|
From: | GNU bug Tracking System |
Subject: | bug#56403: closed (OpenSSL security updates) |
Date: | Wed, 06 Jul 2022 18:30:02 +0000 |
Your message dated Wed, 6 Jul 2022 14:29:18 -0400 with message-id <YsXUflDH+gfR6YIa@jasmine.lan> and subject line Re: [PATCH 1/2] gnu: OpenSSL: Update to 1.1.1q [fixes CVE-2022-2097]. has caused the debbugs.gnu.org bug report #56403, regarding OpenSSL security updates to be marked as done. (If you believe you have received this mail in error, please contact help-debbugs@gnu.org.) -- 56403: https://debbugs.gnu.org/cgi/bugreport.cgi?bug=56403 GNU Bug Tracking System Contact help-debbugs@gnu.org with problems
--- Begin Message ---Subject: OpenSSL security updates Date: Tue, 5 Jul 2022 12:53:33 -0400 Here are patches updating both OpenSSL series to fix CVE-2022-2097 and (for OpenSSL 3) CVE-2022-2274.signature.asc
Description: PGP signature
--- End Message ---
--- Begin Message ---Subject: Re: [PATCH 1/2] gnu: OpenSSL: Update to 1.1.1q [fixes CVE-2022-2097]. Date: Wed, 6 Jul 2022 14:29:18 -0400 On Tue, Jul 05, 2022 at 12:56:08PM -0400, Leo Famulari wrote: > https://www.cve.org/CVERecord?id=CVE-2022-2097 > > * gnu/packages/tls.scm (openssl/fixed): Update to 1.1.1q. I pushed these patches as fe24e0c29cfe69d0c1aec819ce1a7e96362bafe6
--- End Message ---
[Prev in Thread] | Current Thread | [Next in Thread] |