Pedro Monreal Gonzalez
18ecb7a582
- Security fix: [bsc#1227138, CVE-2024-5535] * SSL_select_next_proto buffer overread * Add openssl-CVE-2024-5535.patch - Apply "openssl-CVE-2024-4741.patch" to fix a use-after-free security vulnerability. Calling the function SSL_free_buffers() potentially caused memory to be accessed that was previously freed in some situations and a malicious attacker could attempt to engineer a stituation where this occurs to facilitate a denial-of-service attack. [CVE-2024-4741, bsc#1225551] OBS-URL: https://build.opensuse.org/package/show/security:tls/openssl-1_1?expand=0&rev=164
14 lines
571 B
Diff
14 lines
571 B
Diff
Index: openssl-1.1.1i/test/sslapitest.c
|
|
===================================================================
|
|
--- openssl-1.1.1i.orig/test/sslapitest.c
|
|
+++ openssl-1.1.1i/test/sslapitest.c
|
|
@@ -6766,7 +6766,7 @@ int setup_tests(void)
|
|
#endif
|
|
ADD_ALL_TESTS(test_ssl_clear, 2);
|
|
ADD_ALL_TESTS(test_max_fragment_len_ext, OSSL_NELEM(max_fragment_len_test));
|
|
-#if !defined(OPENSSL_NO_SRP) && !defined(OPENSSL_NO_TLS1_2)
|
|
+#if !defined(OPENSSL_NO_SRP) && !defined(OPENSSL_NO_TLS1_2) && 0
|
|
ADD_ALL_TESTS(test_srp, 6);
|
|
#endif
|
|
ADD_ALL_TESTS(test_info_callback, 6);
|