Pedro Monreal Gonzalez
18ecb7a582
- Security fix: [bsc#1227138, CVE-2024-5535] * SSL_select_next_proto buffer overread * Add openssl-CVE-2024-5535.patch - Apply "openssl-CVE-2024-4741.patch" to fix a use-after-free security vulnerability. Calling the function SSL_free_buffers() potentially caused memory to be accessed that was previously freed in some situations and a malicious attacker could attempt to engineer a stituation where this occurs to facilitate a denial-of-service attack. [CVE-2024-4741, bsc#1225551] OBS-URL: https://build.opensuse.org/package/show/security:tls/openssl-1_1?expand=0&rev=164
16 lines
677 B
Diff
16 lines
677 B
Diff
Index: openssl-1.1.1w/test/recipes/20-test_dgst.t
|
|
===================================================================
|
|
--- openssl-1.1.1w.orig/test/recipes/20-test_dgst.t
|
|
+++ openssl-1.1.1w/test/recipes/20-test_dgst.t
|
|
@@ -104,8 +105,8 @@ SKIP: {
|
|
}
|
|
|
|
SKIP: {
|
|
- skip "dgst with engine is not supported by this OpenSSL build", 1
|
|
- if disabled("engine") || disabled("dynamic-engine");
|
|
+ skip "dgst with engine is not supported by this OpenSSL build or we are in FIPS mode", 1
|
|
+ if disabled("engine") || disabled("dynamic-engine") || ($ENV{OPENSSL_FORCE_FIPS_MODE});
|
|
|
|
subtest "SHA1 generation by engine with `dgst` CLI" => sub {
|
|
plan tests => 1;
|