* [master][PATCH] openssl: upgrade to 1.0.1l
@ 2015-01-28 3:14 Qian Lei
2015-01-28 4:05 ` Saul Wold
0 siblings, 1 reply; 2+ messages in thread
From: Qian Lei @ 2015-01-28 3:14 UTC (permalink / raw)
To: openembedded-core
| Changes between 1.0.1k and 1.0.1l [15 Jan 2015]
|
| *) Build fixes for the Windows and OpenVMS platforms
| [Matt Caswell and Richard Levitte]
|
| Changes between 1.0.1j and 1.0.1k [8 Jan 2015]
|
| (CVE-2014-3571)
| (CVE-2015-0206)
| (CVE-2014-3569)
| (CVE-2014-3572)
| (CVE-2015-0204)
| (CVE-2015-0205)
| (CVE-2014-8275)
| (CVE-2014-3570)
|
| *) Ensure that the session ID context of an SSL is updated when its
| SSL_CTX is updated via SSL_set_SSL_CTX.
|
| *) Fix various certificate fingerprint issues.
|
| *) Do not resume sessions on the server if the negotiated protocol
| version does not match the session's version. Resuming with a different
| version, while not strictly forbidden by the RFC, is of questionable
| sanity and breaks all known clients.
| [David Benjamin, Emilia Käsper]
|
| *) Tighten handling of the ChangeCipherSpec (CCS) message: reject
| early CCS messages during renegotiation. (Note that because
| renegotiation is encrypted, this early CCS was not exploitable.)
| [Emilia Käsper]
|
| *) Tighten client-side session ticket handling during renegotiation:
| ensure that the client only accepts a session ticket if the server sends
| the extension anew in the ServerHello. Previously, a TLS client would
| reuse the old extension state and thus accept a session ticket if one was
| announced in the initial ServerHello.
|
| Similarly, ensure that the client requires a session ticket if one
| was advertised in the ServerHello. Previously, a TLS client would
| ignore a missing NewSessionTicket message.
| [Emilia Käsper]
Signed-off-by: Qian Lei <qianl.fnst@cn.fujitsu.com>
---
.../openssl/{openssl_1.0.1j.bb => openssl_1.0.1l.bb} | 4 ++--
1 file changed, 2 insertions(+), 2 deletions(-)
rename meta/recipes-connectivity/openssl/{openssl_1.0.1j.bb => openssl_1.0.1l.bb} (92%)
diff --git a/meta/recipes-connectivity/openssl/openssl_1.0.1j.bb b/meta/recipes-connectivity/openssl/openssl_1.0.1l.bb
similarity index 92%
rename from meta/recipes-connectivity/openssl/openssl_1.0.1j.bb
rename to meta/recipes-connectivity/openssl/openssl_1.0.1l.bb
index 2da18ae..840b995 100644
--- a/meta/recipes-connectivity/openssl/openssl_1.0.1j.bb
+++ b/meta/recipes-connectivity/openssl/openssl_1.0.1l.bb
@@ -38,8 +38,8 @@ SRC_URI += "file://configure-targets.patch \
file://run-ptest \
"
-SRC_URI[md5sum] = "f7175c9cd3c39bb1907ac8bba9df8ed3"
-SRC_URI[sha256sum] = "1b60ca8789ba6f03e8ef20da2293b8dc131c39d83814e775069f02d26354edf3"
+SRC_URI[md5sum] = "cdb22925fc9bc97ccbf1e007661f2aa6"
+SRC_URI[sha256sum] = "b2cf4d48fe5d49f240c61c9e624193a6f232b5ed0baf010681e725963c40d1d4"
PACKAGES =+ " \
${PN}-engines \
--
1.8.3.1
^ permalink raw reply related [flat|nested] 2+ messages in thread
* Re: [master][PATCH] openssl: upgrade to 1.0.1l
2015-01-28 3:14 [master][PATCH] openssl: upgrade to 1.0.1l Qian Lei
@ 2015-01-28 4:05 ` Saul Wold
0 siblings, 0 replies; 2+ messages in thread
From: Saul Wold @ 2015-01-28 4:05 UTC (permalink / raw)
To: Qian Lei, openembedded-core
I think that 1.0.2 is now released also!
