summaryrefslogtreecommitdiff
path: root/gnu/packages/tls.scm
diff options
context:
space:
mode:
authorLeo Famulari <leo@famulari.name>2022-03-15 13:25:51 -0400
committerLeo Famulari <leo@famulari.name>2022-03-16 17:14:08 -0400
commit139a5cab0409d4582cfab49f47e2e045664a60c3 (patch)
tree7cae73d9f2cd75af60bdbbcce541e9a8422fc7af /gnu/packages/tls.scm
parent3076e695771794e7193901f9c263fb5ae2abd194 (diff)
gnu: OpenSSL: Update to 1.1.1n [fixes CVE-2022-0778].
For more information about this vulnerability: https://www.openssl.org/news/secadv/20220315.txt * gnu/packages/tls.scm (openssl/fixed): Update to 1.1.1n.
Diffstat (limited to 'gnu/packages/tls.scm')
-rw-r--r--gnu/packages/tls.scm4
1 files changed, 2 insertions, 2 deletions
diff --git a/gnu/packages/tls.scm b/gnu/packages/tls.scm
index 11c01a8d2a..9ed0f3dea4 100644
--- a/gnu/packages/tls.scm
+++ b/gnu/packages/tls.scm
@@ -513,7 +513,7 @@ OpenSSL for TARGET."
(package
(inherit openssl)
(name "openssl")
- (version "1.1.1m")
+ (version "1.1.1n")
(source (origin
(method url-fetch)
(uri (list (string-append "https://www.openssl.org/source/openssl-"
@@ -526,7 +526,7 @@ OpenSSL for TARGET."
(patches (search-patches "openssl-1.1-c-rehash-in.patch"))
(sha256
(base32
- "15kcvdi69jka67sk1l3a50c26cb7xv9xiwdrgky4bji3ifz9k4gq"))))))
+ "0ymif8rlc5cf5qp5bh2pxlrgq6xryh7g4sqfvrdjg9gnli8ypp20"))))))
(define-public openssl-3.0
(package