/net/openssl/source/
-PKG_MD5SUM:=de62b43dfcd858e66a74bee1c834e959
+PKG_MD5SUM:=8d6d684a9430d5cc98a62a5d8fbda8cf
PKG_LICENSE:=SSLEAY OPENSSL
PKG_LICENSE_FILES:=LICENSE