mailarchive of the ptxdist mailing list
 help / color / mirror / Atom feed
From: Christian Melki <christian.melki@t2data.com>
To: ptxdist@pengutronix.de
Subject: [ptxdist] [PATCH] openssl: Version bump. 3.1.0 -> 3.1.1
Date: Thu,  1 Jun 2023 19:09:40 +0200	[thread overview]
Message-ID: <20230601170940.148580-1-christian.melki@t2data.com> (raw)

Minor fixes.
https://www.openssl.org/news/cl31.txt

https://www.openssl.org/news/vulnerabilities-3.1.html
Fixes five CVEs (Moderate to low severity).
CVE-2023-2650 - Possible DoS translating ASN.1 object identifiers
CVE-2023-0465 - Invalid certificate policies in leaf certificates are silently ignored
CVE-2023-1255 - Input buffer over-read in AES-XTS implementation on 64 bit ARM
CVE-2023-0466 - Certificate policy check not enabled
CVE-2023-0464 - Excessive Resource Usage Verifying X.509 Policy Constraints

* Forward patches. Applies cleanly.
And still looks about the same from the debian origin in their 3.1.1.

Signed-off-by: Christian Melki <christian.melki@t2data.com>
---
 .../0001-debian-targets.patch                                 | 0
 patches/{openssl-3.1.0 => openssl-3.1.1}/0002-pic.patch       | 0
 ...Configure-allow-to-enable-ktls-if-target-does-not-st.patch | 0
 .../0004-conf-Serialize-allocation-free-of-ssl_names.patch    | 0
 ...Configure-drop-fzero-call-used-regs-used-gpr-from-De.patch | 0
 patches/{openssl-3.1.0 => openssl-3.1.1}/series               | 0
 rules/openssl.make                                            | 4 ++--
 7 files changed, 2 insertions(+), 2 deletions(-)
 rename patches/{openssl-3.1.0 => openssl-3.1.1}/0001-debian-targets.patch (100%)
 rename patches/{openssl-3.1.0 => openssl-3.1.1}/0002-pic.patch (100%)
 rename patches/{openssl-3.1.0 => openssl-3.1.1}/0003-Configure-allow-to-enable-ktls-if-target-does-not-st.patch (100%)
 rename patches/{openssl-3.1.0 => openssl-3.1.1}/0004-conf-Serialize-allocation-free-of-ssl_names.patch (100%)
 rename patches/{openssl-3.1.0 => openssl-3.1.1}/0005-Configure-drop-fzero-call-used-regs-used-gpr-from-De.patch (100%)
 rename patches/{openssl-3.1.0 => openssl-3.1.1}/series (100%)

diff --git a/patches/openssl-3.1.0/0001-debian-targets.patch b/patches/openssl-3.1.1/0001-debian-targets.patch
similarity index 100%
rename from patches/openssl-3.1.0/0001-debian-targets.patch
rename to patches/openssl-3.1.1/0001-debian-targets.patch
diff --git a/patches/openssl-3.1.0/0002-pic.patch b/patches/openssl-3.1.1/0002-pic.patch
similarity index 100%
rename from patches/openssl-3.1.0/0002-pic.patch
rename to patches/openssl-3.1.1/0002-pic.patch
diff --git a/patches/openssl-3.1.0/0003-Configure-allow-to-enable-ktls-if-target-does-not-st.patch b/patches/openssl-3.1.1/0003-Configure-allow-to-enable-ktls-if-target-does-not-st.patch
similarity index 100%
rename from patches/openssl-3.1.0/0003-Configure-allow-to-enable-ktls-if-target-does-not-st.patch
rename to patches/openssl-3.1.1/0003-Configure-allow-to-enable-ktls-if-target-does-not-st.patch
diff --git a/patches/openssl-3.1.0/0004-conf-Serialize-allocation-free-of-ssl_names.patch b/patches/openssl-3.1.1/0004-conf-Serialize-allocation-free-of-ssl_names.patch
similarity index 100%
rename from patches/openssl-3.1.0/0004-conf-Serialize-allocation-free-of-ssl_names.patch
rename to patches/openssl-3.1.1/0004-conf-Serialize-allocation-free-of-ssl_names.patch
diff --git a/patches/openssl-3.1.0/0005-Configure-drop-fzero-call-used-regs-used-gpr-from-De.patch b/patches/openssl-3.1.1/0005-Configure-drop-fzero-call-used-regs-used-gpr-from-De.patch
similarity index 100%
rename from patches/openssl-3.1.0/0005-Configure-drop-fzero-call-used-regs-used-gpr-from-De.patch
rename to patches/openssl-3.1.1/0005-Configure-drop-fzero-call-used-regs-used-gpr-from-De.patch
diff --git a/patches/openssl-3.1.0/series b/patches/openssl-3.1.1/series
similarity index 100%
rename from patches/openssl-3.1.0/series
rename to patches/openssl-3.1.1/series
diff --git a/rules/openssl.make b/rules/openssl.make
index f4fb408d1..e292cd307 100644
--- a/rules/openssl.make
+++ b/rules/openssl.make
@@ -16,8 +16,8 @@ PACKAGES-$(PTXCONF_OPENSSL) += openssl
 #
 # Paths and names
 #
-OPENSSL_VERSION	:= 3.1.0
-OPENSSL_MD5	:= f6c520aa2206d4d1fa71ea30b5e9a56d
+OPENSSL_VERSION	:= 3.1.1
+OPENSSL_MD5	:= 1864b75e31fb4a6e0a07fd832529add3
 OPENSSL		:= openssl-$(OPENSSL_VERSION)
 OPENSSL_SUFFIX	:= tar.gz
 OPENSSL_URL	:= \
-- 
2.34.1




             reply	other threads:[~2023-06-01 17:10 UTC|newest]

Thread overview: 2+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2023-06-01 17:09 Christian Melki [this message]
2023-06-02 13:53 ` [ptxdist] [APPLIED] " Michael Olbrich

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=20230601170940.148580-1-christian.melki@t2data.com \
    --to=christian.melki@t2data.com \
    --cc=ptxdist@pengutronix.de \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox