openssl_1_0_2: 1.0.2o -> 1.0.2p

this addresses:
 - Client DoS due to large DH parameter (CVE-2018-0732)
 - Cache timing vulnerability in RSA Key Generation (CVE-2018-0737)

Changelog: https://www.openssl.org/news/cl102.txt
This commit is contained in:
Andreas Rammhold 2018-08-15 21:24:16 +02:00
parent 0c633ccf26
commit 98a7b92261
No known key found for this signature in database
GPG Key ID: E432E410B5E48C86

View File

@ -121,8 +121,8 @@ let
in {
openssl_1_0_2 = common {
version = "1.0.2o";
sha256 = "0kcy13l701054nhpbd901mz32v1kn4g311z0nifd83xs2jbmqgzc";
version = "1.0.2p";
sha256 = "003xh9f898i56344vpvpxxxzmikivxig4xwlm7vbi7m8n43qxaah";
};
openssl_1_1_0 = common {