Github messages for voidlinux
 help / color / mirror / Atom feed
* [PR PATCH] openssl: update to 1.1.1o
@ 2022-05-18  7:19 dkwo
  2022-05-24  9:47 ` dkwo
                   ` (4 more replies)
  0 siblings, 5 replies; 6+ messages in thread
From: dkwo @ 2022-05-18  7:19 UTC (permalink / raw)
  To: ml

[-- Attachment #1: Type: text/plain, Size: 441 bytes --]

There is a new pull request by dkwo against master on the void-packages repository

https://github.com/dkwo/void-packages openssl
https://github.com/void-linux/void-packages/pull/37180

openssl: update to 1.1.1o
It builds fine on `x86_64 musl`, where only `test/recipes/01-test_symbol_presence.t` has two failures; they do not seem relevant, though.

A patch file from https://github.com/void-linux/void-packages/pull/37180.patch is attached

[-- Warning: decoded text below may be mangled, UTF-8 assumed --]
[-- Attachment #2: github-pr-openssl-37180.patch --]
[-- Type: text/x-diff, Size: 987 bytes --]

From a58d11079bd833b4eb1cf565dd692e1cf5cf5571 Mon Sep 17 00:00:00 2001
From: dkwo <nicolopiazzalunga@gmail.com>
Date: Wed, 18 May 2022 09:18:08 +0200
Subject: [PATCH] openssl: update to 1.1.1o

---
 srcpkgs/openssl/template | 4 ++--
 1 file changed, 2 insertions(+), 2 deletions(-)

diff --git a/srcpkgs/openssl/template b/srcpkgs/openssl/template
index b77267e3d098..76a49ada7e03 100644
--- a/srcpkgs/openssl/template
+++ b/srcpkgs/openssl/template
@@ -1,6 +1,6 @@
 # Template file for 'openssl'
 pkgname=openssl
-version=1.1.1n
+version=1.1.1o
 revision=1
 bootstrap=yes
 build_style=configure
@@ -17,7 +17,7 @@ maintainer="John <johnz@posteo.net>"
 license="OpenSSL"
 homepage="https://www.openssl.org"
 distfiles="https://www.openssl.org/source/openssl-${version}.tar.gz"
-checksum=40dceb51a4f6a5275bde0e6bf20ef4b91bfc32ed57c0552e2e8e15463372b17a
+checksum=9384a2b0570dd80358841464677115df785edb941c71211f75076d72fe6b438f
 conf_files="/etc/ssl/openssl.cnf"
 replaces="libressl>=0"
 

^ permalink raw reply	[flat|nested] 6+ messages in thread

* Re: openssl: update to 1.1.1o
  2022-05-18  7:19 [PR PATCH] openssl: update to 1.1.1o dkwo
@ 2022-05-24  9:47 ` dkwo
  2022-05-24 12:00 ` paper42
                   ` (3 subsequent siblings)
  4 siblings, 0 replies; 6+ messages in thread
From: dkwo @ 2022-05-24  9:47 UTC (permalink / raw)
  To: ml

[-- Attachment #1: Type: text/plain, Size: 250 bytes --]

New comment by dkwo on void-packages repository

https://github.com/void-linux/void-packages/pull/37180#issuecomment-1135675764

Comment:
@Johnnynator This release fixes CVE-2022-1292 so perhaps it's worth updating, despite the trivial test failure.

^ permalink raw reply	[flat|nested] 6+ messages in thread

* Re: openssl: update to 1.1.1o
  2022-05-18  7:19 [PR PATCH] openssl: update to 1.1.1o dkwo
  2022-05-24  9:47 ` dkwo
@ 2022-05-24 12:00 ` paper42
  2022-05-24 12:33 ` dkwo
                   ` (2 subsequent siblings)
  4 siblings, 0 replies; 6+ messages in thread
From: paper42 @ 2022-05-24 12:00 UTC (permalink / raw)
  To: ml

[-- Attachment #1: Type: text/plain, Size: 645 bytes --]

New comment by paper42 on void-packages repository

https://github.com/void-linux/void-packages/pull/37180#issuecomment-1135826944

Comment:
> @Johnnynator This release fixes CVE-2022-1292 so perhaps it's worth updating, despite the trivial test failure.

