forked from pool/openssl-1_1
Pedro Monreal Gonzalez
18ecb7a582
- Security fix: [bsc#1227138, CVE-2024-5535] * SSL_select_next_proto buffer overread * Add openssl-CVE-2024-5535.patch - Apply "openssl-CVE-2024-4741.patch" to fix a use-after-free security vulnerability. Calling the function SSL_free_buffers() potentially caused memory to be accessed that was previously freed in some situations and a malicious attacker could attempt to engineer a stituation where this occurs to facilitate a denial-of-service attack. [CVE-2024-4741, bsc#1225551] OBS-URL: https://build.opensuse.org/package/show/security:tls/openssl-1_1?expand=0&rev=164
11 lines
463 B
Plaintext
11 lines
463 B
Plaintext
libopenssl1_1
|
|
obsoletes "libopenssl1_1_0-<targettype>"
|
|
provides "libopenssl1_1-hmac-<targettype> = <version>-%release"
|
|
obsoletes "libopenssl1_1-hmac-<targettype> < <version>-%release"
|
|
libopenssl-1_1-devel
|
|
provides "libopenssl-devel-<targettype> = <version>"
|
|
conflicts "otherproviders(libopenssl-devel-<targettype>)"
|
|
conflicts "libopenssl-3-devel-<targettype>"
|
|
requires -"openssl-1_1-<targettype>"
|
|
requires "libopenssl1_1-<targettype> = <version>"
|