Debian Patches
Status for jose/14-2
Patch | Description | Author | Forwarded | Bugs | Origin | Last update |
---|---|---|---|---|---|---|
cherry-picked/1752063697.v14-7-g5aaaaf6.openssl-handle-null-in-jose-openssl-jwk-from-ec-key-gracefully-172.patch | Openssl: handle NULL in jose_openssl_jwk_from_EC_KEY gracefully (#172) We already check that the RSA *key is not NULL in jose_openssl_jwk_from_RSA(), but fail to do so for EC_KEY *key in jose_openssl_jwk_from_EC_KEY(). But EVP_PKEY_get0_EC_KEY() can return NULL too, e.g., if the EVP_PKEY comes from an OpenSSL provider that is not creating a keymgmt instance for a public key and the default provider is not loaded[1]. Instead of crashing inside OpenSSL when we pass a NULL pointer to EC_KEY_get0_private_key(), detect this case and return gracefully. [1]: https://github.com/openssl/openssl/discussions/25679 Signed-off-by: Ahmad Fatoum <a.fatoum@pengutronix.de> |
Ahmad Fatoum <ahmad@a3f.at> | no | upstream, commit v14-7-g5aaaaf6 <https://github.com/latchset/jose/commit/v14-7-g5aaaaf6> | 2025-07-09 | |
debian/2021-11-29.use-asciidoctor-to-build-manpages.patch | Use asciidoctor to build the manpages | Christoph Biedl <debian.axhn@manchmal.in-ulm.de> | no | 2021-11-29 |
All known versions for source package 'jose'
- 14-2 (trixie, sid, forky)
- 11-2+deb12u1 (bookworm)