Is that CVE relevant for us?

https://www.openssl.org/news/secadv/20220503.txt

> The c_rehash script does not properly sanitise shell metacharacters to prevent command injection. This script is distributed by some operating systems in a manner where it is automatically executed. On such operating systems, an attacker could execute arbitrary commands with the privileges of the script. 

^ permalink raw reply	[flat|nested] 6+ messages in thread

* Re: openssl: update to 1.1.1o
  2022-05-18  7:19 [PR PATCH] openssl: update to 1.1.1o dkwo
  2022-05-24  9:47 ` dkwo
  2022-05-24 12:00 ` paper42
@ 2022-05-24 12:33 ` dkwo
  2022-06-16 14:25 ` dkwo
  2022-06-25 17:02 ` [PR PATCH] [Closed]: " dkwo
  4 siblings, 0 replies; 6+ messages in thread
From: dkwo @ 2022-05-24 12:33 UTC (permalink / raw)
  To: ml

[-- Attachment #1: Type: text/plain, Size: 447 bytes --]

New comment by dkwo on void-packages repository

https://github.com/void-linux/void-packages/pull/37180#issuecomment-1135862687

Comment:
If this does not remove it, then yes:
```
post_install() {
	if [ ! "$CHROOT_READY" ]; then
		rm -f "${DESTDIR}/usr/bin/c_rehash"
	fi
}
```
See also:
```
openssl-c_rehash_package() {
	short_desc+=" - c_rehash utility"
	depends="openssl perl"
	pkg_install() {
		vmove usr/bin/c_rehash
	}
}
```

^ permalink raw reply	[flat|nested] 6+ messages in thread

* Re: openssl: update to 1.1.1o
  2022-05-18  7:19 [PR PATCH] openssl: update to 1.1.1o dkwo
                   ` (2 preceding siblings ...)
  2022-05-24 12:33 ` dkwo
@ 2022-06-16 14:25 ` dkwo
  2022-06-25 17:02 ` [PR PATCH] [Closed]: " dkwo
  4 siblings, 0 replies; 6+ messages in thread
From: dkwo @ 2022-06-16 14:25 UTC (permalink / raw)
  To: ml

[-- Attachment #1: Type: text/plain, Size: 240 bytes --]

New comment by dkwo on void-packages repository

https://github.com/void-linux/void-packages/pull/37180#issuecomment-1157723014

Comment:
The symbol test failure seems related to our having an ancient nm (binutils), and the way it outputs.

^ permalink raw reply	[flat|nested] 6+ messages in thread

* Re: [PR PATCH] [Closed]: openssl: update to 1.1.1o
  2022-05-18  7:19 [PR PATCH] openssl: update to 1.1.1o dkwo
                   ` (3 preceding siblings ...)
  2022-06-16 14:25 ` dkwo
@ 2022-06-25 17:02 ` dkwo
  4 siblings, 0 replies; 6+ messages in thread
From: dkwo @ 2022-06-25 17:02 UTC (permalink / raw)
  To: ml

[-- Attachment #1: Type: text/plain, Size: 296 bytes --]

There's a closed pull request on the void-packages repository

openssl: update to 1.1.1o
https://github.com/void-linux/void-packages/pull/37180

Description:
It builds fine on `x86_64 musl`, where only `test/recipes/01-test_symbol_presence.t` has two failures; they do not seem relevant, though.

^ permalink raw reply	[flat|nested] 6+ messages in thread

end of thread, other threads:[~2022-06-25 17:02 UTC | newest]

Thread overview: 6+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2022-05-18  7:19 [PR PATCH] openssl: update to 1.1.1o dkwo
2022-05-24  9:47 ` dkwo
2022-05-24 12:00 ` paper42
2022-05-24 12:33 ` dkwo
2022-06-16 14:25 ` dkwo
2022-06-25 17:02 ` [PR PATCH] [Closed]: " dkwo

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).