* Low-level invalid GF(2^m) parameters lead to OOB memory access * Add openssl-CVE-2024-9143.patch - Security fix: [bsc#1220262, CVE-2023-50782] * Implicit rejection in PKCS#1 v1.5 * Add openssl-CVE-2023-50782.patch * Validating the order of the public keys in the Diffie-Hellman Key Agreement Protocol, when an approved safe prime is used. * Added openssl-3-CVE-2024-41996.patch OBS-URL: https://build.opensuse.org/package/show/security:tls/openssl-3?expand=0&rev=116
Description
No description provided
Languages
C
100%