mailarchive of the ptxdist mailing list
 help / color / mirror / Atom feed
From: Michael Olbrich <m.olbrich@pengutronix.de>
To: ptxdist@pengutronix.de
Cc: Christian Melki <christian.melki@t2data.com>
Subject: Re: [ptxdist] [APPLIED] openssl: Version bump. 3.1.0 -> 3.1.1
Date: Fri,  2 Jun 2023 15:53:04 +0200	[thread overview]
Message-ID: <20230602135304.652280-1-m.olbrich@pengutronix.de> (raw)
In-Reply-To: <20230601170940.148580-1-christian.melki@t2data.com>

Thanks, applied as 4f65114a90568dfe0bcc6c9ba43d7698a97d65c4.

Michael

[sent from post-receive hook]

On Fri, 02 Jun 2023 15:53:04 +0200, Christian Melki <christian.melki@t2data.com> wrote:
> Minor fixes.
> https://www.openssl.org/news/cl31.txt
> 
> https://www.openssl.org/news/vulnerabilities-3.1.html
> Fixes five CVEs (Moderate to low severity).
> CVE-2023-2650 - Possible DoS translating ASN.1 object identifiers
> CVE-2023-0465 - Invalid certificate policies in leaf certificates are silently ignored
> CVE-2023-1255 - Input buffer over-read in AES-XTS implementation on 64 bit ARM
> CVE-2023-0466 - Certificate policy check not enabled
> CVE-2023-0464 - Excessive Resource Usage Verifying X.509 Policy Constraints
> 
> * Forward patches. Applies cleanly.
> And still looks about the same from the debian origin in their 3.1.1.
> 
> Signed-off-by: Christian Melki <christian.melki@t2data.com>
> Message-Id: <20230601170940.148580-1-christian.melki@t2data.com>
> Signed-off-by: Michael Olbrich <m.olbrich@pengutronix.de>
> 
> diff --git a/patches/openssl-3.1.0/0001-debian-targets.patch b/patches/openssl-3.1.1/0001-debian-targets.patch
> similarity index 100%
> rename from patches/openssl-3.1.0/0001-debian-targets.patch
> rename to patches/openssl-3.1.1/0001-debian-targets.patch
> diff --git a/patches/openssl-3.1.0/0002-pic.patch b/patches/openssl-3.1.1/0002-pic.patch
> similarity index 100%
> rename from patches/openssl-3.1.0/0002-pic.patch
> rename to patches/openssl-3.1.1/0002-pic.patch
> diff --git a/patches/openssl-3.1.0/0003-Configure-allow-to-enable-ktls-if-target-does-not-st.patch b/patches/openssl-3.1.1/0003-Configure-allow-to-enable-ktls-if-target-does-not-st.patch
> similarity index 100%
> rename from patches/openssl-3.1.0/0003-Configure-allow-to-enable-ktls-if-target-does-not-st.patch
> rename to patches/openssl-3.1.1/0003-Configure-allow-to-enable-ktls-if-target-does-not-st.patch
> diff --git a/patches/openssl-3.1.0/0004-conf-Serialize-allocation-free-of-ssl_names.patch b/patches/openssl-3.1.1/0004-conf-Serialize-allocation-free-of-ssl_names.patch
> similarity index 100%
> rename from patches/openssl-3.1.0/0004-conf-Serialize-allocation-free-of-ssl_names.patch
> rename to patches/openssl-3.1.1/0004-conf-Serialize-allocation-free-of-ssl_names.patch
> diff --git a/patches/openssl-3.1.0/0005-Configure-drop-fzero-call-used-regs-used-gpr-from-De.patch b/patches/openssl-3.1.1/0005-Configure-drop-fzero-call-used-regs-used-gpr-from-De.patch
> similarity index 100%
> rename from patches/openssl-3.1.0/0005-Configure-drop-fzero-call-used-regs-used-gpr-from-De.patch
> rename to patches/openssl-3.1.1/0005-Configure-drop-fzero-call-used-regs-used-gpr-from-De.patch
> diff --git a/patches/openssl-3.1.0/series b/patches/openssl-3.1.1/series
> similarity index 100%
> rename from patches/openssl-3.1.0/series
> rename to patches/openssl-3.1.1/series
> diff --git a/rules/openssl.make b/rules/openssl.make
> index f4fb408d1abe..e292cd3076fa 100644
> --- a/rules/openssl.make
> +++ b/rules/openssl.make
> @@ -16,8 +16,8 @@ PACKAGES-$(PTXCONF_OPENSSL) += openssl
>  #
>  # Paths and names
>  #
> -OPENSSL_VERSION	:= 3.1.0
> -OPENSSL_MD5	:= f6c520aa2206d4d1fa71ea30b5e9a56d
> +OPENSSL_VERSION	:= 3.1.1
> +OPENSSL_MD5	:= 1864b75e31fb4a6e0a07fd832529add3
>  OPENSSL		:= openssl-$(OPENSSL_VERSION)
>  OPENSSL_SUFFIX	:= tar.gz
>  OPENSSL_URL	:= \



      reply	other threads:[~2023-06-02 13:53 UTC|newest]

Thread overview: 2+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2023-06-01 17:09 [ptxdist] [PATCH] " Christian Melki
2023-06-02 13:53 ` Michael Olbrich [this message]

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=20230602135304.652280-1-m.olbrich@pengutronix.de \
    --to=m.olbrich@pengutronix.de \
    --cc=christian.melki@t2data.com \
    --cc=ptxdist@pengutronix.de \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox