14_version_gettextcat.diff
30_guile-snarf.diff
55_01-_gnutls_buffer_resize-account-for-unused-area-if-AGG.patch
55_02-str-suppress-Wunused-function-if-AGGRESSIVE_REALLOC-.patch
56_01-srptool-avoid-FILE-pointer-leak-on-error.patch
56_02-gnutls-cli-debug-avoid-resource-leak-in-saving-DHE-p.patch
56_03-src-avoid-file-descriptor-leak-in-socket_open2.patch
56_04-examples-avoid-memory-leak-in-tlsproxy.patch
56_05-examples-avoid-memory-leak-in-ex-verify.patch
56_10-build-doc-install-missing-image-file-gnutls-crypto-l.patch
56_15-mem-add-_gnutls_reallocarray-and-_gnutls_reallocarra.patch
56_16-pkcs11x-find_ext_cb-fix-error-propagation.patch
56_17-build-avoid-potential-integer-overflow-in-array-allo.patch
56_18-build-avoid-integer-overflow-in-additions.patch
56_19-_gnutls_calloc-remove-unused-function.patch
56_20-priority-add-option-to-disable-TLS-1.3-middlebox-com.patch
56_24-handshake-don-t-regenerate-legacy_session_id-in-seco.patch
56_28-handshake-fix-timing-of-sending-early-data.patch
56_30-x509-verify-treat-SHA-1-signed-CA-in-the-trusted-set.patch
56_33-serv-stop-setting-AI_ADDRCONFIG-on-getaddrinfo.patch
56_40-fix-SSSE3-SHA384-to-work-more-than-once.patch
56_45-wrap_nettle_hash_fast-avoid-calling-_update-with-zer.patch
60-Fix-double-free-during-gnutls_pkcs7_verify.patch
61_01-auth-rsa-side-step-potential-side-channel.patc
61_02-rsa-remove-dead-code.patch
62-auth-rsa_psk-side-step-potential-side-channel.patch
63-x509-detect-loop-in-certificate-chain.patch
64-rsa-psk-minimize-branching-after-decryption.patch
CVE-2024-28835.patch
CVE-2024-28834.patch
0031-serv-fix-memleak-when-a-connected-client-disappears.patch
0032-lib-fix-a-segfault-in-_gnutls13_recv_end_of_early_da.patch
0033-lib-fix-a-potential-segfault-in-_gnutls13_recv_finis.patch
CVE-2024-12243.patch
0001-handshake-clear-HSK_PSK_SELECTED-is-when-resetting-b.patch
0002-x509-avoid-double-free-when-exporting-othernames-in-.patch
0003-certtool-avoid-1-byte-write-buffer-overrun-when-pars.patch
CVE-2025-9820/01-aa5f15a872.patch
CVE-2025-9820/02-1d56f96f6a.patch
CVE-2025-14831/01-0b2377dfcc.patch
CVE-2025-14831/02-85d6348a30.patch
CVE-2025-14831/03-c28475413f.patch
CVE-2025-14831/04-6db7da7fcf.patch
CVE-2025-14831/05-094accd3eb.patch
CVE-2025-14831/06-bc62fbb946.patch
CVE-2025-14831/07-80db5e90fa.patch
CVE-2025-14831/08-d0ac999620.patch
CVE-2025-14831/09-d6054f0016.patch
CVE-2026-33846/01-4f94e5cfe1.patch
CVE-2026-33846/02-9deffca528.patch
CVE-2026-33846/03-65ab33fa54.patch
CVE-2026-33846/04-cf3f1955e5.patch
CVE-2026-33846/05-bb427ff74d.patch
CVE-2026-33846/06-092c65d004.patch
CVE-2026-33846/07-a2b41be83a.patch
CVE-2026-42009/01-f01e21441e.patch
CVE-2026-42009/02-f341441fad.patch
CVE-2026-33845/01-141ee1d418.patch
CVE-2026-33845/02-bd70e112d4.patch
CVE-2026-33845/03-e5b72c53c7.patch
CVE-2026-33845/04-21563d8778.patch
CVE-2026-33845/05-1057846cd5.patch
CVE-2026-33845/06-d59d9cc794.patch
CVE-2026-42010/01-e3ffd31846.patch
CVE-2026-42010/02-cb1833afd9.patch
CVE-2026-42010/03-83e579a80e.patch
CVE-2026-42010/04-0f8539fac7.patch
CVE-2026-42010/05-b10ac69270.patch
CVE-2026-3833/01-19f6508647.patch
CVE-2026-3833/02-0fd5bfe0c7.patch
CVE-2026-42011/01-1dead2faec.patch
CVE-2026-42011/02-24713b8c63.patch
CVE-2026-42012/01-fc909c3abd.patch
CVE-2026-42012/02-5cc003b968.patch
CVE-2026-42012/03-6133fb459b.patch
CVE-2026-42012/04-8dcc6a1f48.patch
CVE-2026-42012/05-b39429d77d.patch
CVE-2026-42013/01-3ee2cb7070.patch
CVE-2026-42013/02-29801bef00.patch
CVE-2026-42013/03-01a4fd98b5.patch
CVE-2026-42014.patch
CVE-2026-5260/01-77228f2d1a.patch
CVE-2026-5260/02-cf6bdc5e4d.patch
CVE-2026-42015.patch
issue-1808/01-35dbb0e4eb.patch
issue-1808/02-7153b46682.patch
issue-1808/03-cb3b9c8735.patch
issue-1810/01-5e29fb9362.patch
issue-1810/02-e3030b7c2e.patch
issue-1810/03-c93bc6dfc7.patch
issue-1818.patch
issue-1854/01-09f3ab24fb.patch
issue-1854/02-3023e4d155.patch
issue-1819/01-bdb3ceda0a.patch
issue-1819/02-2799775899.patch
issue-1819/03-3065481076.patch
issue-1817.patch
