Commit graph

6128 commits

Author SHA1 Message Date
taca
9ac779433e Update php-suhosin package to 0.9.33 to fix security problem.
SektionEins GmbH
                        www.sektioneins.de

                     -= Security  Advisory =-

     Advisory: Suhosin PHP Extension Transparent Cookie Encryption Stack
Buffer Overflow
 Release Date: 2012/01/19
Last Modified: 2012/01/19
       Author: Stefan Esser [stefan.esser[at]sektioneins.de]

  Application: Suhosin Extension <= 0.9.32.1
     Severity: A possible stack buffer overflow in Suhosin extension's
               transparent cookie encryption that can only be triggered
               in an uncommon and weakened Suhosin configuration can lead
               to arbitrary remote code execution, if the FORTIFY_SOURCE
               compile option was not used when Suhosin was compiled.
         Risk: Medium
Vendor Status: Suhosin Extension 0.9.33 was released which fixes this
vulnerability
    Reference: http://www.suhosin.org/
               https://github.com/stefanesser/suhosin
2012-01-20 03:23:34 +00:00
reed
0f29d71a67 Bump API dependency due to eggdbus dependency removed. 2012-01-19 15:26:59 +00:00
taca
52cb4febe5 Update security/openssl package to 0.9.8t.
OpenSSL CHANGES
 _______________

 Changes between 0.9.8s and 0.9.8t [18 Jan 2012]

  *) Fix for DTLS DoS issue introduced by fix for CVE-2011-4109.
     Thanks to Antonio Martin, Enterprise Secure Access Research and
     Development, Cisco Systems, Inc. for discovering this bug and
     preparing a fix. (CVE-2012-0050)
     [Antonio Martin]
2012-01-19 00:51:23 +00:00
adam
6630a48467 Revbump after updating db5 2012-01-18 14:46:03 +00:00
adam
39801bab03 Revbump after db5 update 2012-01-18 14:44:36 +00:00
sbd
1e38404e66 Convert packages with add --libdir=* to CONFIGURE_ARGS to use
GNU_CONFIGURE_LIBDIR or GNU_CONFIGURE_LIBSUBDIR.
2012-01-17 21:43:18 +00:00
drochner
b0f587c22d update to 2.12.16
changes: bugfixes
2012-01-17 14:54:19 +00:00
adam
c7ac0921f8 Fix building with Clang; Fix installing on Mac OS X 2012-01-16 20:36:08 +00:00
obache
2f97717bdb gsed related clean up.
* Stop to treat NetBSD's sed as GNU sed, not full compatible.
  * Then, no need to reset TOOLS_PLATFORM.gsed for NetBSD if USE_TOOLS+=gsed and
    real GNU sed is required.
  * In addition, convert simple USE_TOOLS+=gsed to conditionally, without NetBSD.
* convert {BUILD_,}DEPENDS+=gsed to USE_TOOLS, all tools from gsed are real gsed.
2012-01-14 07:44:33 +00:00
hans
3a3fe8e873 Convert the remaining few packages that explicitly set DEPENDS or
BUILD_DEPENDS on bison to USE_TOOLS=bison. The minimum bison version
required in mk/tools/bison.mk is good enough for all of them.
2012-01-14 00:51:36 +00:00
obache
1f4649c8a2 Recursive bump from audio/libaudiofile, x11/qt4-libs and x11/qt4-tools ABI bump. 2012-01-13 10:54:43 +00:00
pettai
7e23540542 Version 1.10.5
* Build fixes from Linus Nordberg and Arno Hautala.
* Update gnulib files.
2012-01-12 20:17:47 +00:00
hiramatsu
0f68516aa7 Update p5-Mozilla-CA to 20111025.
Change from previous:
---------------------
20111025
  - Do not add CA's only trusted for email and/or code signing (RT#70967)
    (if you need that, please let us know and we can see about putting it
     in as an option)
2012-01-12 01:16:39 +00:00
drochner
838d4c3cea +racoon2 2012-01-11 20:10:44 +00:00
drochner
5803b255b6 add the latest snapshot of racoon2 (IKEv2 daemon), from John R. Shannon
(just added DESTDIR support)
2012-01-11 20:08:39 +00:00
manu
83b964e7b9 Re-enable PAM support, as it works fine provided one does not mix multiple
versions of libcrypto in sshd. This can happen if OpenSSH is linked with
pkgsrc's OpenSSL and if using nss_ldap, which pulls base-system OpenSSL
through kerberos libraries. One needs to disable the krb5 of nss_ldap
in order to fix that.
2012-01-09 05:25:36 +00:00
shattered
0227869529 Uses <sys/vnode.h> -- mark BSD-only and HPUX-only. 2012-01-08 15:04:03 +00:00
sbd
f43b290f90 Add missing devel/ncurses buildlink.
Bump PKGREVISION
2012-01-08 03:45:12 +00:00
taca
0f5a52a1d5 Update openssl pacakge to 0.9.8s.
OpenSSL CHANGES
 _______________

 Changes between 0.9.8r and 0.9.8s [4 Jan 2012]

  *) Nadhem Alfardan and Kenny Paterson have discovered an extension
     of the Vaudenay padding oracle attack on CBC mode encryption
     which enables an efficient plaintext recovery attack against
     the OpenSSL implementation of DTLS. Their attack exploits timing
     differences arising during decryption processing. A research
     paper describing this attack can be found at:
                  http://www.isg.rhul.ac.uk/~kp/dtls.pdf
     Thanks go to Nadhem Alfardan and Kenny Paterson of the Information
     Security Group at Royal Holloway, University of London
     (www.isg.rhul.ac.uk) for discovering this flaw and to Robin Seggelmann
     <seggelmann@fh-muenster.de> and Michael Tuexen <tuexen@fh-muenster.de>
     for preparing the fix. (CVE-2011-4108)
     [Robin Seggelmann, Michael Tuexen]

  *) Stop policy check failure freeing same buffer twice. (CVE-2011-4109)
     [Ben Laurie, Kasper <ekasper@google.com>]

  *) Clear bytes used for block padding of SSL 3.0 records.
     (CVE-2011-4576)
     [Adam Langley (Google)]

  *) Only allow one SGC handshake restart for SSL/TLS. (CVE-2011-4619)
     [Adam Langley (Google)]

  *) Prevent malformed RFC3779 data triggering an assertion failure.
     Thanks to Andrew Chi, BBN Technologies, for discovering the flaw
     and Rob Austein <sra@hactrn.net> for fixing it. (CVE-2011-4577)
     [Rob Austein <sra@hactrn.net>]

  *) Fix ssl_ciph.c set-up race.
     [Adam Langley (Google)]

  *) Fix spurious failures in ecdsatest.c.
     [Emilia Käóper (Google)]

  *) Fix the BIO_f_buffer() implementation (which was mixing different
     interpretations of the '..._len' fields).
     [Adam Langley (Google)]

  *) Fix handling of BN_BLINDING: now BN_BLINDING_invert_ex (rather than
     BN_BLINDING_invert_ex) calls BN_BLINDING_update, ensuring that concurrent
     threads won't reuse the same blinding coefficients.

     This also avoids the need to obtain the CRYPTO_LOCK_RSA_BLINDING
     lock to call BN_BLINDING_invert_ex, and avoids one use of
     BN_BLINDING_update for each BN_BLINDING structure (previously,
     the last update always remained unused).
     [Emilia Käóper (Google)]

  *) Fix SSL memory handling for (EC)DH ciphersuites, in particular
     for multi-threaded use of ECDH.
     [Adam Langley (Google)]

  *) Fix x509_name_ex_d2i memory leak on bad inputs.
     [Bodo Moeller]

  *) Add protection against ECDSA timing attacks as mentioned in the paper
     by Billy Bob Brumley and Nicola Tuveri, see:

	http://eprint.iacr.org/2011/232.pdf

     [Billy Bob Brumley and Nicola Tuveri]

