diff options
author | Wladimir J. van der Laan <laanwj@gmail.com> | 2014-06-05 15:44:35 +0200 |
---|---|---|
committer | Wladimir J. van der Laan <laanwj@gmail.com> | 2014-06-05 17:24:38 +0200 |
commit | 6e7c4d17d8abb4b1c8b91504699ce6970e01a1fb (patch) | |
tree | 34a079cb2bad4e0906d3b92333c3fae7f1258cd0 /doc/build-msw.md | |
parent | a92aded70ec2346c3f07ff1cf8eb97101a76912f (diff) |
gitian: upgrade OpenSSL to 1.0.1h
Upgrade for https://www.openssl.org/news/secadv_20140605.txt
Just in case - there is no vulnerability that affects ecdsa signing or
verification.
The MITM attack vulnerability (CVE-2014-0224) may have some effect on
our usage of SSL/TLS.
As long as payment requests are signed (which is the common case), usage
of the payment protocol should also not be affected.
The TLS usage in RPC may be at risk for MITM attacks. If you have
`-rpcssl` enabled, be sure to update OpenSSL as soon as possible.
Diffstat (limited to 'doc/build-msw.md')
0 files changed, 0 insertions, 0 deletions