Message ID | 5c4fe7cfd378c9f89f8af5c953685f72994e9a74.1657040169.git.leo@famulari.name |
---|---|
State | Accepted |
Headers | show |
Series | [bug#56403,1/2] gnu: OpenSSL: Update to 1.1.1q [fixes CVE-2022-2097]. | expand |
Context | Check | Description |
---|---|---|
cbaines/comparison | success | View comparision |
cbaines/git branch | success | View Git branch |
cbaines/applying patch | success | View Laminar job |
cbaines/issue | success | View issue |
cbaines/comparison | success | View comparision |
cbaines/git branch | success | View Git branch |
cbaines/applying patch | success | View Laminar job |
cbaines/issue | success | View issue |
On Tue, Jul 05, 2022 at 12:56:08PM -0400, Leo Famulari wrote: > https://www.cve.org/CVERecord?id=CVE-2022-2097 > > * gnu/packages/tls.scm (openssl/fixed): Update to 1.1.1q. I pushed these patches as fe24e0c29cfe69d0c1aec819ce1a7e96362bafe6
diff --git a/gnu/packages/tls.scm b/gnu/packages/tls.scm index 9e52225d52..f65ae63379 100644 --- a/gnu/packages/tls.scm +++ b/gnu/packages/tls.scm @@ -507,7 +507,7 @@ (define openssl/fixed (package (inherit openssl) (name "openssl") - (version "1.1.1p") + (version "1.1.1q") (source (origin (method url-fetch) (uri (list (string-append "https://www.openssl.org/source/openssl-" @@ -520,7 +520,7 @@ (define openssl/fixed (patches (search-patches "openssl-1.1-c-rehash-in.patch")) (sha256 (base32 - "0vyfibydji26wk1fmm0piz0810mfr7j4vaa2k5iwgiv6m8mbcqdz")))))) + "1jhhzp4gh6ymidxm1ckjk948l583awp0w3y2nvqdz7022kk9r4yp")))))) (define-public openssl-3.0 (package