[Buildroot] [PATCH 1/1] package/libopenssl: security bump to v1.1.1g

Johan Derycke johanderycke at gmail.com
Wed May 6 14:33:18 UTC 2020


Hi,

Can this be applied to 2020.2.x, please?

Thanks,

Johan

Op di 21 apr. 2020 om 22:30 schreef Thomas Petazzoni
<thomas.petazzoni at bootlin.com>:
>
> On Tue, 21 Apr 2020 15:36:51 +0200
> Titouan Christophe <titouan.christophe at railnova.eu> wrote:
>
> > This fixes CVE-2020-1967:
> > Server or client applications that call the SSL_check_chain() function during
> > or after a TLS 1.3 handshake may crash due to a NULL pointer dereference as a
> > result of incorrect handling of the "signature_algorithms_cert" TLS extension.
> > The crash occurs if an invalid or unrecognised signature algorithm is received
> > from the peer. This could be exploited by a malicious peer in a Denial of
> > Service attack. OpenSSL version 1.1.1d, 1.1.1e, and 1.1.1f are affected by this
> > issue. This issue did not affect OpenSSL versions prior to 1.1.1d.
> >
> > See https://www.openssl.org/news/secadv/20200421.txt
> >
> > Also update the hash file to the new two spaces convention
> >
> > Signed-off-by: Titouan Christophe <titouan.christophe at railnova.eu>
> > ---
> >  package/libopenssl/libopenssl.hash | 6 +++---
> >  package/libopenssl/libopenssl.mk   | 2 +-
> >  2 files changed, 4 insertions(+), 4 deletions(-)
>
> Applied to master, thanks.
>
> Thomas
> --
> Thomas Petazzoni, CTO, Bootlin
> Embedded Linux and Kernel engineering
> https://bootlin.com
> _______________________________________________
> buildroot mailing list
> buildroot at busybox.net
> http://lists.busybox.net/mailman/listinfo/buildroot


More information about the buildroot mailing list