mailweb.openeuler.org
Manage this list
×
Keyboard Shortcuts
Thread View
j
: Next unread message
k
: Previous unread message
j a
: Jump to all threads
j l
: Jump to MailingList overview
2024
December
November
October
September
August
July
June
May
April
March
February
January
2023
December
November
October
September
August
July
June
May
April
March
February
January
2022
December
November
October
September
August
July
June
May
April
March
February
January
2021
December
November
October
September
August
July
June
May
April
March
February
January
2020
December
November
October
September
August
July
June
May
April
March
February
January
2019
December
November
List overview
Download
Buildteam
December 2021
----- 2024 -----
December 2024
November 2024
October 2024
September 2024
August 2024
July 2024
June 2024
May 2024
April 2024
March 2024
February 2024
January 2024
----- 2023 -----
December 2023
November 2023
October 2023
September 2023
August 2023
July 2023
June 2023
May 2023
April 2023
March 2023
February 2023
January 2023
----- 2022 -----
December 2022
November 2022
October 2022
September 2022
August 2022
July 2022
June 2022
May 2022
April 2022
March 2022
February 2022
January 2022
----- 2021 -----
December 2021
November 2021
October 2021
September 2021
August 2021
July 2021
June 2021
May 2021
April 2021
March 2021
February 2021
January 2021
----- 2020 -----
December 2020
November 2020
October 2020
September 2020
August 2020
July 2020
June 2020
May 2020
April 2020
March 2020
February 2020
January 2020
----- 2019 -----
December 2019
November 2019
buildteam@openeuler.org
1 participants
1 discussions
Start a n
N
ew thread
我们需要的openssl-1.1.1l.rpm您们没有提供,反而悄悄在1.1.1f.rpm中解决。匪夷所思啊!
by lijunping@itownet.cn
14 Dec '21
14 Dec '21
前几天安装了openEuler21.09,看到其中的openssl版本是1.1.1f 。
我下载了https://repo.openeuler.org/openEuler-21.09/source/Packages/openssl-1.1.…
的rpm包。 结果我有了惊奇的发现。 例如,CVE-2021-3711、CVE-2021-3712这两个漏洞,我百度得到的结果都说,openssl-1.1.1l解决了这两个bug,而openssl-1.1.1~openssl-1.1.1k都受到影响。 而我在您们的openssl-1.1.1f-7.oe1.src.rpm的openssl.spec发现,您们已经解决了这两个bug,可您们生成的rpm包依然是1.1.1f。 Patch13: CVE-2021-3711-0001-Check-the-plaintext-buffer-is-large-enough-when-decr.patch Patch14: CVE-2021-3711-0002-Correctly-calculate-the-length-of-SM2-plaintext-give.patch Patch15: CVE-2021-3711-0003-Extend-tests-for-SM2-decryption.patch Patch16: CVE-2021-3712-0001-Fix-a-read-buffer-overrun-in-X509_aux_print.patch Patch17: CVE-2021-3712-0002-Fix-EC_GROUP_new_from_ecparameters-to-check-the-base.patch 对于普通用户、对于漏洞检查工具来说,看到opensl-1.1.1f,必然认为这两个漏洞需要解决,需要升级,我们怎么可能去查看openssl-1.1.1f-src.rpm中的具体内容?可是我们需要的openssl-1.1.1l.rpm您们没有提供,反而悄悄在1.1.1f.rpm中解决。匪夷所思啊! 希望您们及时生成最新版本的rpm包,以免让用户困扰。 感谢您们的工作。 李军平 运营服务中心 北京信城通数码科技有限公司 地址:北京市丰台区南西环西路188号总部基地七区15号楼(100070) 手机:13601199736 电话:010-82261547 邮箱:lijunping(a)itownet.cn
网址:http://www.itownet.com
1
0
0
0
Results per page:
10
25
50
100
200