* [PR PATCH] openssl: update to 1.1.1o
@ 2022-05-18 7:19 dkwo
2022-05-24 9:47 ` dkwo
` (4 more replies)
0 siblings, 5 replies; 6+ messages in thread
From: dkwo @ 2022-05-18 7:19 UTC (permalink / raw)
To: ml
[-- Attachment #1: Type: text/plain, Size: 441 bytes --]
There is a new pull request by dkwo against master on the void-packages repository
https://github.com/dkwo/void-packages openssl
https://github.com/void-linux/void-packages/pull/37180
openssl: update to 1.1.1o
It builds fine on `x86_64 musl`, where only `test/recipes/01-test_symbol_presence.t` has two failures; they do not seem relevant, though.
A patch file from https://github.com/void-linux/void-packages/pull/37180.patch is attached
[-- Warning: decoded text below may be mangled, UTF-8 assumed --]
[-- Attachment #2: github-pr-openssl-37180.patch --]
[-- Type: text/x-diff, Size: 987 bytes --]
From a58d11079bd833b4eb1cf565dd692e1cf5cf5571 Mon Sep 17 00:00:00 2001
From: dkwo <nicolopiazzalunga@gmail.com>
Date: Wed, 18 May 2022 09:18:08 +0200
Subject: [PATCH] openssl: update to 1.1.1o
---
srcpkgs/openssl/template | 4 ++--
1 file changed, 2 insertions(+), 2 deletions(-)
diff --git a/srcpkgs/openssl/template b/srcpkgs/openssl/template
index b77267e3d098..76a49ada7e03 100644
--- a/srcpkgs/openssl/template
+++ b/srcpkgs/openssl/template
@@ -1,6 +1,6 @@
# Template file for 'openssl'
pkgname=openssl
-version=1.1.1n
+version=1.1.1o
revision=1
bootstrap=yes
build_style=configure
@@ -17,7 +17,7 @@ maintainer="John <johnz@posteo.net>"
license="OpenSSL"
homepage="https://www.openssl.org"
distfiles="https://www.openssl.org/source/openssl-${version}.tar.gz"
-checksum=40dceb51a4f6a5275bde0e6bf20ef4b91bfc32ed57c0552e2e8e15463372b17a
+checksum=9384a2b0570dd80358841464677115df785edb941c71211f75076d72fe6b438f
conf_files="/etc/ssl/openssl.cnf"
replaces="libressl>=0"
^ permalink raw reply [flat|nested] 6+ messages in thread
* Re: openssl: update to 1.1.1o
2022-05-18 7:19 [PR PATCH] openssl: update to 1.1.1o dkwo
@ 2022-05-24 9:47 ` dkwo
2022-05-24 12:00 ` paper42
` (3 subsequent siblings)
4 siblings, 0 replies; 6+ messages in thread
From: dkwo @ 2022-05-24 9:47 UTC (permalink / raw)
To: ml
[-- Attachment #1: Type: text/plain, Size: 250 bytes --]
New comment by dkwo on void-packages repository
https://github.com/void-linux/void-packages/pull/37180#issuecomment-1135675764
Comment:
@Johnnynator This release fixes CVE-2022-1292 so perhaps it's worth updating, despite the trivial test failure.
^ permalink raw reply [flat|nested] 6+ messages in thread
* Re: openssl: update to 1.1.1o
2022-05-18 7:19 [PR PATCH] openssl: update to 1.1.1o dkwo
2022-05-24 9:47 ` dkwo
@ 2022-05-24 12:00 ` paper42
2022-05-24 12:33 ` dkwo
` (2 subsequent siblings)
4 siblings, 0 replies; 6+ messages in thread
From: paper42 @ 2022-05-24 12:00 UTC (permalink / raw)
To: ml
[-- Attachment #1: Type: text/plain, Size: 645 bytes --]
New comment by paper42 on void-packages repository
https://github.com/void-linux/void-packages/pull/37180#issuecomment-1135826944
Comment:
> @Johnnynator This release fixes CVE-2022-1292 so perhaps it's worth updating, despite the trivial test failure.
