From mboxrd@z Thu Jan 1 00:00:00 1970 Delivery-date: Sun, 01 Feb 2026 20:22:31 +0100 Received: from metis.whiteo.stw.pengutronix.de ([2a0a:edc0:2:b01:1d::104]) by lore.white.stw.pengutronix.de with esmtps (TLS1.3) tls TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (Exim 4.96) (envelope-from ) id 1vmd1j-007nZQ-2E for lore@lore.pengutronix.de; Sun, 01 Feb 2026 20:22:31 +0100 Received: from localhost ([127.0.0.1] helo=metis.whiteo.stw.pengutronix.de) by metis.whiteo.stw.pengutronix.de with esmtp (Exim 4.92) (envelope-from ) id 1vmd1j-0006aL-4T; Sun, 01 Feb 2026 20:22:31 +0100 Received: from mail-westeuropeazon11021107.outbound.protection.outlook.com ([52.101.70.107] helo=AS8PR04CU009.outbound.protection.outlook.com) by metis.whiteo.stw.pengutronix.de with esmtps (TLS1.3:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.92) (envelope-from ) id 1vmd1O-0006aB-NF for ptxdist@pengutronix.de; Sun, 01 Feb 2026 20:22:11 +0100 ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=yBNjL5o1wW4/cn3NcRCp96WWyu7rldNfz7KVKQ20ZYalLPxgKjyG/enR6uyV0EGhvK6AM9EzO64y8/yOTol3dcEr1e02/+DOaTWIOsTNm3FFPyaICmgK9MCQqylLzi62YOsirfSb6NHnmci6LQGUr0Eaed+FrgDggiEevR1aMcbRheP8b2V+8rMVVlE16Tqy0xB3WcwvPtpsY4+/woYY9Emesd4Mwppu9Ro0fclXHXUcDxDCVrbtvvlO9JTZa4LwKFqpJpePWPf4XZxiXeq/mMMviSDSiAVRE5+R14EcHqy9WnGpxyK6Mk5LUMSy0RFhj0usJvsbmKAS75mbRWivug== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=zXb5L9II8lc52bM5qL2aPRX3mSaaOkpy8kCHBdMkqAY=; b=v34omu0V0sa+M3EkjFrOssMciDmRxsrdzv1YzVwyjkup7JPhSkuXDykgStTNOTovPy05Oynfh0vro+PFgO2v6snOuV93ZVYEGfw84hL5zk5W+O8NXTZ1sPQ5Cv4X5slsQzRyn1BuM1FU2Uz0a/u9ETmyMRcmLkMEz4zAw39CAVGwy7OnaQArGw887wEaLVndkmQLKTXVjYcxYbI0JKIBZwqQbVoWs4KzsG/7o7xkr7BZtkYSyPVGEQPuqAl9vQYXGuiqdziYCoDvFfK04KmxrB3DvlTaK7DMboX+7+dLIF9zXhhqDT7fsm+6hC6xqnnUOp6rGKwUU7U4njeQ1O3h5w== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=t2data.com; dmarc=pass action=none header.from=t2data.com; dkim=pass header.d=t2data.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=t2datacom.onmicrosoft.com; s=selector1-t2datacom-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=zXb5L9II8lc52bM5qL2aPRX3mSaaOkpy8kCHBdMkqAY=; b=eg3VXXUW+7nJIBYp8W9RAca6sMpDwc6Hf6FnrYXyiA80HANchbIqBrYCAMolv3Z00UFEYdFv9GuR5IF/kt0rXUgcoRort/O5wA3WV0dmlkPw56dQvjgWmsAnuyO+9PrRm0+GUh5WQ4etjoMLAAK0dBvawnZQGRFWpOrEmyWU65s= Authentication-Results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=t2data.com; Received: from AS4P251MB0635.EURP251.PROD.OUTLOOK.COM (2603:10a6:20b:4be::7) by AM9P251MB0071.EURP251.PROD.OUTLOOK.COM (2603:10a6:20b:41c::14) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.9564.11; Sun, 1 Feb 2026 19:22:08 +0000 Received: