public inbox for development@lists.ipfire.org
 help / color / mirror / Atom feed
From: Adolf Belka <adolf.belka@ipfire.org>
To: development@lists.ipfire.org
Subject: [PATCH] gnutls: Update to version 3.8.2
Date: Mon, 18 Dec 2023 18:28:54 +0100	[thread overview]
Message-ID: <20231218172911.2531726-3-adolf.belka@ipfire.org> (raw)
In-Reply-To: <20231218172911.2531726-1-adolf.belka@ipfire.org>

[-- Attachment #1: Type: text/plain, Size: 8890 bytes --]

- Update from version 3.8.0 to 3.8.2
- Update of rootfile
- Changelog
    3.8.2 (released 2023-11-14)
	** libgnutls: Fix timing side-channel inside RSA-PSK key exchange.
	   [GNUTLS-SA-2023-10-23, CVSS: medium] [CVE-2023-5981]
	** libgnutls: Add API functions to perform ECDH and DH key agreement
	   The functionality has been there for a long time though they were
	   not available as part of the public API.  This enables applications
	   to implement custom protocols leveraging non-interactive key
	   agreement with ECDH and DH.
	** libgnutls: Added support for AES-GCM-SIV ciphers (RFC 8452)
	   The new algorithms GNUTLS_CIPHER_AES_128_SIV_GCM and
	   GNUTLS_CIPHER_AES_256_SIV_GCM have been added to be used through
	   the AEAD interface.  Note that, unlike
	   GNUTLS_CIPHER_AES_{128,256}_SIV_GCM, the authentication tag is
	   appended to the ciphertext, not prepended.
	** libgnutls: transparent KTLS support is extended to FreeBSD kernel
	   The kernel TLS feature can now be enabled on FreeBSD as well as
	   Linux when compiled with the --enable-ktls configure option.
	** gnutls-cli: New option --starttls-name
	   Depending on deployment, application protocols such as XMPP may
	   require a different origin address than the external address to be
	   presented prior to STARTTLS negotiation.  The --starttls-name can
	   be used to specify specify the addresses separately.
	** API and ABI modifications:
		gnutls_pubkey_import_dh_raw: New function
		gnutls_privkey_import_dh_raw: New function
		gnutls_pubkey_export_dh_raw: New function
		gnutls_privkey_export_dh_raw: New function
		gnutls_x509_privkey_import_dh_raw: New function
		gnutls_privkey_derive_secret: New function
		GNUTLS_KEYGEN_DH: New enum member of gnutls_keygen_types_t
		GNUTLS_CIPHER_AES_128_SIV_GCM: Added
		GNUTLS_CIPHER_AES_256_SIV_GCM: Added
    3.8.1 (released 2023-08-03)
	** libgnutls: ClientHello extensions are randomized by default
	   To make fingerprinting harder, TLS extensions in ClientHello
	   messages are shuffled. As this behavior may cause compatibility
	   issue with legacy applications that do not accept the last
	   extension without payload, the behavior can be reverted with the
	   %NO_SHUFFLE_EXTENSIONS priority keyword.
	** libgnutls: Add support for RFC 9258 external PSK importer.
	   This enables to deploy the same PSK across multiple TLS versions
	   (TLS 1.2 and TLS 1.3) in a secure manner. To use, the application
	   needs to set up a callback that formats the PSK identity using
	   gnutls_psk_format_imported_identity().
	** libgnutls: %GNUTLS_NO_EXTENSIONS has been renamed to
	   %GNUTLS_NO_DEFAULT_EXTENSIONS.
	** libgnutls: Add additional PBKDF limit checks in FIPS mode as
	   defined in SP 800-132. Minimum salt length is 128 bits and
	   minimum iterations bound is 1000 for PBKDF in FIPS mode.
	** libgnutls: Add a mechanism to control whether to enforce extended
	   master secret (RFC 7627). FIPS 140-3 mandates the use of TLS
	   session hash (extended master secret, EMS) in TLS 1.2. To enforce
	   this, a new priority keyword %FORCE_SESSION_HASH is added and if
	   it is set and EMS is not set, the peer aborts the connection. This
	   behavior is the default in FIPS mode, though it can be overridden
	   through the configuration file with the "tls-session-hash" option.
	   In either case non-EMS PRF is reported as a non-approved operation
	   through the FIPS service indicator.
	** New option --attime to specify current time.
	   To make testing with different timestamp to the system easier, the
	   tools doing certificate verification now provide a new option
	   --attime, which takes an arbitrary time.
	** API and ABI modifications:
		gnutls_psk_client_credentials_function3: New typedef
		gnutls_psk_server_credentials_function3: New typedef
		gnutls_psk_set_server_credentials_function3: New function
		gnutls_psk_set_client_credentials_function3: New function
		gnutls_psk_format_imported_identity: New function
		GNUTLS_PSK_KEY_EXT: New enum member of gnutls_psk_key_flags

