Commit graph

288 commits

Author SHA1 Message Date
John Marino
c55ac89dcd security category: Remove $PTHREAD_LIBS
approved by:	PTHREAD blanket
2015-03-25 08:30:27 +00:00
Dirk Meyer
a4e7653b21 - Security update to 1.0.2a
- termios.h now default
- fix patches
- fix manpage generation
- option ZLIB removed from default
- restore padlock support
- restore RFC-5705
- restore patch history
- restore build on older FreeBSD
- restore soname
Security: https://www.openssl.org/news/secadv_20150319.txt
Security: CVE-2015-0291
Security: CVE-2015-0204
Security: CVE-2015-0290
Security: CVE-2015-0207
Security: CVE-2015-0286
Security: CVE-2015-0208
Security: CVE-2015-0287
Security: CVE-2015-0289
Security: CVE-2015-0292
Security: CVE-2015-0293
Security: CVE-2015-1787
Security: CVE-2015-0285
Security: CVE-2015-0209
Security: CVE-2015-0288
2015-03-21 10:53:13 +00:00
Xin LI
f3770930f2 Fix botched patch, this fixes build for i386.
Reported by:	ohauer
Pointy hat to:	delphij
2015-03-19 22:15:36 +00:00
Dirk Meyer
1f3b87b7e9 - mark BROKEN options 2015-03-19 21:55:02 +00:00
Xin LI
8f4ff84d95 Update to 1.0.1m to fix multiple vulnerabilities.
With hat:	so
2015-03-19 20:23:36 +00:00
Dirk Meyer
88e0c8f493 - update to 1.0.1l
- fix option PADLOCK
2015-01-16 09:17:38 +00:00
Xin LI
0fd5e6d2fe Update to 1.01k.
With hat:	ports-secteam
Security:	vuxml 4e536c14-9791-11e4-977d-d050992ecde8
Security:	CVE-2014-3569
Security:	CVE-2014-3570
Security:	CVE-2014-3571
Security:	CVE-2014-3572
Security:	CVE-2014-8275
Security:	CVE-2015-0204
Security:	CVE-2015-0205
Security:	CVE-2015-0206
2015-01-09 00:02:30 +00:00
Dirk Meyer
41a563525f - new option TLSEXPCIPHERS
PR:		195270
Submitted by:	yuri@rawbw.com

- options ordered by function
- extends descriptions
2014-11-23 10:34:38 +00:00
Xin LI
70302614ee Update to 1.01j.
With hat:	ports-secteam
Security:	vuxml 03175e62-5494-11e4-9cc1-bc5ff4fb5e7b
Security:	CVE-2014-3513
Security:	CVE-2014-3566
Security:	CVE-2014-3567
Security:	CVE-2014-3568
2014-10-15 18:34:13 +00:00
Dirk Meyer
2ca2348f2d - remove workaround for amd64 2014-08-14 16:25:11 +00:00
Dirk Meyer
8ba4016c73 - new options SSL2 SSL3
Suggested by:	Velcro Leaf
2014-08-11 04:27:53 +00:00
Xin LI
348a9f3991 Update to 1.01i.
With hat:	ports-secteam
Security:	vuxml 8aff07eb-1dbd-11e4-b6ba-3c970e169bc2
Security:	CVE-2014-3505
Security:	CVE-2014-3506
Security:	CVE-2014-3507
Security:	CVE-2014-3508
Security:	CVE-2014-3509
Security:	CVE-2014-3510
Security:	CVE-2014-3511
Security:	CVE-2014-3512
Security:	CVE-2014-5139
2014-08-06 23:37:49 +00:00
Dirk Meyer
4bc4a40468 - rename patch files 2014-08-03 15:30:04 +00:00
Adam Weinberger
1c30911ff0 Rename security/ patches to reflect the files they modify. 2014-07-29 14:30:10 +00:00
Adam Weinberger
5d2373a092 Add DOCS to OPTIONS_DEFINE to ports that check for PORT_OPTIONS:MDOCS. 2014-07-15 16:57:39 +00:00
Dirk Meyer
7e5bca039b - add CONFLICTS because of libressl 2014-07-13 20:47:21 +00:00
Dag-Erling Smørgrav
b1c276f17e Include the final letter in the CPE version field. 2014-07-10 10:27:39 +00:00
Dirk Meyer
0622b71a49 - allow OPENSSLDIR be changed in /etc/make.conf or Makefile.local 2014-07-03 16:49:37 +00:00
Xin LI
9fafdf3747 Update to 1.0.1h.
Approved by:	so (ports-security@ blanket)
Security:	5ac53801-ec2e-11e3-9cf3-3c970e169bc2
2014-06-05 12:54:40 +00:00
Dag-Erling Smørgrav
2870907ca1 Add CPE information.
With hat:	ports-secteam
2014-06-04 16:54:56 +00:00
Dirk Meyer
eaac0ade39 - Security patch
Security: CVE-2014-0198
Security: http://seclists.org/oss-sec/2014/q2/232
Security: https://rt.openssl.org/Ticket/Display.html?user=guest&pass=guest&id=3321
Obtained from:	OpenBSD
2014-05-03 16:36:42 +00:00
Dirk Meyer
736d01387f - fix a 4 year old "use-after-free" problem
https://rt.openssl.org/Ticket/Display.html?id=2167&user=guest&pass=guest
http://www.tedunangst.com/flak/post/analysis-of-openssl-freelist-reuse
http://ftp.openbsd.org/pub/OpenBSD/patches/5.4/common/008_openssl.patch
Obtained from:	OpenBSD
2014-04-13 08:40:13 +00:00
Dirk Meyer
87ee9dc699 - fix perl path for CURRENT
PR:		188486
2014-04-12 16:58:26 +00:00
Bryan Drewery
5aaebd82e9 - Update to 1.0.1g
Changes:
  - Fix for CVE-2014-0160
  - Add TLS padding extension workaround for broken servers.
  - Fix for CVE-2014-0076

