96a4aee289
Fixes the following security issues: - The c_rehash script allows command injection (CVE-2022-1292) The c_rehash script does not properly sanitise shell metacharacters to prevent command injection. This script is distributed by some operating systems in a manner where it is automatically executed. On such operating systems, an attacker could execute arbitrary commands with the privileges of the script. Use of the c_rehash script is considered obsolete and should be replaced by the OpenSSL rehash command line tool. https://www.openssl.org/news/secadv/20220503.txt Signed-off-by: Peter Korsgaard <peter@korsgaard.com> Signed-off-by: Arnout Vandecappelle (Essensium/Mind) <arnout@mind.be> |
||
---|---|---|
.. | ||
0001-Dont-waste-time-building-manpages-if-we-re-not-going.patch | ||
0002-Reproducible-build-do-not-leak-compiler-path.patch | ||
0003-Introduce-the-OPENSSL_NO_MADVISE-to-disable-call-to-.patch | ||
0004-Configure-use-ELFv2-ABI-on-some-ppc64-big-endian-sys.patch | ||
0005-crypto-perlasm-ppc-xlate.pl-add-linux64v2-flavour.patch | ||
0006-Add-support-for-io_pgetevents_time64-syscall.patch | ||
0007-Fixup-support-for-io_pgetevents_time64-syscall.patch | ||
Config.in | ||
libopenssl.hash | ||
libopenssl.mk |