summaryrefslogtreecommitdiffstats
path: root/scripts/lib/devtool/utilcmds.py
diff options
context:
space:
mode:
authorEd Tanous <edtanous@google.com>2022-11-03 17:00:39 -1000
committerRichard Purdie <richard.purdie@linuxfoundation.org>2022-11-04 13:13:31 +0000
commit0bfaca565e6a1a9ba6a9649fc7d736232dc27ace (patch)
tree8bcb7237bb01bf5cf9bf61449e6225c5fcd512ec /scripts/lib/devtool/utilcmds.py
parent32e1f2be0fa4dcf850bde69f390ce8448396af3c (diff)
downloadpoky-0bfaca565e6a1a9ba6a9649fc7d736232dc27ace.tar.gz
openssl: Upgrade 3.0.5 -> 3.0.7
OpenSSL 3.0.5 includes a HIGH level security vulnerability [1]. Upgrade the recipe to point to 3.0.7. CVE-2022-3358 is reported fixed in 3.0.6, so drop the patch for that as well. [1] https://www.openssl.org/news/vulnerabilities.html Fixes CVE-2022-3786 and CVE-2022-3602: X.509 Email Address Buffer Overflows https://www.openssl.org/blog/blog/2022/11/01/email-address-overflows/ (From OE-Core rev: 78220bd59d98c1713336baf06b4babc6390a07c4) Signed-off-by: Ed Tanous <edtanous@google.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org> (cherry picked from commit a69ea1f7db96ec8b853573bd581438edd42ad6e0) Signed-off-by: Steve Sakoman <steve@sakoman.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Diffstat (limited to 'scripts/lib/devtool/utilcmds.py')
0 files changed, 0 insertions, 0 deletions