Security:	CVE-2014-0160
Security:	CVE-2014-0076
Security:	https://www.openssl.org/news/secadv_20140407.txt
With hat:	portmgr
MFH:		2014Q2
2014-04-07 21:46:40 +00:00
Dirk Meyer
ae1515c459 - add missing LIB_DEPENDS for forbidden option GMP 2014-03-30 19:37:22 +00:00
Dirk Meyer
2f6d449998 - reset GREP_OPTIONS
PR:		188030
2014-03-28 18:23:44 +00:00
Dirk Meyer
280380c162 - remove broken MANPREFIX 2014-03-04 06:51:37 +00:00
Dirk Meyer
7ac73b4f5c - error out early if users trying to break their base system
PR:		187076
2014-03-02 13:13:27 +00:00
Dirk Meyer
e4fb23b723 - use STAGEDIR
PR:		186753
Submitted by:	Takefu
2014-02-14 14:33:59 +00:00
Dirk Meyer
ec753258a2 - fix option PADLOCK
Submitted by:	Renato Botelho
2014-01-08 20:52:58 +00:00
Dirk Meyer
252a9b7c5f - better fix for perl5.18
Submitted by:	Jung-uk Kim

- clean up
2014-01-08 07:12:01 +00:00
Dirk Meyer
4b97ad6a76 - Security update to openssl-1.0.1f
- remove broken patches
- new fix for perl5.18
- fix option GMP

Security: http://www.openssl.org/news/vulnerabilities.html
Security: CVE-2013-4353
Security: CVE-2013-6449
Security: CVE-2013-6450
Security: 5aaa257e-772d-11e3-a65a-3c970e169bc2
2014-01-07 20:40:22 +00:00
Dirk Meyer
03aac0d70a - fix build with perl 5.16
Submitted by:	Takefu
2013-09-21 09:45:25 +00:00
Baptiste Daroussin
a65ed2e51b Add NO_STAGE all over the place in preparation for the staging support (cat: security) 2013-09-20 22:55:24 +00:00
Baptiste Daroussin
cddacdc1a8 Convert to new perl framework
Convert USE_GMAKE to USES
2013-09-16 16:45:35 +00:00
Dirk Meyer
1dec92159e - drop depedency to makedepend
Submitted by:	Darren Pilgrim
2013-09-09 18:22:13 +00:00
Dirk Meyer
705a136b7c - fix build when libc.so is not a symlink
Submitted by:	Bryan Drewery
2013-06-18 04:33:06 +00:00
Dirk Meyer
89d2ed6ff3 - fix wording of option
Submitted by:	Warren Block
2013-03-18 06:20:21 +00:00
Dirk Meyer
724552959a - updated patches for options PADLOCK 2013-03-05 20:47:17 +00:00
Dirk Meyer
40c7a4a0b4 - fix build with manpages 2013-03-03 22:37:47 +00:00
Dirk Meyer
5afe83dbd5 - fix broken symlink in manpage
Submitted by:	Warren Block
2013-02-25 06:07:10 +00:00
Dirk Meyer
aa69eb0130 - update to 1.0.1e 2013-02-13 20:23:04 +00:00
Dirk Meyer
67a3f15af1 - fix paddding in TLS1.1 and DTLS on amd64 2013-02-10 16:20:47 +00:00
Dirk Meyer
d411d450c1 - Security update to 1.0.1d
Security: CVE-2012-2686
Security: CVE-2013-0166
Security: CVE-2013-0169
Security: http://www.openssl.org/news/secadv_20120510.txt
2013-02-06 20:13:08 +00:00
Dirk Meyer
491c771aa8 - fix option PADLOCK
PR:		175622
Submitted by:	Mathieu Simon
2013-02-03 06:36:22 +00:00
Dirk Meyer
2d07ac9323 - enable optimized NIST ECC on 64-bit little-endian machines
PR:		175663
Submitted by:	bf
2013-01-29 18:46:39 +00:00
Dirk Meyer
49e7f13265 - make the pkg-message respect PREFIX
PR:		175663
Submitted by:	bf
2013-01-29 05:34:22 +00:00
Dirk Meyer
3087eeb7ea - mark option PADLOCK as BROKEN
PR:		175622
2013-01-28 18:07:31 +00:00
Dirk Meyer
d579cd2aaa - cleanup header 2013-01-26 16:34:39 +00:00
Dirk Meyer
719badcd53 - fix pkg-plist for option SHARED
PR:		170261
Submitted by:	Bryan Drewery
2012-07-29 21:17:24 +00:00