public inbox for development@lists.ipfire.org
 help / color / mirror / Atom feed
* [PATCH] openssl: update to 1.1.1g
@ 2020-04-21 13:43 Arne Fitzenreiter
  2020-04-21 14:09 ` Michael Tremer
  0 siblings, 1 reply; 2+ messages in thread
From: Arne Fitzenreiter @ 2020-04-21 13:43 UTC (permalink / raw)
  To: development

[-- Attachment #1: Type: text/plain, Size: 1147 bytes --]

CVE-2020-1967 (OpenSSL advisory) [High severity] 21 April 2020:
    Server or client applications that call the SSL_check_chain()
    function during or after a TLS 1.3 handshake may crash due
    to a NULL pointer dereference as a result of incorrect handling
    of the "signature_algorithms_cert" TLS extension.
    The crash occurs if an invalid or unrecognised signature algorithm
    is received from the peer. This could be exploited by a malicious
    peer in a Denial of Service attack.
https://www.openssl.org/news/secadv/20200421.txt

Signed-off-by: Arne Fitzenreiter <arne_f(a)ipfire.org>
---
 lfs/openssl | 4 ++--
 1 file changed, 2 insertions(+), 2 deletions(-)

diff --git a/lfs/openssl b/lfs/openssl
index 06b999a15..8fe3c2856 100644
--- a/lfs/openssl
+++ b/lfs/openssl
@@ -24,7 +24,7 @@
 
 include Config
 
-VER        = 1.1.1f
+VER        = 1.1.1g
 
 THISAPP    = openssl-$(VER)
 DL_FILE    = $(THISAPP).tar.gz
@@ -87,7 +87,7 @@ objects = $(DL_FILE)
 
 $(DL_FILE) = $(DL_FROM)/$(DL_FILE)
 
-$(DL_FILE)_MD5 = 3f486f2f4435ef14b81814dbbc7b48bb
+$(DL_FILE)_MD5 = 76766e98997660138cdaf13a187bd234
 
 install : $(TARGET)
 
-- 
2.17.1


^ permalink raw reply	[flat|nested] 2+ messages in thread

* Re: [PATCH] openssl: update to 1.1.1g
  2020-04-21 13:43 [PATCH] openssl: update to 1.1.1g Arne Fitzenreiter
@ 2020-04-21 14:09 ` Michael Tremer
  0 siblings, 0 replies; 2+ messages in thread
From: Michael Tremer @ 2020-04-21 14:09 UTC (permalink / raw)
  To: development

[-- Attachment #1: Type: text/plain, Size: 1365 bytes --]

Hello Arne,

Thank you very much for patching this so quickly.

Best,
-Michael

> On 21 Apr 2020, at 14:43, Arne Fitzenreiter <arne_f(a)ipfire.org> wrote:
> 
> CVE-2020-1967 (OpenSSL advisory) [High severity] 21 April 2020:
>    Server or client applications that call the SSL_check_chain()
>    function during or after a TLS 1.3 handshake may crash due
>    to a NULL pointer dereference as a result of incorrect handling
>    of the "signature_algorithms_cert" TLS extension.
>    The crash occurs if an invalid or unrecognised signature algorithm
>    is received from the peer. This could be exploited by a malicious
>    peer in a Denial of Service attack.
> https://www.openssl.org/news/secadv/20200421.txt
> 
> Signed-off-by: Arne Fitzenreiter <arne_f(a)ipfire.org>
> ---
> lfs/openssl | 4 ++--
> 1 file changed, 2 insertions(+), 2 deletions(-)
> 
> diff --git a/lfs/openssl b/lfs/openssl
> index 06b999a15..8fe3c2856 100644
> --- a/lfs/openssl
> +++ b/lfs/openssl
> @@ -24,7 +24,7 @@
> 
> include Config
> 
> -VER        = 1.1.1f
> +VER        = 1.1.1g
> 
> THISAPP    = openssl-$(VER)
> DL_FILE    = $(THISAPP).tar.gz
> @@ -87,7 +87,7 @@ objects = $(DL_FILE)
> 
> $(DL_FILE) = $(DL_FROM)/$(DL_FILE)
> 
> -$(DL_FILE)_MD5 = 3f486f2f4435ef14b81814dbbc7b48bb
> +$(DL_FILE)_MD5 = 76766e98997660138cdaf13a187bd234
> 
> install : $(TARGET)
> 
> -- 
> 2.17.1
> 


^ permalink raw reply	[flat|nested] 2+ messages in thread

end of thread, other threads:[~2020-04-21 14:09 UTC | newest]

Thread overview: 2+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2020-04-21 13:43 [PATCH] openssl: update to 1.1.1g Arne Fitzenreiter
2020-04-21 14:09 ` Michael Tremer

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox