* Security fixes:
- CVE-2026-1584: NULL pointer dereference in PSK binder verification (bsc#1257978)
- CVE-2025-14831: Fix name constraint processing performance issue (bsc#1257960)
* libgnutls: Fix NULL pointer dereference in PSK binder verification
A TLS 1.3 resumption attempt with an invalid PSK binder value in ClientHello
could lead to a denial of service attack via crashing the server.
The updated code guards against the problematic dereference.
[Fixes: GNUTLS-SA-2026-02-09-1, CVSS: high] [CVE-2026-1584]
* libgnutls: Fix name constraint processing performance issue
Verifying certificates with pathological amounts of name constraints
could lead to a denial of service attack via resource exhaustion.
Reworked processing algorithms exhibit better performance characteristics.
[Fixes: GNUTLS-SA-2026-02-09-2, CVSS: medium] [CVE-2025-14831]
* libgnutls: Fix multiple unexploitable overflows (#1783, #1786).
* libgnutls: Fall back to thread-unsafe module initialization
Improve fallback handling for PKCS#11 modules that
don't support thread-safe initialization (#1774).
Also return filename from p11_kit_module_get_name() for unconfigured modules.
* libgnutls: Accept NULL as digest argument for gnutls_hash_output
The accelerated implementation of gnutls_hash_output() now
properly accepts NULL as the digest argument, matching the
behavior of the reference implementation (#1769).
* srptool: Avoid a stack buffer overflow when processing large SRP groups (#1777).
* Rebase patches:
- gnutls-FIPS-jitterentropy.patch
- gnutls-FIPS-140-3-references.patch
OBS-URL: https://build.opensuse.org/package/show/security:tls/gnutls?expand=0&rev=135
226 KiB
226 KiB