aboutsummaryrefslogtreecommitdiff
path: root/openssl/openssl-1.0.0h.tar.gz
diff options
context:
space:
mode:
authorRob Austein <sra@hactrn.net>2012-03-12 17:32:45 +0000
committerRob Austein <sra@hactrn.net>2012-03-12 17:32:45 +0000
commitd51bedcff66259a57ffa82961c6930ee83f60585 (patch)
treed37dd7a438bed843592b9445d3c95fe263b0a0fc /openssl/openssl-1.0.0h.tar.gz
parent59b210430f9f3a8461cc8122bd21d35d5691a9a7 (diff)
CVE-2012-0884 (Bleichenbacher's "Million Message Attack") only applies
to CMS when used for encryption, so I don't think it's a serious issue for RPKI CMS signed data, but upgrade to OpenSSL 1.0.0h anyway. svn path=/trunk/; revision=4395
Diffstat (limited to 'openssl/openssl-1.0.0h.tar.gz')
-rw-r--r--openssl/openssl-1.0.0h.tar.gzbin0 -> 4048067 bytes
1 files changed, 0 insertions, 0 deletions
diff --git a/openssl/openssl-1.0.0h.tar.gz b/openssl/openssl-1.0.0h.tar.gz
new file mode 100644
index 00000000..516416bd
--- /dev/null
+++ b/openssl/openssl-1.0.0h.tar.gz
Binary files differ