b982de4e94
Security fix for CVS-2012-2131. Changes between 0.9.8v and 0.9.8w [23 Apr 2012] *) The fix for CVE-2012-2110 did not take into account that the 'len' argument to BUF_MEM_grow and BUF_MEM_grow_clean is an int in OpenSSL 0.9.8, making it still vulnerable. Fix by rejecting negative len parameter. (CVE-2012-2131) [Tomas Hoger <thoger@redhat.com>]
13 lines
720 B
Text
13 lines
720 B
Text
$NetBSD: distinfo,v 1.88 2012/04/24 05:03:48 taca Exp $
|
|
|
|
SHA1 (openssl-0.9.8w.tar.gz) = 6dd276534f87aaca4bee679537fef3aaa6b43069
|
|
RMD160 (openssl-0.9.8w.tar.gz) = 6904c2b85a199b8ec0262ba7d52adbbe7e8df351
|
|
Size (openssl-0.9.8w.tar.gz) = 3782900 bytes
|
|
SHA1 (patch-aa) = eb25505e8a745eb5ba85f857b0f9302fd5e9bda1
|
|
SHA1 (patch-ac) = 6ff4a20440666f5c520837e10547091e1bee2208
|
|
SHA1 (patch-ad) = bb86ac463fc4ab8b485df5f1a4fb9c13c1fc41c3
|
|
SHA1 (patch-ae) = 7a58f1765a3761321dcc8dafc5fe2e33207be480
|
|
SHA1 (patch-af) = 2610930b6b06397fa2e3955b3244c02193f5b7a6
|
|
SHA1 (patch-ag) = 5f12c72b85e4b6c6a79dfcf87055e9e029fbd8c8
|
|
SHA1 (patch-ak) = 049250b9bd42e6f155145703135dab39a7ec17e0
|
|
SHA1 (patch-al) = 076a606352bdeaeea1cc64f16be2ac1325882302
|