Subject: CVS commit: pkgsrc/security/openssl
From: OBATA Akio
Date: 2014-04-08 08:20:44
Message id: 20140408062044.52D6E96@cvs.netbsd.org

Log Message:
Update openssl to 1.0.1g.
(CVE-2014-0076 is already fixed in pkgsrc).

 OpenSSL CHANGES
 _______________

 Changes between 1.0.1f and 1.0.1g [7 Apr 2014]

  *) A missing bounds check in the handling of the TLS heartbeat extension
     can be used to reveal up to 64k of memory to a connected client or
     server.

     Thanks for Neel Mehta of Google Security for discovering this bug and to
     Adam Langley <agl@chromium.org> and Bodo Moeller \ 
<bmoeller@acm.org> for
     preparing the fix (CVE-2014-0160)
     [Adam Langley, Bodo Moeller]

  *) Fix for the attack described in the paper "Recovering OpenSSL
     ECDSA Nonces Using the FLUSH+RELOAD Cache Side-channel Attack"
     by Yuval Yarom and Naomi Benger. Details can be obtained from:
     http://eprint.iacr.org/2014/140

     Thanks to Yuval Yarom and Naomi Benger for discovering this
     flaw and to Yuval Yarom for supplying a fix (CVE-2014-0076)
     [Yuval Yarom and Naomi Benger]

  *) TLS pad extension: draft-agl-tls-padding-03

     Workaround for the "TLS hang bug" (see FAQ and opensslPR#2771): if the
     TLS client Hello record length value would otherwise be > 255 and
     less that 512 pad with a dummy extension containing zeroes so it
     is at least 512 bytes long.

     [Adam Langley, Steve Henson]

Files:
RevisionActionfile
1.188modifypkgsrc/security/openssl/Makefile
1.104modifypkgsrc/security/openssl/distinfo
1.1removepkgsrc/security/openssl/patches/patch-crypto_bn_bn.h
1.1removepkgsrc/security/openssl/patches/patch-crypto_bn_bn__lib.c
1.1removepkgsrc/security/openssl/patches/patch-crypto_ec_ec2__mult.c