Sign Up
Log In
Log In
or
Sign Up
Places
All Projects
Status Monitor
Collapse sidebar
openSUSE:Leap:15.5:Update
openssh.31680
openssh-CVE-2023-38408-PKCS11-execution.patch
Overview
Repositories
Revisions
Requests
Users
Attributes
Meta
File openssh-CVE-2023-38408-PKCS11-execution.patch of Package openssh.31680
From 892506b13654301f69f9545f48213fc210e5c5cc Mon Sep 17 00:00:00 2001 From: "djm@openbsd.org" <djm@openbsd.org> Date: Wed, 19 Jul 2023 13:55:53 +0000 Subject: [PATCH] upstream: terminate process if requested to load a PKCS#11 provider that isn't a PKCS#11 provider; from / ok markus@ OpenBSD-Commit-ID: 39532cf18b115881bb4cfaee32084497aadfa05c --- ssh-pkcs11.c | 8 +++----- 1 file changed, 3 insertions(+), 5 deletions(-) Index: openssh-8.4p1/ssh-pkcs11.c =================================================================== --- openssh-8.4p1.orig/ssh-pkcs11.c +++ openssh-8.4p1/ssh-pkcs11.c @@ -1519,10 +1519,8 @@ pkcs11_register_provider(char *provider_ error("dlopen %s failed: %s", provider_id, dlerror()); goto fail; } - if ((getfunctionlist = dlsym(handle, "C_GetFunctionList")) == NULL) { - error("dlsym(C_GetFunctionList) failed: %s", dlerror()); - goto fail; - } + if ((getfunctionlist = dlsym(handle, "C_GetFunctionList")) == NULL) + fatal("dlsym(C_GetFunctionList) failed: %s", dlerror()); p = xcalloc(1, sizeof(*p)); p->name = xstrdup(provider_id); p->handle = handle;
Locations
Projects
Search
Status Monitor
Help
OpenBuildService.org
Documentation
API Documentation
Code of Conduct
Contact
Support
@OBShq
Terms
openSUSE Build Service is sponsored by
The Open Build Service is an
openSUSE project
.
Sign Up
Log In
Places
Places
All Projects
Status Monitor