diff options
author | Lee Chee Yang <chee.yang.lee@intel.com> | 2024-03-14 10:26:27 +0800 |
---|---|---|
committer | Steve Sakoman <steve@sakoman.com> | 2024-03-20 06:02:50 -1000 |
commit | 6d2b73edc960222d586029b3099f451cc2d0eb48 (patch) | |
tree | e5b7677c39f95926942e7f45f3caac17f436095c /scripts/lib/argparse_oe.py | |
parent | 521775dcd52bbb2fa29e2fd6e4e18223341e41a5 (diff) | |
download | poky-6d2b73edc960222d586029b3099f451cc2d0eb48.tar.gz |
openssl: upgrade to 3.1.5
Changes between 3.1.4 and 3.1.5 [30 Jan 2024]
* A file in PKCS12 format can contain certificates and keys and may
come from
an untrusted source. The PKCS12 specification allows certain fields
to be
NULL, but OpenSSL did not correctly check for this case. A fix has
been
applied to prevent a NULL pointer dereference that results in OpenSSL
crashing. If an application processes PKCS12 files from an untrusted
source
using the OpenSSL APIs then that application will be vulnerable to
this
issue prior to this fix.
OpenSSL APIs that were vulnerable to this are: PKCS12_parse(),
PKCS12_unpack_p7data(), PKCS12_unpack_p7encdata(),
PKCS12_unpack_authsafes()
and PKCS12_newpass().
We have also fixed a similar issue in SMIME_write_PKCS7(). However
since this
function is related to writing data we do not consider it security
significant.
([CVE-2024-0727])
https://www.openssl.org/news/cl31.txt
drop fix_random_labels.patch as fixed in
https://github.com/openssl/openssl/commit/99630a1b08fd6464d95052dee4a3500afeb95867
(From OE-Core rev: aeac11fa743567e185179b27b4700bbf8fcf06e1)
Signed-off-by: Lee Chee Yang <chee.yang.lee@intel.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
Diffstat (limited to 'scripts/lib/argparse_oe.py')
0 files changed, 0 insertions, 0 deletions