Pedro Monreal Gonzalez
18ecb7a582
- Security fix: [bsc#1227138, CVE-2024-5535] * SSL_select_next_proto buffer overread * Add openssl-CVE-2024-5535.patch - Apply "openssl-CVE-2024-4741.patch" to fix a use-after-free security vulnerability. Calling the function SSL_free_buffers() potentially caused memory to be accessed that was previously freed in some situations and a malicious attacker could attempt to engineer a stituation where this occurs to facilitate a denial-of-service attack. [CVE-2024-4741, bsc#1225551] OBS-URL: https://build.opensuse.org/package/show/security:tls/openssl-1_1?expand=0&rev=164
24 lines
941 B
Plaintext
24 lines
941 B
Plaintext
## Default LFS
|
|
*.7z filter=lfs diff=lfs merge=lfs -text
|
|
*.bsp filter=lfs diff=lfs merge=lfs -text
|
|
*.bz2 filter=lfs diff=lfs merge=lfs -text
|
|
*.gem filter=lfs diff=lfs merge=lfs -text
|
|
*.gz filter=lfs diff=lfs merge=lfs -text
|
|
*.jar filter=lfs diff=lfs merge=lfs -text
|
|
*.lz filter=lfs diff=lfs merge=lfs -text
|
|
*.lzma filter=lfs diff=lfs merge=lfs -text
|
|
*.obscpio filter=lfs diff=lfs merge=lfs -text
|
|
*.oxt filter=lfs diff=lfs merge=lfs -text
|
|
*.pdf filter=lfs diff=lfs merge=lfs -text
|
|
*.png filter=lfs diff=lfs merge=lfs -text
|
|
*.rpm filter=lfs diff=lfs merge=lfs -text
|
|
*.tbz filter=lfs diff=lfs merge=lfs -text
|
|
*.tbz2 filter=lfs diff=lfs merge=lfs -text
|
|
*.tgz filter=lfs diff=lfs merge=lfs -text
|
|
*.ttf filter=lfs diff=lfs merge=lfs -text
|
|
*.txz filter=lfs diff=lfs merge=lfs -text
|
|
*.whl filter=lfs diff=lfs merge=lfs -text
|
|
*.xz filter=lfs diff=lfs merge=lfs -text
|
|
*.zip filter=lfs diff=lfs merge=lfs -text
|
|
*.zst filter=lfs diff=lfs merge=lfs -text
|