openssl: security bump to version 1.0.1k
authorGustavo Zacarias <gustavo@zacarias.com.ar>
Thu, 8 Jan 2015 19:18:22 +0000 (16:18 -0300)
committerThomas Petazzoni <thomas.petazzoni@free-electrons.com>
Thu, 8 Jan 2015 20:16:53 +0000 (21:16 +0100)
Fixes:
CVE-2014-3571 - DTLS segmentation fault in dtls1_get_record
CVE-2015-0206 - DTLS memory leak in dtls1_buffer_record
CVE-2014-3569 - no-ssl3 configuration sets method to NULL
CVE-2014-3572 - ECDHE silently downgrades to ECDH [Client]
CVE-2015-0204 - RSA silently downgrades to EXPORT_RSA [Client]
CVE-2015-0205 - DH client certificates accepted without verification
[Server]
CVE-2014-8275 - Certificate fingerprints can be modified
CVE-2014-3570 - Bignum squaring may produce incorrect results

Signed-off-by: Gustavo Zacarias <gustavo@zacarias.com.ar>
Signed-off-by: Thomas Petazzoni <thomas.petazzoni@free-electrons.com>
package/openssl/openssl.hash
package/openssl/openssl.mk

index 22b15292c6ea9cb93b3b90133d453468707b1a5f..0d27eaec9cfe22988b0ac92975106b28b6c42cd7 100644 (file)
@@ -1,4 +1,4 @@
-# From https://www.openssl.org/source/openssl-1.0.1j.tar.gz.md5
-# From https://www.openssl.org/source/openssl-1.0.1j.tar.gz.sha1
-md5    f7175c9cd3c39bb1907ac8bba9df8ed3        openssl-1.0.1j.tar.gz
-sha1   cff86857507624f0ad42d922bb6f77c4f1c2b819        openssl-1.0.1j.tar.gz
+# From https://www.openssl.org/source/openssl-1.0.1k.tar.gz.md5
+# From https://www.openssl.org/source/openssl-1.0.1k.tar.gz.sha1
+md5    d4f002bd22a56881340105028842ae1f        openssl-1.0.1k.tar.gz
+sha1   19d818e202558c212a9583fcdaf876995a633ddf        openssl-1.0.1k.tar.gz
index 5dc937ab6392cc63cc6dbf41df6cbd39fc9ae162..522224c7379e716a0634d9494106385cc70d649a 100644 (file)
@@ -4,7 +4,7 @@
 #
 ################################################################################
 
-OPENSSL_VERSION = 1.0.1j
+OPENSSL_VERSION = 1.0.1k
 OPENSSL_SITE = http://www.openssl.org/source
 OPENSSL_LICENSE = OpenSSL or SSLeay
 OPENSSL_LICENSE_FILES = LICENSE