from AS4P251MB0635.EURP251.PROD.OUTLOOK.COM ([fe80::f002:cc7e:469d:d120]) by AS4P251MB0635.EURP251.PROD.OUTLOOK.COM ([fe80::f002:cc7e:469d:d120%3]) with mapi id 15.20.9564.014; Sun, 1 Feb 2026 19:22:08 +0000 From: Christian Melki To: ptxdist@pengutronix.de Date: Sun, 1 Feb 2026 20:21:43 +0100 Message-ID: <20260201192143.3583956-1-christian.melki@t2data.com> X-Mailer: git-send-email 2.43.0 Content-Transfer-Encoding: 8bit Content-Type: text/plain X-ClientProxiedBy: GVX0EPF0005F6BD.SWEP280.PROD.OUTLOOK.COM (2603:10a6:158:401::647) To AS4P251MB0635.EURP251.PROD.OUTLOOK.COM (2603:10a6:20b:4be::7) MIME-Version: 1.0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: AS4P251MB0635:EE_|AM9P251MB0071:EE_ X-MS-Office365-Filtering-Correlation-Id: e621f90c-b32b-4c03-6c49-08de61c730fc X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0; ARA:13230040|1800799024|376014|52116014|366016|38350700014; X-Microsoft-Antispam-Message-Info: =?us-ascii?Q?CYLJfMmVkYzHp3ost/rF0wrocGIH9Su4V5v/xKPr/etPKnvQMY/l7rXf/0mb?= =?us-ascii?Q?wJ1SXHyDM8mbMXFg1v0prXf4+gWbdLRj/dW5jJwW521N1fhB2LL7p/KT+Sts?= =?us-ascii?Q?CxGULuQ5v2W/vSth5K3QmQ+lWhGnPX4KyJemRQHqT92+K/eNBt8fUf9Fz1Z/?= =?us-ascii?Q?MAr6EOA9YTyu0I1gntNzoqI8sP0CRPZBtYX2ymm+I+4OQUGeDa2o35VLyRyW?= =?us-ascii?Q?amXIO2Q1gycrMr8MKAP1tgwYnSlB+aa2H/IVWQJUU3UfckcHVpuCzQxBJNOg?= =?us-ascii?Q?6lhdLfYtAOhSaf7YmMl/Er8JR4DDCpeXiQWNI/WYXqrXr/h9q6o7zIUuP8sY?= =?us-ascii?Q?aPoPkznuA+w/wO9gCfaCutIdTPRr/CTNnxWDk6Lf/O1dIo6yWg5x3Lg4xBfY?= =?us-ascii?Q?lzZAFyfXuWH6XO4hPjoBK31Cjek/riCD6dR3InCcNOtoyr4Cv0aRwW1668Qc?= =?us-ascii?Q?b26HSVgCT4dk5hd05/JbUI67TkcYcCHUEPDfTcCR9GgQGLpkfnMtGk+yrLmz?= =?us-ascii?Q?ZjawMyHmuqTv7CQGElPI+enxO4Lx/qbGOCzAnMEkP/ZB61XKKihuDh3h9EgT?= =?us-ascii?Q?zpv553AP9z4Gd974D3005g7M1oQL585d+RW9srSnacCnp1avM7VIRNiM2+lv?= =?us-ascii?Q?wCUVRh3ckVNtK0b760SwHHLQtT4GMcQWH0YdPhKxD+mDyiHkk7IdHEiSH70Q?= =?us-ascii?Q?Nz0MtGXEZ/dtdWCb1cM098Be6ouBWKuQeZk07C+Bl/RPkfPs+GlEZy99QAh+?= =?us-ascii?Q?pem0G1oGUw+XMYsxvZyrt5bIzlR7ZK2T5iTPfvlCkXDxGnl2QpRSEhuAhQCA?= =?us-ascii?Q?c2rHl4NO5HlSIpcDnMZXUJVUocNty6w+r6r6prPFSNsrzyVB8yR8wARTk9MD?= =?us-ascii?Q?Gx9FUm1PGcuoQyO4CPwvURDINdmKDWxRizkziVBVDtrKW+Vg2R24UDVNybyx?= =?us-ascii?Q?/ds5jnpANMFuAGcKopGEBr1TgjUnmvm5Sfxxip0sMJR/v0mZ0kccINkKYCdY?= =?us-ascii?Q?HyeL9MwaRNmfbuFdzwP9ErvwMp8Paze8S1v9xUBaGvo/rOM0FIHwKjNiXEsw?= =?us-ascii?Q?KlbmiYBu35NcSpK/jJgeRQH+6E5cuod2hua4p1voLw4aRRc/I0WEVeAEtw0x?= =?us-ascii?Q?X2c36XRTdTz8/WlVPJukmwAcuatnNUTetJhSAvkF4JbQF+y4PGXCMJqzXtnJ?= =?us-ascii?Q?7DQS4GQt4XJ9yRvKEU398JRO+M4TRFw0VEWamGfKooyVLMmw+8WYTNsOOFPX?= =?us-ascii?Q?kfKLBkUzLmcOc3NoL0dWSBmYmV5LYmAnMoriKK+r+yTZBEvBmckqZu3/T106?