public inbox for development@lists.ipfire.org
 help / color / mirror / Atom feed
* [PATCH] openssl: update to 1.1.1g
@ 2020-04-21 13:43 Arne Fitzenreiter
  2020-04-21 14:09 ` Michael Tremer
  0 siblings, 1 reply; 2+ messages in thread
From: Arne Fitzenreiter @ 2020-04-21 13:43 UTC (permalink / raw)
  To: development

[-- Attachment #1: Type: text/plain, Size: 1147 bytes --]

CVE-2020-1967 (OpenSSL advisory) [High severity] 21 April 2020:
    Server or client applications that call the SSL_check_chain()
    function during or after a TLS 1.3 handshake may crash due
    to a NULL pointer dereference as a result of incorrect handling
    of the "signature_algorithms_cert" TLS extension.
    The crash occurs if an invalid or unrecognised signature algorithm
    is received from the peer. This could be exploited by a malicious
    peer in a Denial of Service attack.
https://www.openssl.org/news/secadv/20200421.txt

Signed-off-by: Arne Fitzenreiter <arne_f(a)ipfire.org>
---
 lfs/openssl | 4 ++--
 1 file changed, 2 insertions(+), 2 deletions(-)

diff --git a/lfs/openssl b/lfs/openssl
index 06b999a15..8fe3c2856 100644
--- a/lfs/openssl
+++ b/lfs/openssl
@@ -24,7 +24,7 @@
 
 include Config
 
-VER        = 1.1.1f
+VER        = 1.1.1g
 
 THISAPP    = openssl-$(VER)
 DL_FILE    = $(THISAPP).tar.gz
@@ -87,7 +87,7 @@ objects = $(DL_FILE)
 
 $(DL_FILE) = $(DL_FROM)/$(DL_FILE)
 
-$(DL_FILE)_MD5 = 3f486f2f4435ef14b81814dbbc7b48bb
+$(DL_FILE)_MD5 = 76766e98997660138cdaf13a187bd234
 
 install : $(TARGET)
 
-- 
2.17.1


^ permalink raw reply	[flat|nested] 2+ messages in thread

end of thread, other threads:[~2020-04-21 14:09 UTC | newest]

Thread overview: 2+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2020-04-21 13:43 [PATCH] openssl: update to 1.1.1g Arne Fitzenreiter
2020-04-21 14:09 ` Michael Tremer

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox