Pedro Monreal Gonzalez
18ecb7a582
- Security fix: [bsc#1227138, CVE-2024-5535] * SSL_select_next_proto buffer overread * Add openssl-CVE-2024-5535.patch - Apply "openssl-CVE-2024-4741.patch" to fix a use-after-free security vulnerability. Calling the function SSL_free_buffers() potentially caused memory to be accessed that was previously freed in some situations and a malicious attacker could attempt to engineer a stituation where this occurs to facilitate a denial-of-service attack. [CVE-2024-4741, bsc#1225551] OBS-URL: https://build.opensuse.org/package/show/security:tls/openssl-1_1?expand=0&rev=164
15 lines
640 B
Diff
15 lines
640 B
Diff
Index: openssl-1.1.1l/crypto/kdf/pbkdf2.c
|
|
===================================================================
|
|
--- openssl-1.1.1l.orig/crypto/kdf/pbkdf2.c
|
|
+++ openssl-1.1.1l/crypto/kdf/pbkdf2.c
|
|
@@ -185,7 +185,8 @@ static int kdf_pbkdf2_derive(EVP_KDF_IMP
|
|
}
|
|
|
|
fips_sli_check_hash_kdf_struct_evp_kdf_impl_st(impl);
|
|
-
|
|
+ fips_sli_fsm_struct_evp_kdf_impl_st(impl,
|
|
+ fips_sli_get_kdf_keylen_status(keylen));
|
|
return pkcs5_pbkdf2_alg((char *)impl->pass, impl->pass_len,
|
|
impl->salt, impl->salt_len, impl->iter,
|
|
impl->md, key, keylen);
|