Pedro Monreal Gonzalez
18ecb7a582
- Security fix: [bsc#1227138, CVE-2024-5535] * SSL_select_next_proto buffer overread * Add openssl-CVE-2024-5535.patch - Apply "openssl-CVE-2024-4741.patch" to fix a use-after-free security vulnerability. Calling the function SSL_free_buffers() potentially caused memory to be accessed that was previously freed in some situations and a malicious attacker could attempt to engineer a stituation where this occurs to facilitate a denial-of-service attack. [CVE-2024-4741, bsc#1225551] OBS-URL: https://build.opensuse.org/package/show/security:tls/openssl-1_1?expand=0&rev=164
13 lines
413 B
Diff
13 lines
413 B
Diff
Index: openssl-1.1.1p/config
|
|
===================================================================
|
|
--- openssl-1.1.1p.orig/config
|
|
+++ openssl-1.1.1p/config
|
|
@@ -639,6 +639,7 @@ case "$GUESSOS" in
|
|
OUT="linux-elf"
|
|
fi ;;
|
|
*86-*-linux1) OUT="linux-aout" ;;
|
|
+ riscv64-*-linux?) OUT="linux64-riscv64" ;;
|
|
*-*-linux?) OUT="linux-generic32" ;;
|
|
sun4[uv]*-*-solaris2)
|
|
OUT="solaris-sparcv9-$CC"
|