Next | Query returned 437 messages, browsing 111 to 120 | Previous

History of commit frequency

CVS Commit History:


   2015-12-08 17:53:32 by Jonathan Perkin | Files touched by this commit (10)
Log message:
Regenerate patches.
   2015-12-08 17:51:33 by Jonathan Perkin | Files touched by this commit (1)
Log message:
Work around an issue on platforms where CC=cc (set by default in sys.mk from
bootstrap-mk-files).  OpenSSL specifically checks for CC=gcc before using it as
a makedepend replacement, whereas CC=cc will fall back to requiring a real
'makedepend' which may not be installed.  Tested on Linux by kamil@
   2015-12-07 16:57:42 by Jonathan Perkin | Files touched by this commit (3)
Log message:
Update security/openssl to 1.0.2e.

pkgsrc changes:

  - We now need to run 'make depend' after configure to pick up algorithm
    selection changes.

Upstream changes:

 Changes between 1.0.2d and 1.0.2e [3 Dec 2015]

  *) BN_mod_exp may produce incorrect results on x86_64

     There is a carry propagating bug in the x86_64 Montgomery squaring
     procedure. No EC algorithms are affected. Analysis suggests that attacks
     against RSA and DSA as a result of this defect would be very difficult to
     perform and are not believed likely. Attacks against DH are considered just
     feasible (although very difficult) because most of the work necessary to
     deduce information about a private key may be performed offline. The amount
     of resources required for such an attack would be very significant and
     likely only accessible to a limited number of attackers. An attacker would
     additionally need online access to an unpatched system using the target
     private key in a scenario with persistent DH parameters and a private
     key that is shared between multiple clients. For example this can occur by
     default in OpenSSL DHE based SSL/TLS ciphersuites.

     This issue was reported to OpenSSL by Hanno Böck.
     (CVE-2015-3193)
     [Andy Polyakov]

  *) Certificate verify crash with missing PSS parameter

     The signature verification routines will crash with a NULL pointer
     dereference if presented with an ASN.1 signature using the RSA PSS
     algorithm and absent mask generation function parameter. Since these
     routines are used to verify certificate signature algorithms this can be
     used to crash any certificate verification operation and exploited in a
     DoS attack. Any application which performs certificate verification is
     vulnerable including OpenSSL clients and servers which enable client
     authentication.

     This issue was reported to OpenSSL by Loïc Jonas Etienne (Qnective AG).
     (CVE-2015-3194)
     [Stephen Henson]

  *) X509_ATTRIBUTE memory leak

     When presented with a malformed X509_ATTRIBUTE structure OpenSSL will leak
     memory. This structure is used by the PKCS#7 and CMS routines so any
     application which reads PKCS#7 or CMS data from untrusted sources is
     affected. SSL/TLS is not affected.

     This issue was reported to OpenSSL by Adam Langley (Google/BoringSSL) using
     libFuzzer.
     (CVE-2015-3195)
     [Stephen Henson]

  *) Rewrite EVP_DecodeUpdate (base64 decoding) to fix several bugs.
     This changes the decoding behaviour for some invalid messages,
     though the change is mostly in the more lenient direction, and
     legacy behaviour is preserved as much as possible.
     [Emilia Käsper]

  *) In DSA_generate_parameters_ex, if the provided seed is too short,
     return an error
     [Rich Salz and Ismo Puustinen <ismo.puustinen@intel.com>]
   2015-11-04 02:18:12 by Alistair G. Crooks | Files touched by this commit (434)
Log message:
Add SHA512 digests for distfiles for security category

Problems found locating distfiles:
	Package f-prot-antivirus6-fs-bin: missing distfile fp-NetBSD.x86.32-fs-6.2.3.tar.gz
	Package f-prot-antivirus6-ws-bin: missing distfile fp-NetBSD.x86.32-ws-6.2.3.tar.gz
	Package libidea: missing distfile libidea-0.8.2b.tar.gz
	Package openssh: missing distfile openssh-7.1p1-hpn-20150822.diff.bz2
	Package uvscan: missing distfile vlp4510e.tar.Z

Otherwise, existing SHA1 digests verified and found to be the same on
the machine holding the existing distfiles (morden).  All existing
SHA1 digests retained for now as an audit trail.
   2015-10-26 10:42:47 by Jonathan Perkin | Files touched by this commit (3)
Log message:
Support SunOS/clang and pass -h linker argument correctly.  Doesn't fully
fix the build yet, an additional patch to remove LD_LIBRARY_PATH is required
but needs wider testing.
   2015-10-09 13:44:48 by Jonathan Perkin | Files touched by this commit (1)
Log message:
Force the "linux-elf" Configure target for Linux 32-bit, fixes the \ 
build when
running with ABI=32 on a 64-bit native host.
   2015-08-31 21:49:44 by Thomas Klausner | Files touched by this commit (1)
Log message:
Restore https URL, as discussed with schmonz.

Systems without https support in their fetch tools can get the distfiles
from ftp.NetBSD.org.
   2015-08-31 17:26:31 by Amitai Schlair | Files touched by this commit (1)
Log message:
Go back to using the non-https MASTER_SITES, because NetBSD 6.x's
/usr/bin/ftp (at least) can't fetch https URLs, and we verify
distfiles by checksum anyway.
   2015-07-12 21:02:47 by Thomas Klausner | Files touched by this commit (1)
Log message:
Fix pattern; perl will never be <5.16 again.
   2015-07-09 15:37:56 by Thomas Klausner | Files touched by this commit (3)
Log message:
Update to 1.0.2d:

  Major changes between OpenSSL 1.0.2c and OpenSSL 1.0.2d [9 Jul 2015]

      o Alternate chains certificate forgery (CVE-2015-1793)

Next | Query returned 437 messages, browsing 111 to 120 | Previous