| Commit message (Collapse) | Author | Age | Files | Lines |
|
|
|
| |
[CVE-2016-9425] [CVE-2016-9428]
|
| |
|
| |
|
| |
|
|
|
|
| |
[CVE-2016-9435] [CVE-2016-9436]
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
|
|
|
| |
[CVE-2016-9423] [CVE-2016-9431]
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
|
|
|
| |
(Note: Debian package uses dh addon instead of this patch)
|
| |
|
| |
|
| |
|
| |
|
|
|
|
| |
(Note: Debian package uses dh addon instead of this patch)
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
|
|
|
|
|
| |
- Use SSL_OP_NO_COMPRESSION if available due to the "CRIME attack".
[CVE-2012-4929]
- Use SSL_MODE_RELEASE_BUFFERS if available.
|
| |
|