Signed-off-by: Adolf Belka <adolf.belka(a)ipfire.org>
---
 config/rootfiles/common/gnutls | 11 ++++++++++-
 lfs/gnutls                     |  4 ++--
 2 files changed, 12 insertions(+), 3 deletions(-)

diff --git a/config/rootfiles/common/gnutls b/config/rootfiles/common/gnutls
index 508596906..cc6c90194 100644
--- a/config/rootfiles/common/gnutls
+++ b/config/rootfiles/common/gnutls
@@ -32,7 +32,7 @@ usr/lib/libgnutls-dane.so.0.4.1
 #usr/lib/libgnutls.la
 #usr/lib/libgnutls.so
 usr/lib/libgnutls.so.30
-usr/lib/libgnutls.so.30.35.0
+usr/lib/libgnutls.so.30.37.0
 #usr/lib/libgnutlsxx.la
 #usr/lib/libgnutlsxx.so
 usr/lib/libgnutlsxx.so.30
@@ -629,6 +629,8 @@ usr/lib/libgnutlsxx.so.30.0.0
 #usr/share/man/man3/gnutls_privkey_decrypt_data.3
 #usr/share/man/man3/gnutls_privkey_decrypt_data2.3
 #usr/share/man/man3/gnutls_privkey_deinit.3
+#usr/share/man/man3/gnutls_privkey_derive_secret.3
+#usr/share/man/man3/gnutls_privkey_export_dh_raw.3
 #usr/share/man/man3/gnutls_privkey_export_dsa_raw.3
 #usr/share/man/man3/gnutls_privkey_export_dsa_raw2.3
 #usr/share/man/man3/gnutls_privkey_export_ecc_raw.3
@@ -645,6 +647,7 @@ usr/lib/libgnutlsxx.so.30.0.0
 #usr/share/man/man3/gnutls_privkey_get_seed.3
 #usr/share/man/man3/gnutls_privkey_get_spki.3
 #usr/share/man/man3/gnutls_privkey_get_type.3
+#usr/share/man/man3/gnutls_privkey_import_dh_raw.3
 #usr/share/man/man3/gnutls_privkey_import_dsa_raw.3
 #usr/share/man/man3/gnutls_privkey_import_ecc_raw.3
 #usr/share/man/man3/gnutls_privkey_import_ext.3
@@ -681,6 +684,7 @@ usr/lib/libgnutlsxx.so.30.0.0
 #usr/share/man/man3/gnutls_psk_allocate_client_credentials.3
 #usr/share/man/man3/gnutls_psk_allocate_server_credentials.3
 #usr/share/man/man3/gnutls_psk_client_get_hint.3
+#usr/share/man/man3/gnutls_psk_format_imported_identity.3
 #usr/share/man/man3/gnutls_psk_free_client_credentials.3
 #usr/share/man/man3/gnutls_psk_free_server_credentials.3
 #usr/share/man/man3/gnutls_psk_server_get_username.3
@@ -689,10 +693,12 @@ usr/lib/libgnutlsxx.so.30.0.0
 #usr/share/man/man3/gnutls_psk_set_client_credentials2.3
 #usr/share/man/man3/gnutls_psk_set_client_credentials_function.3
 #usr/share/man/man3/gnutls_psk_set_client_credentials_function2.3
+#usr/share/man/man3/gnutls_psk_set_client_credentials_function3.3
 #usr/share/man/man3/gnutls_psk_set_params_function.3
 #usr/share/man/man3/gnutls_psk_set_server_credentials_file.3
 #usr/share/man/man3/gnutls_psk_set_server_credentials_function.3
 #usr/share/man/man3/gnutls_psk_set_server_credentials_function2.3
+#usr/share/man/man3/gnutls_psk_set_server_credentials_function3.3
 #usr/share/man/man3/gnutls_psk_set_server_credentials_hint.3
 #usr/share/man/man3/gnutls_psk_set_server_dh_params.3
 #usr/share/man/man3/gnutls_psk_set_server_known_dh_params.3
@@ -701,6 +707,7 @@ usr/lib/libgnutlsxx.so.30.0.0
 #usr/share/man/man3/gnutls_pubkey_encrypt_data.3
 #usr/share/man/man3/gnutls_pubkey_export.3
 #usr/share/man/man3/gnutls_pubkey_export2.3
+#usr/share/man/man3/gnutls_pubkey_export_dh_raw.3
 #usr/share/man/man3/gnutls_pubkey_export_dsa_raw.3
 #usr/share/man/man3/gnutls_pubkey_export_dsa_raw2.3
 #usr/share/man/man3/gnutls_pubkey_export_ecc_raw.3
@@ -716,6 +723,7 @@ usr/lib/libgnutlsxx.so.30.0.0
 #usr/share/man/man3/gnutls_pubkey_get_preferred_hash_algorithm.3
 #usr/share/man/man3/gnutls_pubkey_get_spki.3
 #usr/share/man/man3/gnutls_pubkey_import.3
+#usr/share/man/man3/gnutls_pubkey_import_dh_raw.3
 #usr/share/man/man3/gnutls_pubkey_import_dsa_raw.3
 #usr/share/man/man3/gnutls_pubkey_import_ecc_raw.3
 #usr/share/man/man3/gnutls_pubkey_import_ecc_x962.3
@@ -1227,6 +1235,7 @@ usr/lib/libgnutlsxx.so.30.0.0
 #usr/share/man/man3/gnutls_x509_privkey_get_spki.3
 #usr/share/man/man3/gnutls_x509_privkey_import.3
 #usr/share/man/man3/gnutls_x509_privkey_import2.3
+#usr/share/man/man3/gnutls_x509_privkey_import_dh_raw.3
 #usr/share/man/man3/gnutls_x509_privkey_import_dsa_raw.3
 #usr/share/man/man3/gnutls_x509_privkey_import_ecc_raw.3
 #usr/share/man/man3/gnutls_x509_privkey_import_gost_raw.3
diff --git a/lfs/gnutls b/lfs/gnutls
index 7336528f6..19f79c6db 100644
--- a/lfs/gnutls
+++ b/lfs/gnutls
@@ -24,7 +24,7 @@
 