= =?us-ascii?Q?xWUg/BKewLBzFecMAB1hWKZA4fks038ynqO8A1M9AHrfqZrIOVdNVRV0OdVD?= =?us-ascii?Q?XuhQc5JtiWFpaeX3GVuNPki6n5G8fqoo5+StWVw0Ecvxz/M92IeZQH4ZMNt4?= =?us-ascii?Q?y8ARFIAocmaNWRBX/fK4AVi1SDjS6bZGU6aaFNt6AKHtcvMFrNaekImUUKGU?= =?us-ascii?Q?uXzxDupFil+bhUJwPhDmCG9NWsOx6gp/JWY/1CgeYKk2ZvtE8WjZ8fAHiRnX?= =?us-ascii?Q?fymh2JAoPh5ATq6tHmf8QEzPRY8SoyvSOMygB5qHTOiF4wOFCEuwXTx/CFIw?= =?us-ascii?Q?IsLQosWwzmWfyOvSJU5J1+o=3D?= X-Forefront-Antispam-Report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:AS4P251MB0635.EURP251.PROD.OUTLOOK.COM; PTR:; CAT:NONE; SFS:(13230040)(1800799024)(376014)(52116014)(366016)(38350700014); DIR:OUT; SFP:1102; X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1 X-MS-Exchange-AntiSpam-MessageData-0: =?us-ascii?Q?HofIXr8p1Vm0z60pE/06x60WaRBHeCIziCMmpVgMMQ+FoVx/ZSFsatAa8OJD?= =?us-ascii?Q?sTOzmnJLJd01J7p+Z7qklU19ePnFxotg+9AFg8W2IMAyR4hpevW5OYVz944R?= =?us-ascii?Q?K8CP+B4jU1ixZlekSmBD5Bi59K2Or4ejmvcZDaDxgtbexv67TFMISBot2WmK?= =?us-ascii?Q?knwzz8WY8bLhQwQYwgzBnmM5jRbiggI/Ixu8E9JUVocA2ajjGPmCfqdxwlKO?= =?us-ascii?Q?CJJUIr0IkYlmZJJ9OD/WIHKbvWljoVYHYMRPojzVp+M1cS6F6QpJirAqHUt5?= =?us-ascii?Q?qW2lkeRL7QhHBrBzYr3CcdlBFVbg6T91ft1siVwWgzwlXQxRDQjrW3xymMtC?= =?us-ascii?Q?3ZUgoEGkJFFOcNpCJMOuv3HzZ6CD7bK4UpmJCtD9S2Z0ooJz/bmDB+XB5coB?= =?us-ascii?Q?MIab7OSv41WzOJ3Q7cLe/W4sZOUGg6Z6ApMSTEJw4KcO3mKiPXZIOC/ZiRk/?= =?us-ascii?Q?007SEWVTDqzOkX8I8aThtHPcOGiRfB6avGqlUsINodWsUusyd6Pn8GmsDki1?= =?us-ascii?Q?k/P9SQtA05wuvUeRy791HNO1vn3ucSr3SDufOi4ij/VUpesmIHjIfWbbWL9o?= =?us-ascii?Q?cH1LYHAp1CQIgVepjbXyIHQzNMvj6T0Z79sJTXMP8D9yNFuHyMG65i9wV6Bm?= =?us-ascii?Q?PSLdkga4SVmo8V9ZrHYTkh1hN6AQ83yA/XTesFAdBg1oY1giIH1kkdLyl8TT?= =?us-ascii?Q?W8ATkt+uKGMhoozTHzZM+u01bjrGUHr0qVlgizc1Ed2cAdgYvCGRiKj7bbbH?= =?us-ascii?Q?pXQ8l+D1bV8324bN7ikCo82ONSV23pvb5MBD4z4DiAKXJp2ivh3Ty4JmGwQe?= =?us-ascii?Q?0eudLzMZKU2LAhmuBuYLnBX8yVXWKfwkgFHBhYOIh48oJtKNaKc/yoDALoE3?= =?us-ascii?Q?CnuD8nTVAEfxyQfBH/qyJrO00V7gBc5VFTyipivJdbaX+iUnSYoqLjub/QB2?= =?us-ascii?Q?tWIaCWTRb32q2c/KnZ8FbI5jk91+HEbiI0cNyE/AMthTQqUfs6i9l5rHNAY8?= =?us-ascii?Q?LsNHiWhSJ8i/T5Q0kV7+VDBJKGlVUvF+FHfPHwzYwxouw8vAw/g/gBCp8P8l?= =?us-ascii?Q?OsLEafnfpjZW9jOcKRWXBjrp/pxJoDoTlAWBs7n6uIy7JTSL1JKV14vDNhMK?= =?us-ascii?Q?h/KWI9jFPc2v3lpZjYiLs1I4QSo3RSvpKMKKB1zu5DW/Ml/45zgzyb5nKDYD?= =?us-ascii?Q?ZHLosHsAv770Wd38Wd2sKGECK8XkKg/zoD+x80AOHeCNVLt7iNeiz53SJBpE?= =?us-ascii?Q?2AOUr2u3NNlWmXFsGV1vooghCS6rjetK+aQ2n+6DmwOwUeB6e+OBlYuHBLuP?= =?us-ascii?Q?4HgdxwmL6wNHOWaYv2n7uvCkyLM+p/HRwqoMqxWCCH9rz+xAelOdkknNDYb7?= =?us-ascii?Q?Hp5OZEanB4mIPbeRR2j64tOk+YvbontsqUS6WCGyKUg1SGitJQKGu9sl/WIJ?= =?us-ascii?Q?Hnpub0/4TtxPnKLNFdGlZtEdvrJeY4L02PaGRn6rHSt/3pbOg/gtSObDZXqq?= =?us-ascii?Q?xzm8Ld22DMkE3qp8TfYuFY+SQZzFU+4toQKat8PZLbil3Ie04j8+gnHe1x04?= =?us-ascii?Q?nA7faoYu2c7/N4PFg/8fbOpV+d6+YmV0aWeFZdB5joF9z82TMW804z2/ml/p?= =?us-ascii?Q?cER8MQXdfVSvV0ipIooEABNbnKGISFmrhNVJQ9O1MFOSdAmxaxXVxhJ3tAUU?= =?us-ascii?Q?ey84A+RAA7wa6xPpNNccJYubR0TmzqfwjkRXHV4ITx7XVrha05pE9ykQNCcC?= =?us-ascii?Q?K5BYS9bmsq1h7beUWap/p3IH8gRYizw=3D?= X-OriginatorOrg: t2data.com X-MS-Exchange-CrossTenant-Network-Message-Id: e621f90c-b32b-4c03-6c49-08de61c730fc X-MS-Exchange-CrossTenant-AuthSource: AS4P251MB0635.EURP251.PROD.OUTLOOK.COM X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-OriginalArrivalTime: 01 Feb 2026 19:22:08.5398 (UTC) X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-CrossTenant-Id: 27928da5-aacd-4ba1-9566-c748a6863e6c X-MS-Exchange-CrossTenant-MailboxType: HOSTED X-MS-Exchange-CrossTenant-UserPrincipalName: qi5a0SoSWVSMRSo1/zEmyGVWtaAlZZCZICwOViB4oPCVEdnczcmtdcY7OgypWiDQTezV7ZZo7uBHFNqzGIiGlydGgWzGxJb3RIXO9exgAT0= X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM9P251MB0071 X-Spam-Checker-Version: SpamAssassin 3.4.2 (2018-09-13) on metis.whiteo.stw.pengutronix.de X-Spam-Level: X-Spam-Status: No, score=-2.4 required=4.0 tests=AWL,BAYES_00,DKIM_SIGNED, DKIM_VALID,RCVD_IN_DNSWL_NONE,RCVD_IN_MSPIKE_H2, RCVD_IN_VALIDITY_RPBL_BLOCKED,RCVD_IN_VALIDITY_SAFE_BLOCKED, SPF_HELO_PASS,SPF_PASS autolearn=ham autolearn_force=no version=3.4.2 Subject: [ptxdist] [PATCH] openssl: Version bump. 3.5.4 -> 3.5.5 X-BeenThere: ptxdist@pengutronix.de X-Mailman-Version: 2.1.29 Precedence: list List-Id: PTXdist Development Mailing List List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Reply-To: ptxdist@pengutronix.de Sender: "ptxdist" X-SA-Exim-Connect-IP: 127.0.0.1 X-SA-Exim-Mail-From: ptxdist-bounces@pengutronix.de X-SA-Exim-Scanned: No (on metis.whiteo.stw.pengutronix.de); SAEximRunCond expanded to false Security bump. https://github.com/openssl/openssl/releases/tag/openssl-3.5.5 Plugs CVEs: CVE-2025-11187: Fixed Improper validation of PBMAC1 parameters in PKCS#12 MAC verification. CVE-2025-15467: Fixed Stack buffer overflow in CMS AuthEnvelopedData parsing. CVE-2025-15468: Fixed NULL dereference in SSL_CIPHER_find() function on unknown cipher ID. CVE-2025-15469: Fixed openssl dgst one-shot codepath silently truncates inputs >16 MiB. CVE-2025-66199: Fixed TLS 1.3 CompressedCertificate excessive memory allocation. CVE-2025-68160: Fixed Heap out-of-bounds write in BIO_f_linebuffer on short writes. CVE-2025-69418: Fixed Unauthenticated/unencrypted trailing bytes with low-level OCB function calls. CVE-2025-69419: Fixed Out of bounds write in PKCS12_get_friendlyname() UTF-8 conversion. CVE-2025-69420: Fixed Missing ASN1_TYPE validation in TS_RESP_verify_response() function. CVE-2025-69421: Fixed NULL Pointer Dereference in PKCS12_item_decrypt_d2i_ex() function. CVE-2026-22795: Fixed Missing ASN1_TYPE validation in PKCS#12 parsing. CVE-2026-22796: Fixed ASN1_TYPE Type Confusion in the PKCS7_digest_from_attributes() function. * Forward patchset, adjusted offsets, applies cleanly. Signed-off-by: Christian Melki --- .../0001-debian-targets.patch | 2 +- patches/{openssl-3.5.4 => openssl-3.5.5}/0002-pic.patch | 0 ...igure-allow-to-enable-ktls-if-target-does-not-st.patch | 0 ...0004-conf-Serialize-allocation-free-of-ssl_names.patch | 8 ++++---- patches/{openssl-3.5.4 => openssl-3.5.5}/series | 2 +- rules/openssl.make | 4 ++-- 6 files changed, 8 insertions(+), 8 deletions(-) rename patches/{openssl-3.5.4 => openssl-3.5.5}/0001-debian-targets.patch (99%) rename patches/{openssl-3.5.4 => openssl-3.5.5}/0002-pic.patch (100%) rename patches/{openssl-3.5.4 => openssl-3.5.5}/0003-Configure-allow-to-enable-ktls-if-target-does-not-st.patch (100%) rename patches/{openssl-3.5.4 => openssl-3.5.5}/0004-conf-Serialize-allocation-free-of-ssl_names.patch (94%) rename patches/{openssl-3.5.4 => openssl-3.5.5}/series (82%) diff --git a/patches/openssl-3.5.4/0001-debian-targets.patch b/patches/openssl-3.5.5/0001-debian-targets.patch similarity index 99% rename from patches/openssl-3.5.4/0001-debian-targets.patch rename to patches/openssl-3.5.5/0001-debian-targets.patch index 8b3a60e4d..ad7bfa4af 100644 --- a/patches/openssl-3.5.4/0001-debian-targets.patch +++ b/patches/openssl-3.5.5/0001-debian-targets.patch @@ -6,7 +6,7 @@ Imported from openssl_3.5.2-1.debian.tar.xz Signed-off-by: Michael Olbrich --- - Configurations/20-debian.conf | 163 ++++++++++++++++++++++++++++++++++ + Configurations/20-debian.conf | 163 ++++++++++++++++++++++++++++++++++++++++++ 1 file changed, 163 insertions(+) create mode 100644 Configurations/20-debian.conf diff --git a/patches/openssl-3.5.4/0002-pic.patch b/patches/openssl-3.5.5/0002-pic.patch similarity index 100% rename from patches/openssl-3.5.4/0002-pic.patch rename to patches/openssl-3.5.5/0002-pic.patch diff --git a/patches/openssl-3.5.4/0003-Configure-allow-to-enable-ktls-if-target-does-not-st.patch b/patches/openssl-3.5.5/0003-Configure-allow-to-enable-ktls-if-target-does-not-st.patch similarity index 100% rename from patches/openssl-3.5.4/0003-Configure-allow-to-enable-ktls-if-target-does-not-st.patch rename to patches/openssl-3.5.5/0003-Configure-allow-to-enable-ktls-if-target-does-not-st.patch diff --git a/patches/openssl-3.5.4/0004-conf-Serialize-allocation-free-of-ssl_names.patch