* [PATCH] openssl: update to 1.1.1g
@ 2020-04-21 13:43 Arne Fitzenreiter
2020-04-21 14:09 ` Michael Tremer
0 siblings, 1 reply; 2+ messages in thread
From: Arne Fitzenreiter @ 2020-04-21 13:43 UTC (permalink / raw)
To: development
[-- Attachment #1: Type: text/plain, Size: 1147 bytes --]
CVE-2020-1967 (OpenSSL advisory) [High severity] 21 April 2020:
Server or client applications that call the SSL_check_chain()
function during or after a TLS 1.3 handshake may crash due
to a NULL pointer dereference as a result of incorrect handling
of the "signature_algorithms_cert" TLS extension.
The crash occurs if an invalid or unrecognised signature algorithm
is received from the peer. This could be exploited by a malicious
peer in a Denial of Service attack.
https://www.openssl.org/news/secadv/20200421.txt
Signed-off-by: Arne Fitzenreiter <arne_f(a)ipfire.org>
---
lfs/openssl | 4 ++--
1 file changed, 2 insertions(+), 2 deletions(-)
diff --git a/lfs/openssl b/lfs/openssl
index 06b999a15..8fe3c2856 100644
--- a/lfs/openssl
+++ b/lfs/openssl
@@ -24,7 +24,7 @@
include Config
-VER = 1.1.1f
+VER = 1.1.1g
THISAPP = openssl-$(VER)
DL_FILE = $(THISAPP).tar.gz
@@ -87,7 +87,7 @@ objects = $(DL_FILE)
$(DL_FILE) = $(DL_FROM)/$(DL_FILE)
-$(DL_FILE)_MD5 = 3f486f2f4435ef14b81814dbbc7b48bb
+$(DL_FILE)_MD5 = 76766e98997660138cdaf13a187bd234
install : $(TARGET)
--
2.17.1
^ permalink raw reply [flat|nested] 2+ messages in thread
* Re: [PATCH] openssl: update to 1.1.1g
2020-04-21 13:43 [PATCH] openssl: update to 1.1.1g Arne Fitzenreiter
@ 2020-04-21 14:09 ` Michael Tremer
0 siblings, 0 replies; 2+ messages in thread
From: Michael Tremer @ 2020-04-21 14:09 UTC (permalink / raw)
To: development
[-- Attachment #1: Type: text/plain, Size: 1365 bytes --]
Hello Arne,
Thank you very much for patching this so quickly.
Best,
-Michael
> On 21 Apr 2020, at 14:43, Arne Fitzenreiter <arne_f(a)ipfire.org> wrote:
>
> CVE-2020-1967 (OpenSSL advisory) [High severity] 21 April 2020:
> Server or client applications that call the SSL_check_chain()
> function during or after a TLS 1.3 handshake may crash due
> to a NULL pointer dereference as a result of incorrect handling
> of the "signature_algorithms_cert" TLS extension.
> The crash occurs if an invalid or unrecognised signature algorithm
> is received from the peer. This could be exploited by a malicious
> peer in a Denial of Service attack.
> https://www.openssl.org/news/secadv/20200421.txt
>
> Signed-off-by: Arne Fitzenreiter <arne_f(a)ipfire.org>
> ---
> lfs/openssl | 4 ++--
> 1 file changed, 2 insertions(+), 2 deletions(-)
>
> diff --git a/lfs/openssl b/lfs/openssl
> index 06b999a15..8fe3c2856 100644
> --- a/lfs/openssl
> +++ b/lfs/openssl
> @@ -24,7 +24,7 @@
>
> include Config
>
> -VER = 1.1.1f
> +VER = 1.1.1g
>
> THISAPP = openssl-$(VER)
> DL_FILE = $(THISAPP).tar.gz
> @@ -87,7 +87,7 @@ objects = $(DL_FILE)
>
> $(DL_FILE) = $(DL_FROM)/$(DL_FILE)
>
> -$(DL_FILE)_MD5 = 3f486f2f4435ef14b81814dbbc7b48bb
> +$(DL_FILE)_MD5 = 76766e98997660138cdaf13a187bd234
>
> install : $(TARGET)
>
> --
> 2.17.1
>
^ permalink raw reply [flat|nested] 2+ messages in thread
end of thread, other threads:[~2020-04-21 14:09 UTC | newest]
Thread overview: 2+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2020-04-21 13:43 [PATCH] openssl: update to 1.1.1g Arne Fitzenreiter
2020-04-21 14:09 ` Michael Tremer
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox