[Buildroot] [PATCH 1/1] package/libopenssl: security bump to v1.1.1g

Thomas Petazzoni thomas.petazzoni at bootlin.com
Tue Apr 21 20:29:54 UTC 2020


On Tue, 21 Apr 2020 15:36:51 +0200
Titouan Christophe <titouan.christophe at railnova.eu> wrote:

> This fixes CVE-2020-1967:
> Server or client applications that call the SSL_check_chain() function during
> or after a TLS 1.3 handshake may crash due to a NULL pointer dereference as a
> result of incorrect handling of the "signature_algorithms_cert" TLS extension.
> The crash occurs if an invalid or unrecognised signature algorithm is received
> from the peer. This could be exploited by a malicious peer in a Denial of
> Service attack. OpenSSL version 1.1.1d, 1.1.1e, and 1.1.1f are affected by this
> issue. This issue did not affect OpenSSL versions prior to 1.1.1d.
> 
> See https://www.openssl.org/news/secadv/20200421.txt
> 
> Also update the hash file to the new two spaces convention
> 
> Signed-off-by: Titouan Christophe <titouan.christophe at railnova.eu>
> ---
>  package/libopenssl/libopenssl.hash | 6 +++---
>  package/libopenssl/libopenssl.mk   | 2 +-
>  2 files changed, 4 insertions(+), 4 deletions(-)

Applied to master, thanks.

Thomas
-- 
Thomas Petazzoni, CTO, Bootlin
Embedded Linux and Kernel engineering
https://bootlin.com



More information about the buildroot mailing list