Andre Heider 5c7aed8b1e openssl: bump to 1.1.1p
Changes between 1.1.1o and 1.1.1p [21 Jun 2022]

  *) In addition to the c_rehash shell command injection identified in
     CVE-2022-1292, further bugs where the c_rehash script does not
     properly sanitise shell metacharacters to prevent command injection have been
     fixed.

     When the CVE-2022-1292 was fixed it was not discovered that there
     are other places in the script where the file names of certificates
     being hashed were possibly passed to a command executed through the shell.

     This script is distributed by some operating systems in a manner where
     it is automatically executed.  On such operating systems, an attacker
     could execute arbitrary commands with the privileges of the script.

     Use of the c_rehash script is considered obsolete and should be replaced
     by the OpenSSL rehash command line tool.
     (CVE-2022-2068)
     [Daniel Fiala, Tomáš Mráz]

  *) When OpenSSL TLS client is connecting without any supported elliptic
     curves and TLS-1.3 protocol is disabled the connection will no longer fail
     if a ciphersuite that does not use a key exchange based on elliptic
     curves can be negotiated.
     [Tomáš Mráz]

Signed-off-by: Andre Heider <a.heider@gmail.com>
(cherry picked from commit eb7d2abbf06f0a3fe700df5dc6b57ee90016f1f1)
2022-07-04 23:40:43 +02:00
..
2021-02-14 19:38:15 +01:00
2020-02-22 16:34:57 +01:00
2022-02-01 21:25:02 +01:00
2021-02-14 19:38:15 +01:00
2022-04-10 16:26:01 +01:00
2021-12-01 00:39:26 +02:00
2019-11-01 21:19:40 +01:00
2021-10-31 13:01:24 +00:00
2021-12-21 21:37:05 +02:00
2022-06-25 00:05:21 +02:00
2022-04-11 23:17:55 +02:00
2022-03-19 17:42:29 +01:00
2021-12-21 21:36:55 +02:00
2022-07-04 23:40:43 +02:00
2019-02-26 23:20:04 +01:00
2022-04-17 21:47:11 +02:00