Is that CVE relevant for us?
https://www.openssl.org/news/secadv/20220503.txt
> The c_rehash script does not properly sanitise shell metacharacters to prevent command injection. This script is distributed by some operating systems in a manner where it is automatically executed. On such operating systems, an attacker could execute arbitrary commands with the privileges of the script.
^ permalink raw reply [flat|nested] 6+ messages in thread
* Re: openssl: update to 1.1.1o
2022-05-18 7:19 [PR PATCH] openssl: update to 1.1.1o dkwo
2022-05-24 9:47 ` dkwo
2022-05-24 12:00 ` paper42
@ 2022-05-24 12:33 ` dkwo
2022-06-16 14:25 ` dkwo
2022-06-25 17:02 ` [PR PATCH] [Closed]: " dkwo
4 siblings, 0 replies; 6+ messages in thread
From: dkwo @ 2022-05-24 12:33 UTC (permalink / raw)
To: ml
[-- Attachment #1: Type: text/plain, Size: 447 bytes --]
New comment by dkwo on void-packages repository
https://github.com/void-linux/void-packages/pull/37180#issuecomment-1135862687
Comment:
If this does not remove it, then yes:
```
post_install() {
if [ ! "$CHROOT_READY" ]; then
rm -f "${DESTDIR}/usr/bin/c_rehash"
fi
}
```
See also:
```
openssl-c_rehash_package() {
short_desc+=" - c_rehash utility"
depends="openssl perl"
pkg_install() {
vmove usr/bin/c_rehash
}
}
```
^ permalink raw reply [flat|nested] 6+ messages in thread
* Re: openssl: update to 1.1.1o
2022-05-18 7:19 [PR PATCH] openssl: update to 1.1.1o dkwo
` (2 preceding siblings ...)
2022-05-24 12:33 ` dkwo
@ 2022-06-16 14:25 ` dkwo
2022-06-25 17:02 ` [PR PATCH] [Closed]: " dkwo
4 siblings, 0 replies; 6+ messages in thread
From: dkwo @ 2022-06-16 14:25 UTC (permalink / raw)
To: ml
[-- Attachment #1: Type: text/plain, Size: 240 bytes --]
New comment by dkwo on void-packages repository
https://github.com/void-linux/void-packages/pull/37180#issuecomment-1157723014
Comment:
The symbol test failure seems related to our having an ancient nm (binutils), and the way it outputs.
^ permalink raw reply [flat|nested] 6+ messages in thread
* Re: [PR PATCH] [Closed]: openssl: update to 1.1.1o
2022-05-18 7:19 [PR PATCH] openssl: update to 1.1.1o dkwo
` (3 preceding siblings ...)
2022-06-16 14:25 ` dkwo
@ 2022-06-25 17:02 ` dkwo
4 siblings, 0 replies; 6+ messages in thread
From: dkwo @ 2022-06-25 17:02 UTC (permalink / raw)
To: ml
[-- Attachment #1: Type: text/plain, Size: 296 bytes --]
There's a closed pull request on the void-packages repository
openssl: update to 1.1.1o
https://github.com/void-linux/void-packages/pull/37180
Description:
It builds fine on `x86_64 musl`, where only `test/recipes/01-test_symbol_presence.t` has two failures; they do not seem relevant, though.
^ permalink raw reply [flat|nested] 6+ messages in thread
end of thread, other threads:[~2022-06-25 17:02 UTC | newest]
Thread overview: 6+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2022-05-18 7:19 [PR PATCH] openssl: update to 1.1.1o dkwo
2022-05-24 9:47 ` dkwo
2022-05-24 12:00 ` paper42
2022-05-24 12:33 ` dkwo
2022-06-16 14:25 ` dkwo
2022-06-25 17:02 ` [PR PATCH] [Closed]: " dkwo
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).