forked from pool/openssl-1_1
Pedro Monreal Gonzalez
18ecb7a582
- Security fix: [bsc#1227138, CVE-2024-5535] * SSL_select_next_proto buffer overread * Add openssl-CVE-2024-5535.patch - Apply "openssl-CVE-2024-4741.patch" to fix a use-after-free security vulnerability. Calling the function SSL_free_buffers() potentially caused memory to be accessed that was previously freed in some situations and a malicious attacker could attempt to engineer a stituation where this occurs to facilitate a denial-of-service attack. [CVE-2024-4741, bsc#1225551] OBS-URL: https://build.opensuse.org/package/show/security:tls/openssl-1_1?expand=0&rev=164
21 lines
644 B
Diff
21 lines
644 B
Diff
Index: openssl-1.1.1d/apps/openssl.c
|
|
===================================================================
|
|
--- openssl-1.1.1d.orig/apps/openssl.c 2019-09-10 15:13:07.000000000 +0200
|
|
+++ openssl-1.1.1d/apps/openssl.c 2020-01-23 13:45:11.452634334 +0100
|
|
@@ -151,8 +151,15 @@ int main(int argc, char *argv[])
|
|
CRYPTO_mem_ctrl(CRYPTO_MEM_CHECK_ON);
|
|
|
|
if (getenv("OPENSSL_FIPS")) {
|
|
+#ifdef OPENSSL_FIPS
|
|
+ if (!FIPS_mode_set(1)) {
|
|
+ ERR_print_errors(bio_err);
|
|
+ return 1;
|
|
+ }
|
|
+#else
|
|
BIO_printf(bio_err, "FIPS mode not supported.\n");
|
|
return 1;
|
|
+#endif
|
|
}
|
|
|
|
if (!apps_startup()) {
|