diff options
author | Peter Korsgaard <peter@korsgaard.com> | 2018-09-30 22:12:15 +0200 |
---|---|---|
committer | Peter Korsgaard <peter@korsgaard.com> | 2018-10-01 14:31:28 +0200 |
commit | 5e04cdde197f17472a85423f4063b8f6ee19a82c (patch) | |
tree | a62c9b410bf4702dc375e1617bcca9fb98e6d599 /package/python-pyopenssl/Config.in | |
parent | c32cd4b925fc596ee2db2bfd7a0c3faaeae06849 (diff) | |
download | buildroot-5e04cdde197f17472a85423f4063b8f6ee19a82c.tar.gz buildroot-5e04cdde197f17472a85423f4063b8f6ee19a82c.zip |
strongswan: add upstream security patch
Fixes the following security issues:
CVE-2018-16151: The OID parser in the ASN.1 code in gmp allows any number of
random bytes after a valid OID.
CVE-2018-16152: The algorithmIdentifier parser in the ASN.1 code in gmp
doesn't enforce a NULL value for the optional parameter which is not used
with any PKCS#1 algorithm.
For more details, see the advisory:
https://www.strongswan.org/blog/2018/09/24/strongswan-vulnerability-(cve-2018-16151,-cve-2018-16152).html
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
Diffstat (limited to 'package/python-pyopenssl/Config.in')
0 files changed, 0 insertions, 0 deletions