package/libopenssl: security bump to version 1.1.1o
Fixes the following security issues: - The c_rehash script allows command injection (CVE-2022-1292) The c_rehash script does not properly sanitise shell metacharacters to prevent command injection. This script is distributed by some operating systems in a manner where it is automatically executed. On such operating systems, an attacker could execute arbitrary commands with the privileges of the script. Use of the c_rehash script is considered obsolete and should be replaced by the OpenSSL rehash command line tool. https://www.openssl.org/news/secadv/20220503.txt Signed-off-by: Peter Korsgaard <peter@korsgaard.com> Signed-off-by: Arnout Vandecappelle (Essensium/Mind) <arnout@mind.be>
This commit is contained in:
parent
fcca757443
commit
96a4aee289
@ -1,5 +1,5 @@
|
||||
# From https://www.openssl.org/source/openssl-1.1.1n.tar.gz.sha256
|
||||
sha256 40dceb51a4f6a5275bde0e6bf20ef4b91bfc32ed57c0552e2e8e15463372b17a openssl-1.1.1n.tar.gz
|
||||
# From https://www.openssl.org/source/openssl-1.1.1o.tar.gz.sha256
|
||||
sha256 9384a2b0570dd80358841464677115df785edb941c71211f75076d72fe6b438f openssl-1.1.1o.tar.gz
|
||||
|
||||
# License files
|
||||
sha256 c32913b33252e71190af2066f08115c69bc9fddadf3bf29296e20c835389841c LICENSE
|
||||
|
@ -4,7 +4,7 @@
|
||||
#
|
||||
################################################################################
|
||||
|
||||
LIBOPENSSL_VERSION = 1.1.1n
|
||||
LIBOPENSSL_VERSION = 1.1.1o
|
||||
LIBOPENSSL_SITE = https://www.openssl.org/source
|
||||
LIBOPENSSL_SOURCE = openssl-$(LIBOPENSSL_VERSION).tar.gz
|
||||
LIBOPENSSL_LICENSE = OpenSSL or SSLeay
|
||||
|
Loading…
Reference in New Issue
Block a user