no modules, or it may get bad info, just depending on
> what
> happens to me in that memory.
>
> The latest upstream code appears to have this bug, also.
I have attached the suggested patch to this email.
Can you please review the patch and apply it to the repository if the
analysi
Sorry, this message went up the wrong mailing list. It was destined for
trousers tpm 1.2 tpm-tools. Please excuse the noise.
--
Matthias Gerstner
Dipl.-Wirtsch.-Inf. (FH), Security Engineer
https://www.suse.com/security
Telefon: +49 911 740 53 290
GPG Key ID: 0x14C405C971923553
SUSE Linux GmbH
might also lead to a crash in some
circumstances
Please find attached two patches that address these two issues.
Regards
Matthias
--
Matthias Gerstner
Dipl.-Wirtsch.-Inf. (FH), Security Engineer
https://www.suse.com/security
Telefon: +49 911 740 53 290
GPG Key ID: 0x14C405C971923553
SUSE Lin
packaging of tboot. I did the latter for the openSUSE Linux tboot
package that I am maintaining.
Cheers
Matthias
[1]:
https://sourceforge.net/p/tboot/code/ci/09fae64a7515d240b2822cf0d08e1f36e8130983
[2]:
https://sourceforge.net/p/tboot/code/ci/d4452e9380b863581e02edd139b44dc565cde03d
--
Mat
t_unsig.lst
```
After applying my patches both OpenSSL 1.0.x and OpenSSL 1.1.x versions
worked without any memory corruptions and no memory leaks remained.
Best regards
Matthias
--
Matthias Gerstner
Dipl.-Wirtsch.-Inf. (FH), Security Engineer
https://www.suse.com/security
Telefon: +49 911 740 53