-
-
Notifications
You must be signed in to change notification settings - Fork 14.9k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
openssl: 1.1.1d -> 1.1.1e #82789
openssl: 1.1.1d -> 1.1.1e #82789
Conversation
a "Low severity" [0] security issue: > Fixed an overflow bug in the x64_64 Montgomery squaring procedure used > in exponentiation with 512-bit moduli (CVE-2019-1551) [0] https://www.openssl.org/news/vulnerabilities.html#y2019
Even current staging (db1eb19) still suffers from the same issue as 19.09, so this can't be merged as-is. |
To recap: pyopenssl fails to build with that, upstream tracking issue is in pyca/pyopenssl#899. I'll file PRs applying just the CVE-fixing patch. We can probably still "properly" bump |
Opened PRs to backport the fix for CVE-2019-1551 to master and 20.03 (staging): |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Please update to 1.1.1f. It's like 1.1.1e, but without EOF change (see https://www.openssl.org/news/openssl-1.1.1-notes.html).
Pushed as 6c8692f |
Motivation for this change
a "Low severity" [0] security issue:
[0] https://www.openssl.org/news/vulnerabilities.html#y2019
Things done
sandbox
innix.conf
on non-NixOS linux)nix-shell -p nixpkgs-review --run "nixpkgs-review wip"
./result/bin/
)nix path-info -S
before and after)