b/patches/openssl-3.5.5/0004-conf-Serialize-allocation-free-of-ssl_names.patch similarity index 94% rename from patches/openssl-3.5.4/0004-conf-Serialize-allocation-free-of-ssl_names.patch rename to patches/openssl-3.5.5/0004-conf-Serialize-allocation-free-of-ssl_names.patch index 870bc1305..eb39b4458 100644 --- a/patches/openssl-3.5.4/0004-conf-Serialize-allocation-free-of-ssl_names.patch +++ b/patches/openssl-3.5.5/0004-conf-Serialize-allocation-free-of-ssl_names.patch @@ -19,7 +19,7 @@ Signed-off-by: Michael Olbrich 1 file changed, 32 insertions(+), 3 deletions(-) diff --git a/crypto/conf/conf_ssl.c b/crypto/conf/conf_ssl.c -index 84c5b2afe581..d6596e60c3b5 100644 +index c8796715c00e..2e152a1c0c2c 100644 --- a/crypto/conf/conf_ssl.c +++ b/crypto/conf/conf_ssl.c @@ -12,6 +12,7 @@ @@ -85,7 +85,7 @@ index 84c5b2afe581..d6596e60c3b5 100644 ssl_conf_section = CONF_imodule_get_value(md); cmd_lists = NCONF_get_section(cnf, ssl_conf_section); if (sk_CONF_VALUE_num(cmd_lists) <= 0) { -@@ -77,7 +105,7 @@ static int ssl_module_init(CONF_IMODULE *md, const CONF *cnf) +@@ -76,7 +104,7 @@ static int ssl_module_init(CONF_IMODULE *md, const CONF *cnf) goto err; } cnt = sk_CONF_VALUE_num(cmd_lists); @@ -94,9 +94,9 @@ index 84c5b2afe581..d6596e60c3b5 100644 ssl_names = OPENSSL_zalloc(sizeof(*ssl_names) * cnt); if (ssl_names == NULL) goto err; -@@ -126,7 +154,8 @@ static int ssl_module_init(CONF_IMODULE *md, const CONF *cnf) +@@ -123,7 +151,8 @@ static int ssl_module_init(CONF_IMODULE *md, const CONF *cnf) rv = 1; - err: + err: if (rv == 0) - ssl_module_free(md); + ssl_module_free_unlocked(md); diff --git a/patches/openssl-3.5.4/series b/patches/openssl-3.5.5/series similarity index 82% rename from patches/openssl-3.5.4/series rename to patches/openssl-3.5.5/series index d9889f0bb..43d793018 100644 --- a/patches/openssl-3.5.4/series +++ b/patches/openssl-3.5.5/series @@ -6,4 +6,4 @@ 0003-Configure-allow-to-enable-ktls-if-target-does-not-st.patch 0004-conf-Serialize-allocation-free-of-ssl_names.patch #tag:upstream --start-number 100 -# ab24a399a1a602376760e385c08ab320 - git-ptx-patches magic +# 737c785d3b0f99ce20c6c5dd18240f8a - git-ptx-patches magic diff --git a/rules/openssl.make b/rules/openssl.make index 239a2436e..988ff36e6 100644 --- a/rules/openssl.make +++ b/rules/openssl.make @@ -16,8 +16,8 @@ PACKAGES-$(PTXCONF_OPENSSL) += openssl # # Paths and names # -OPENSSL_VERSION := 3.5.4 -OPENSSL_MD5 := 570a7ab371147b6ba72c6d0fed93131f +OPENSSL_VERSION := 3.5.5 +OPENSSL_MD5 := 9c86d929c3d1067e2c88239d7d1ce81b OPENSSL := openssl-$(OPENSSL_VERSION) OPENSSL_SUFFIX := tar.gz OPENSSL_URL := \ -- 2.43.0