curl (7.88.1-10+deb12u8) bookworm; urgency=medium
authorAquila Macedo Costa <aquilamacedo@riseup.net>
Tue, 17 Sep 2024 19:29:24 +0000 (16:29 -0300)
committerAquila Macedo Costa <aquilamacedo@riseup.net>
Tue, 17 Sep 2024 19:29:24 +0000 (16:29 -0300)
commitd6dd0818547df71d228568f17676a50f526f7451
tree28c08d0a3de5fdda6e2e1226477847f5eb699fb9
parent6f0dc41c18d1799ca7f24898807d967e97d75a9f
parent5c3125318dd57a9cb5a540a2b486d67874156cf6
curl (7.88.1-10+deb12u8) bookworm; urgency=medium

  * Team upload.
  * Import patch for CVE-2024-8096
    - CVE-2024-8096: When the TLS backend is GnuTLS, curl may incorrectly
      handle OCSP stapling. If the OCSP status reports an error other than
      "revoked" (e.g., "unauthorized"), it is not treated as a bad certificate,
      potentially allowing invalid certificates to be considered valid.

[dgit import unpatched curl 7.88.1-10+deb12u8]
75 files changed:
debian/README.source
debian/changelog
debian/control
debian/copyright
debian/curl.install
debian/curl.manpages
debian/gbp.conf
debian/libcurl3-gnutls.install
debian/libcurl3-gnutls.links
debian/libcurl3-gnutls.lintian-overrides
debian/libcurl3-gnutls.symbols
debian/libcurl3-nss.install
debian/libcurl3-nss.links
debian/libcurl3-nss.lintian-overrides
debian/libcurl3-nss.symbols
debian/libcurl4-doc.docs
debian/libcurl4-doc.examples
debian/libcurl4-doc.links
debian/libcurl4-doc.manpages
debian/libcurl4-gnutls-dev.install
debian/libcurl4-gnutls-dev.links
debian/libcurl4-gnutls-dev.manpages
debian/libcurl4-nss-dev.install
debian/libcurl4-nss-dev.links
debian/libcurl4-nss-dev.manpages
debian/libcurl4-openssl-dev.install
debian/libcurl4-openssl-dev.manpages
debian/libcurl4.install
debian/libcurl4.symbols
debian/patches/04_workaround_as_needed_bug.patch
debian/patches/08_enable-zsh.patch
debian/patches/11_omit-directories-from-config.patch
debian/patches/90_gnutls.patch
debian/patches/99_nss.patch
debian/patches/CVE-2023-27533.patch
debian/patches/CVE-2023-27534.patch
debian/patches/CVE-2023-27535.patch
debian/patches/CVE-2023-27536.patch
debian/patches/CVE-2023-27537.patch
debian/patches/CVE-2023-27538.patch
debian/patches/CVE-2023-28319.patch
debian/patches/CVE-2023-28320-1.patch
debian/patches/CVE-2023-28320.patch
debian/patches/CVE-2023-28321.patch
debian/patches/CVE-2023-28322.patch
debian/patches/CVE-2023-32001.patch
debian/patches/CVE-2023-38039.patch
debian/patches/CVE-2023-38545.patch
debian/patches/CVE-2023-38546.patch
debian/patches/CVE-2023-46218.patch
debian/patches/CVE-2023-46219.patch
debian/patches/CVE-2024-2004.patch
debian/patches/CVE-2024-2398.patch
debian/patches/CVE-2024-7264-0.patch
debian/patches/CVE-2024-7264-1.patch
debian/patches/CVE-2024-8096.patch
debian/patches/Remove-curl-s-LDFLAGS-from-curl-config-static-libs.patch
debian/patches/Use-OpenLDAP-specific-functionality.patch
debian/patches/Use-correct-path-when-loading-libnss-pem-ckbi-.so.patch
debian/patches/build-Divide-mit-krb5-gssapi-link-flags-between-LDFLAGS-a.patch
debian/patches/fix-unix-domain-socket.patch
debian/patches/openldap-create-ldap-URLs-correctly-for-IPv6-addresses.patch
debian/patches/series
debian/rules
debian/salsa-ci.yml
debian/source/format
debian/tests/LDAP-bindata.c
debian/tests/control
debian/tests/curl-ldapi-test
debian/tests/upstream-tests-gnutls
debian/tests/upstream-tests-nss
debian/tests/upstream-tests-openssl
debian/upstream/metadata
debian/upstream/signing-key.asc
debian/watch