 include Config
 
-VER        = 3.8.0
+VER        = 3.8.2
 
 THISAPP    = gnutls-$(VER)
 DL_FILE    = $(THISAPP).tar.xz
@@ -40,7 +40,7 @@ objects = $(DL_FILE)
 
 $(DL_FILE) = $(DL_FROM)/$(DL_FILE)
 
-$(DL_FILE)_BLAKE2 = 64784e9c0ac4dcab2c9e90d7d17d0bd8a0021224be285c12a53673f3a52aa3f189152b1b0b4aaae5a8fb41951361af1fd04a5b535774c4a26c26eb895519af40
+$(DL_FILE)_BLAKE2 = d70524f17919bc02fefc610ede948d209e50e3276fc1e2d40aaed5c208265455da220d948f4a3f21db57f9d253c103f3a1b9a6daa2229d02c7c224448acc2777
 
 install : $(TARGET)
 
-- 
2.43.0


  parent reply	other threads:[~2023-12-18 17:28 UTC|newest]

Thread overview: 16+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2023-12-18 17:28 [PATCH] bash: Update the patches applied to bash Adolf Belka
2023-12-18 17:28 ` [PATCH] git: Update to version 2.43.0 Adolf Belka
2023-12-18 17:28 ` Adolf Belka [this message]
2023-12-30  7:38   ` [PATCH] gnutls: Update to version 3.8.2 Peter Müller
2023-12-18 17:28 ` [PATCH] iptables: Update to version 1.8.10 Adolf Belka
2023-12-30  7:36   ` Peter Müller
2023-12-18 17:28 ` [PATCH] lcms2: Update to version 2.16 Adolf Belka
2023-12-18 17:28 ` [PATCH] libnl-3: Update to version 3.9.0 Adolf Belka
2023-12-18 17:28 ` [PATCH] lmdb: Update to version 0.9.31 Adolf Belka
2023-12-18 17:28 ` [PATCH] lsof: Update to version 4.99.3 Adolf Belka
2023-12-18 17:29 ` [PATCH] nfs: Update to version 2.6.4 Adolf Belka
2023-12-18 17:29 ` [PATCH] p11-kit: Update to version 0.25.3 Adolf Belka
2023-12-18 17:29 ` [PATCH] samba: Update to version 4.19.3 Adolf Belka
2023-12-18 17:29 ` [PATCH] sudo: Update to version 1.9.15p4 Adolf Belka
2023-12-30  7:23   ` Peter Müller
2024-01-07 13:47 ` [PATCH] bash: Update the patches applied to bash Peter Müller

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=20231218172911.2531726-3-adolf.belka@ipfire.org \
    --to=adolf.belka@ipfire.org \
    --cc=development@lists.ipfire.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox