diff options
author | Martin Weinelt <hexa@darmstadt.ccc.de> | 2022-05-03 18:05:18 +0200 |
---|---|---|
committer | Martin Weinelt <hexa@darmstadt.ccc.de> | 2022-05-03 18:05:18 +0200 |
commit | a7be3b2607fef40cb8a9a04ea4ee7753ad8a58e0 (patch) | |
tree | 38f488933461eda49746ab8b32593b448b680fdb /pkgs/development/libraries/openssl | |
parent | 00dc0eecc7ecf0c7c4da2cc55e2db743467f2870 (diff) |
openssl_1_1: 1.1.1n -> 1.1.1o
Fixes command injection in the c_rehash script, which at the same time is also considered obsolete and should be replaced by openssl rehash. https://mta.openssl.org/pipermail/openssl-announce/2022-May/000224.html Fixes: CVE-2022-1292
Diffstat (limited to 'pkgs/development/libraries/openssl')
-rw-r--r-- | pkgs/development/libraries/openssl/default.nix | 4 |
1 files changed, 2 insertions, 2 deletions
diff --git a/pkgs/development/libraries/openssl/default.nix b/pkgs/development/libraries/openssl/default.nix index 8182a01cd52d6..9e2569ae9fe98 100644 --- a/pkgs/development/libraries/openssl/default.nix +++ b/pkgs/development/libraries/openssl/default.nix @@ -178,8 +178,8 @@ in { openssl_1_1 = common rec { - version = "1.1.1n"; - sha256 = "sha256-QNzrUaT2pSdb3g5r8g70uRv8Mu1XwFUuLo4VRjNysXo="; + version = "1.1.1o"; + sha256 = "sha256-k4SisFcN2ANYhBRkZ3EV33he25QccSEfdQdtcv5rQ48="; patches = [ ./1.1/nix-ssl-cert-file.patch |