Pedro Monreal Gonzalez
18ecb7a582
- Security fix: [bsc#1227138, CVE-2024-5535] * SSL_select_next_proto buffer overread * Add openssl-CVE-2024-5535.patch - Apply "openssl-CVE-2024-4741.patch" to fix a use-after-free security vulnerability. Calling the function SSL_free_buffers() potentially caused memory to be accessed that was previously freed in some situations and a malicious attacker could attempt to engineer a stituation where this occurs to facilitate a denial-of-service attack. [CVE-2024-4741, bsc#1225551] OBS-URL: https://build.opensuse.org/package/show/security:tls/openssl-1_1?expand=0&rev=164
11 lines
580 B
Diff
11 lines
580 B
Diff
diff --git a/util/libcrypto.num b/util/libcrypto.num
|
|
index e4a490a82..2a778ce92 100644
|
|
--- a/util/libcrypto.num
|
|
+++ b/util/libcrypto.num
|
|
@@ -4634,3 +4634,5 @@ EVP_KDF_vctrl 6594 1_1_1d EXIST::FUNCTION:
|
|
EVP_KDF_ctrl_str 6595 1_1_1d EXIST::FUNCTION:
|
|
EVP_KDF_size 6596 1_1_1d EXIST::FUNCTION:
|
|
EVP_KDF_derive 6597 1_1_1d EXIST::FUNCTION:
|
|
+EC_GROUP_get0_field 6598 1_1_1l EXIST::FUNCTION:EC
|
|
+NONFIPS_selftest_check 6599 1_1_1l EXIST::FUNCTION:
|