File _patchinfo of Package patchinfo.18804
<patchinfo incident="18804">
<issue tracker="cve" id="2021-3449"/>
<issue tracker="bnc" id="1183852">CVE-2021-3449: openssl-1_1: NULL pointer deref in signature_algorithms processing</issue>
<packager>jsikes</packager>
<rating>important</rating>
<category>security</category>
<summary>Security update for openssl-1_1</summary>
<description>This update for openssl-1_1 fixes the security issue:
* CVE-2021-3449: An OpenSSL TLS server may crash if sent a maliciously crafted
renegotiation ClientHello message from a client. If a TLSv1.2 renegotiation
ClientHello omits the signature_algorithms extension but includes a
signature_algorithms_cert extension, then a NULL pointer dereference will
result, leading to a crash and a denial of service attack. OpenSSL TLS
clients are not impacted by this issue. [bsc#1183852]
</description>
</patchinfo>