Sau!
On 01/27/2015 07:14 PM, Qian Lei wrote:
>
> | Changes between 1.0.1k and 1.0.1l [15 Jan 2015]
> |
> | *) Build fixes for the Windows and OpenVMS platforms
> | [Matt Caswell and Richard Levitte]
> |
> | Changes between 1.0.1j and 1.0.1k [8 Jan 2015]
> |
> | (CVE-2014-3571)
> | (CVE-2015-0206)
> | (CVE-2014-3569)
> | (CVE-2014-3572)
> | (CVE-2015-0204)
> | (CVE-2015-0205)
> | (CVE-2014-8275)
> | (CVE-2014-3570)
> |
> | *) Ensure that the session ID context of an SSL is updated when its
> | SSL_CTX is updated via SSL_set_SSL_CTX.
> |
> | *) Fix various certificate fingerprint issues.
> |
> | *) Do not resume sessions on the server if the negotiated protocol
> | version does not match the session's version. Resuming with a different
> | version, while not strictly forbidden by the RFC, is of questionable
> | sanity and breaks all known clients.
> | [David Benjamin, Emilia Käsper]
> |
> | *) Tighten handling of the ChangeCipherSpec (CCS) message: reject
> | early CCS messages during renegotiation. (Note that because
> | renegotiation is encrypted, this early CCS was not exploitable.)
> | [Emilia Käsper]
> |
> | *) Tighten client-side session ticket handling during renegotiation:
> | ensure that the client only accepts a session ticket if the server sends
> | the extension anew in the ServerHello. Previously, a TLS client would
> | reuse the old extension state and thus accept a session ticket if one was
> | announced in the initial ServerHello.
> |
> | Similarly, ensure that the client requires a session ticket if one
> | was advertised in the ServerHello. Previously, a TLS client would
> | ignore a missing NewSessionTicket message.
> | [Emilia Käsper]
>
> Signed-off-by: Qian Lei <qianl.fnst@cn.fujitsu.com>
> ---
> .../openssl/{openssl_1.0.1j.bb => openssl_1.0.1l.bb} | 4 ++--
> 1 file changed, 2 insertions(+), 2 deletions(-)
> rename meta/recipes-connectivity/openssl/{openssl_1.0.1j.bb => openssl_1.0.1l.bb} (92%)
>
> diff --git a/meta/recipes-connectivity/openssl/openssl_1.0.1j.bb b/meta/recipes-connectivity/openssl/openssl_1.0.1l.bb
> similarity index 92%
> rename from meta/recipes-connectivity/openssl/openssl_1.0.1j.bb
> rename to meta/recipes-connectivity/openssl/openssl_1.0.1l.bb
> index 2da18ae..840b995 100644
> --- a/meta/recipes-connectivity/openssl/openssl_1.0.1j.bb
> +++ b/meta/recipes-connectivity/openssl/openssl_1.0.1l.bb
> @@ -38,8 +38,8 @@ SRC_URI += "file://configure-targets.patch \
> file://run-ptest \
> "
>
> -SRC_URI[md5sum] = "f7175c9cd3c39bb1907ac8bba9df8ed3"
> -SRC_URI[sha256sum] = "1b60ca8789ba6f03e8ef20da2293b8dc131c39d83814e775069f02d26354edf3"
> +SRC_URI[md5sum] = "cdb22925fc9bc97ccbf1e007661f2aa6"
> +SRC_URI[sha256sum] = "b2cf4d48fe5d49f240c61c9e624193a6f232b5ed0baf010681e725963c40d1d4"
>
> PACKAGES =+ " \
> ${PN}-engines \
>
^ permalink raw reply [flat|nested] 2+ messages in thread
end of thread, other threads:[~2015-01-28 4:05 UTC | newest]
Thread overview: 2+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2015-01-28 3:14 [master][PATCH] openssl: upgrade to 1.0.1l Qian Lei
2015-01-28 4:05 ` Saul Wold
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox