Package: gnutls28 / 3.7.1-5+deb11u5
Metadata
Package | Version | Patches format |
---|---|---|
gnutls28 | 3.7.1-5+deb11u5 | 3.0 (quilt) |
Patch series
view the series filePatch | File delta | Description |
---|---|---|
14_version_gettextcat.diff | (download) |
configure.ac |
3 3 + 0 - 0 ! |
version filename of locale data (gnutls30.mo instead of gnutls.mo) This is necessary to make e.g. libgnutls26 and libgnutls28 co-installable. |
30_guile snarf.diff | (download) |
guile/src/Makefile.am |
2 2 + 0 - 0 ! |
work around guile-snarf hardcoding the at-build default compiler which breaks when it changes ion Debian. |
55_01 _gnutls_buffer_resize account for unused area if AGG.patch | (download) |
lib/str.c |
4 2 + 2 - 0 ! |
[patch 1/2] _gnutls_buffer_resize: account for unused area if AGGRESSIVE_REALLOC Signed-off-by: Daiki Ueno <ueno@gnu.org> |
55_02 str suppress Wunused function if AGGRESSIVE_REALLOC .patch | (download) |
lib/str.c |
18 9 + 9 - 0 ! |
[patch 2/2] str: suppress -wunused-function if aggressive_realloc is defined Signed-off-by: Daiki Ueno <ueno@gnu.org> |
56_01 srptool avoid FILE pointer leak on error.patch | (download) |
src/srptool.c |
4 2 + 2 - 0 ! |
[patch 1/5] srptool: avoid file pointer leak on error Signed-off-by: Daiki Ueno <ueno@gnu.org> |
56_02 gnutls cli debug avoid resource leak in saving DHE p.patch | (download) |
src/tests.c |
15 12 + 3 - 0 ! |
[patch 2/5] gnutls-cli-debug: avoid resource leak in saving dhe params Signed-off-by: Daiki Ueno <ueno@gnu.org> |
56_03 src avoid file descriptor leak in socket_open2.patch | (download) |
src/socket.c |
9 8 + 1 - 0 ! |
[patch 3/5] src: avoid file descriptor leak in socket_open2 Signed-off-by: Daiki Ueno <ueno@gnu.org> |
56_04 examples avoid memory leak in tlsproxy.patch | (download) |
doc/examples/tlsproxy/tlsproxy.c |
8 8 + 0 - 0 ! |
[patch 4/5] examples: avoid memory leak in tlsproxy Signed-off-by: Daiki Ueno <ueno@gnu.org> |
56_05 examples avoid memory leak in ex verify.patch | (download) |
doc/examples/ex-verify.c |
7 6 + 1 - 0 ! |
[patch 5/5] examples: avoid memory leak in ex-verify Signed-off-by: Daiki Ueno <ueno@gnu.org> |
56_10 build doc install missing image file gnutls crypto l.patch | (download) |
doc/Makefile.am |
1 1 + 0 - 0 ! |
[patch] build: doc: install missing image file gnutls-crypto-layers.png Signed-off-by: Andreas Metzler <ametzler@bebt.de> |
56_15 mem add _gnutls_reallocarray and _gnutls_reallocarra.patch | (download) |
lib/mem.c |
24 24 + 0 - 0 ! |
[patch 1/5] mem: add _gnutls_reallocarray and _gnutls_reallocarray_fast Signed-off-by: Daiki Ueno <ueno@gnu.org> |
56_16 pkcs11x find_ext_cb fix error propagation.patch | (download) |
lib/pkcs11x.c |
3 1 + 2 - 0 ! |
[patch 2/5] pkcs11x: find_ext_cb: fix error propagation Use explicit error value, as rv is not set in this code path. Signed-off-by: Daiki Ueno <ueno@gnu.org> |
56_17 build avoid potential integer overflow in array allo.patch | (download) |
lib/cert-cred-x509.c |
23 15 + 8 - 0 ! |
[patch 3/5] build: avoid potential integer overflow in array allocation This relies on _gnutls_reallocarray for all occasions of array allocations, so that they can benefit from the built-in overflow checks. Signed-off-by: Daiki Ueno <ueno@gnu.org> |
56_18 build avoid integer overflow in additions.patch | (download) |
lib/cert-cred.c |
5 5 + 0 - 0 ! |
[patch 4/5] build: avoid integer overflow in additions Signed-off-by: Daiki Ueno <ueno@gnu.org> |
56_19 _gnutls_calloc remove unused function.patch | (download) |
lib/mem.c |
11 0 + 11 - 0 ! |
[patch 5/5] _gnutls_calloc: remove unused function Signed-off-by: Daiki Ueno <ueno@gnu.org> |
56_20 priority add option to disable TLS 1.3 middlebox com.patch | (download) |
NEWS |
5 5 + 0 - 0 ! |
[patch] priority: add option to disable tls 1.3 middlebox compatibility mode This adds a new option %DISABLE_TLS13_COMPAT_MODE to disable TLS 1.3 compatibility mode at run-time. Signed-off-by: Daiki Ueno <ueno@gnu.org> |
56_24 handshake don t regenerate legacy_session_id in seco.patch | (download) |
lib/handshake.c |
20 11 + 9 - 0 ! |
[patch] handshake: don't regenerate legacy_session_id in second ch after HRR According to RFC 8446 4.1.2, the client must send the same Client Hello after Hello Retry Request, except for the certain extensions, and thus legacy_session_id must be preserved. Signed-off-by: Daiki Ueno <ueno@gnu.org> |
