Skip to content

Commit c5d9c9a

Browse files
RafaelGSSjuanarbol
authored andcommittedJul 3, 2022
deps: upgrade openssl sources to 1.1.1p
This updates all sources in deps/openssl/openssl by: $ cd deps/openssl/ $ rm -rf openssl $ tar zxf ~/tmp/openssl-OpenSSL_1_1_1p.tar.gz $ mv openssl-OpenSSL_1_1_1p.tar.gz openssl $ git add --all openssl $ git commit openssl PR-URL: #43527 Refs: https://mta.openssl.org/pipermail/openssl-announce/2022-June/000228.html Reviewed-By: Richard Lau <rlau@redhat.com> Reviewed-By: Tobias Nießen <tniessen@tnie.de>
1 parent a19ca18 commit c5d9c9a

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

55 files changed

+1311
-838
lines changed
 

Diff for: ‎deps/openssl/openssl/CHANGES

+35-9
Original file line numberDiff line numberDiff line change
@@ -7,18 +7,44 @@
77
https://github.com/openssl/openssl/commits/ and pick the appropriate
88
release branch.
99

10+
Changes between 1.1.1o and 1.1.1p [21 Jun 2022]
11+
12+
*) In addition to the c_rehash shell command injection identified in
13+
CVE-2022-1292, further bugs where the c_rehash script does not
14+
properly sanitise shell metacharacters to prevent command injection have been
15+
fixed.
16+
17+
When the CVE-2022-1292 was fixed it was not discovered that there
18+
are other places in the script where the file names of certificates
19+
being hashed were possibly passed to a command executed through the shell.
20+
21+
This script is distributed by some operating systems in a manner where
22+
it is automatically executed. On such operating systems, an attacker
23+
could execute arbitrary commands with the privileges of the script.
24+
25+
Use of the c_rehash script is considered obsolete and should be replaced
26+
by the OpenSSL rehash command line tool.
27+
(CVE-2022-2068)
28+
[Daniel Fiala, Tomáš Mráz]
29+
30+
*) When OpenSSL TLS client is connecting without any supported elliptic
31+
curves and TLS-1.3 protocol is disabled the connection will no longer fail
32+
if a ciphersuite that does not use a key exchange based on elliptic
33+
curves can be negotiated.
34+
[Tomáš Mráz]
35+
1036
Changes between 1.1.1n and 1.1.1o [3 May 2022]
1137

1238
*) Fixed a bug in the c_rehash script which was not properly sanitising shell
13-
metacharacters to prevent command injection. This script is distributed by
14-
some operating systems in a manner where it is automatically executed. On
15-
such operating systems, an attacker could execute arbitrary commands with the
16-
privileges of the script.
17-
18-
Use of the c_rehash script is considered obsolete and should be replaced
19-
by the OpenSSL rehash command line tool.
20-
(CVE-2022-1292)
21-
[Tomáš Mráz]
39+
metacharacters to prevent command injection. This script is distributed
40+
by some operating systems in a manner where it is automatically executed.
41+
On such operating systems, an attacker could execute arbitrary commands
42+
with the privileges of the script.
43+
44+
Use of the c_rehash script is considered obsolete and should be replaced
45+
by the OpenSSL rehash command line tool.
46+
(CVE-2022-1292)
47+
[Tomáš Mráz]
2248

2349
Changes between 1.1.1m and 1.1.1n [15 Mar 2022]
2450

Diff for: ‎deps/openssl/openssl/Configurations/10-main.conf

+7
Original file line numberDiff line numberDiff line change
@@ -995,6 +995,13 @@ my %targets = (
995995
perlasm_scheme => "linux64",
996996
},
997997

998+
"BSD-aarch64" => {
999+
inherit_from => [ "BSD-generic64", asm("aarch64_asm") ],
1000+
lib_cppflags => add("-DL_ENDIAN"),
1001+
bn_ops => "SIXTY_FOUR_BIT_LONG",
1002+
perlasm_scheme => "linux64",
1003+
},
1004+
9981005
"bsdi-elf-gcc" => {
9991006
inherit_from => [ "BASE_unix", asm("x86_elf_asm") ],
10001007
CC => "gcc",

0 commit comments

Comments
 (0)
Please sign in to comment.