56_28 handshake fix timing of sending early data.patch | (download) |
NEWS |
5 5 + 0 - 0 ! |
[patch] handshake: fix timing of sending early data Previously, the client was sending early data after receiving a Server Hello message, which not only negates the benefit of 0-RTT, but also was a logic error as it can only be decrypted by the server when the initial handshake and the resuming handshake agree on the same ciphersuites. This fixes that behavior in the following ways: - extend the session data format to include the selected ciphersuites, even in TLS 1.3 - setup the epoch for early data, right before the client sending early data (also right after the server deciding to accept early data). |
56_30 x509 verify treat SHA 1 signed CA in the trusted set.patch | (download) |
lib/x509/verify.c |
26 17 + 9 - 0 ! |
[patch 47/94] x509/verify: treat sha-1 signed ca in the trusted set |
56_33 serv stop setting AI_ADDRCONFIG on getaddrinfo.patch | (download) |
src/serv.c |
6 1 + 5 - 0 ! |
[patch 74/94] serv: stop setting ai_addrconfig on getaddrinfo AI_ADDRCONFIG is only useful when the NODE argument is given in the getaddrinfo call, as described in RFC 3493 6.1. Suggested by Andreas Metzler in: https://gitlab.com/gnutls/gnutls/-/issues/1007#note_356637206 Signed-off-by: Daiki Ueno <ueno@gnu.org> |
56_40 fix SSSE3 SHA384 to work more than once.patch | (download) |
lib/accelerated/x86/sha-x86-ssse3.c |
2 1 + 1 - 0 ! |
[patch] fix ssse3 sha384 to work more than once The output function called sha512_digest() instead of sha384_digest(), which caused the hash context to be reinitialized for SHA512 instead of SHA384 and all following digests using the hash handle were wrong. Signed-off-by: Miroslav Lichvar <mlichvar@redhat.com> |
56_45 wrap_nettle_hash_fast avoid calling _update with zer.patch | (download) |
lib/nettle/mac.c |
4 3 + 1 - 0 ! |
[patch] wrap_nettle_hash_fast: avoid calling _update with zero-length input As Nettle's hash update functions internally call memcpy, providing zero-length input may cause undefined behavior. Signed-off-by: Daiki Ueno <ueno@gnu.org> |
60 Fix double free during gnutls_pkcs7_verify.patch | (download) |
lib/x509/pkcs7.c |
3 2 + 1 - 0 ! |
fix double free during gnutls_pkcs7_verify |
61_01 auth rsa side step potential side channel.patc | (download) |
lib/auth/rsa.c |
10 0 + 10 - 0 ! |
[patch 1/3] auth/rsa: side-step potential side-channel Remove branching that depends on secret data. Signed-off-by: Alexander Sosedkin <asosedkin@redhat.com> Signed-off-by: Hubert Kario <hkario@redhat.com> Tested-by: Hubert Kario <hkario@redhat.com> |
61_02 rsa remove dead code.patch | (download) |
lib/auth/rsa.c |
20 3 + 17 - 0 ! |
[patch 2/3] rsa: remove dead code since the `ok` variable isn't used any more, we can remove all code used to calculate it Signed-off-by: Hubert Kario <hkario@redhat.com> |
62 auth rsa_psk side step potential side channel.patch | (download) |
lib/auth/rsa.c |
2 1 + 1 - 0 ! |
[patch] auth/rsa_psk: side-step potential side-channel This removes branching that depends on secret data, porting changes for regular RSA key exchange from 4804febddc2ed958e5ae774de2a8f85edeeff538 and 80a6ce8ddb02477cd724cd5b2944791aaddb702a. This also removes the allow_wrong_pms as it was used sorely to control debug output depending on the branching. Signed-off-by: Daiki Ueno <ueno@gnu.org> |
63 x509 detect loop in certificate chain.patch | (download) |
lib/x509/common.c |
4 4 + 0 - 0 ! |
[patch 1/2] x509: detect loop in certificate chain MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit There can be a loop in a certificate chain, when multiple CA certificates are cross-signed with each other, such as A B, B C, and C A. Previously, the verification logic was not capable of handling this scenario while sorting the certificates in the chain in _gnutls_sort_clist, resulting in an assertion failure. This patch properly detects such loop and aborts further processing in a graceful manner. Signed-off-by: Daiki Ueno <ueno@gnu.org> |
64 rsa psk minimize branching after decryption.patch | (download) |
lib/auth/rsa_psk.c |
69 35 + 34 - 0 ! |
[patch 2/2] rsa-psk: minimize branching after decryption This moves any non-trivial code between gnutls_privkey_decrypt_data2 and the function return in _gnutls_proc_rsa_psk_client_kx up until the decryption. This also avoids an extra memcpy to session->key.key. Signed-off-by: Daiki Ueno <ueno@gnu.org> |