 Changes between 0.9.8q and 0.9.8r [8 Feb 2011]

  *) Fix parsing of OCSP stapling ClientHello extension. CVE-2011-0014
     [Neel Mehta, Adam Langley, Bodo Moeller (Google)]

  *) Fix bug in string printing code: if *any* escaping is enabled we must
     escape the escape character (backslash) or the resulting string is
     ambiguous.
     [Steve Henson]

 Changes between 0.9.8p and 0.9.8q [2 Dec 2010]

  *) Disable code workaround for ancient and obsolete Netscape browsers
     and servers: an attacker can use it in a ciphersuite downgrade attack.
     Thanks to Martin Rex for discovering this bug. CVE-2010-4180
     [Steve Henson]

  *) Fixed J-PAKE implementation error, originally discovered by
     Sebastien Martini, further info and confirmation from Stefan
     Arentz and Feng Hao. Note that this fix is a security fix. CVE-2010-4252
     [Ben Laurie]
2012-01-06 03:26:23 +00:00
obache
480790ec88 Fixes a segfault in gssapi.c, taken from upstream Git repo.
PR#45765.

Bump PKGREVISION of cy2-gssapi plugin package.
2012-01-02 03:25:56 +00:00
tez
a6e5c28f02 Fix for CVE-2011-4862 from FreeBSD
When an encryption key is supplied via the TELNET protocol, its length
is not validated before the key is copied into a fixed-size buffer.
2011-12-30 18:59:05 +00:00
joerg
8768b9bd86 Also point configure to dnssec-signzone 2011-12-29 16:37:18 +00:00
joerg
d00e6afa8c Drop the sed calls that want to be gsed specific, since they don't
actually seem to change anything (with gsed).
2011-12-28 21:23:17 +00:00
sbd
633b4f389f Because of adding gsed to USE_TOOLS there's no need for patch-ah or having a
build dependence on gsed.

Bump PKGREVISION.
2011-12-28 01:32:25 +00:00
sbd
55631428bd If something is patched to use gsed then gsed must be added to USE_TOOLS. 2011-12-26 07:24:35 +00:00
sbd
7f3656bd68 Include deve/ncurses/buildlink3.mk not mk/curses.buildlink3.mk.
Note: pinentry may need INCOMPAT_CURSES to be set for some platforms.
2011-12-25 03:42:30 +00:00
tez
d5a189e54f Fix for CVE-2011-4862 from FreeBSD
When an encryption key is supplied via the TELNET protocol, its length
is not validated before the key is copied into a fixed-size buffer.

This is a remote root exploit that is being actively exploited in the wild.
2011-12-23 16:44:24 +00:00
joerg
5ef847feb3 Fix build with newer heimdal 2011-12-22 16:33:51 +00:00
joerg
29078afcf5 Unprivileged users don't have /usr/sbin in PATH on NetBSD, so deal
with it.
2011-12-22 16:33:03 +00:00
dholland
9483c762c8 Disable probe for gmake; PR 45729 2011-12-21 15:52:17 +00:00
wiz
ed1eee04c7 Set LICENSE, from Pierre Pronchery in PR 45729. 2011-12-21 14:24:32 +00:00
wiz
257ad46f10 Fix PLIST on NetBSD-5.99.58.
Remove line from distinfo for non-existing patch.
I guess the non-existing patch might have fixed it up, but as it's not
there....
2011-12-21 12:30:21 +00:00
dholland
df8296fced Don't use "bool" as a variable name. This package now builds. (at long last) 2011-12-18 18:05:13 +00:00
sbd
81e812c935 Include mk/curses.buildlink3.mk not mk/termcap.buildlink3.mk. 2011-12-18 03:10:29 +00:00
sbd
867ae8776e Add missing mk/curses buildlink.
Bump PKGREVISION
2011-12-17 23:43:43 +00:00
sbd
13271f526f Add missing mk/termcap buildlink.
Bump PKGREVISION
2011-12-17 23:42:40 +00:00
marino
f40c42c775 security/botan: Fix DragonFly
1) Update two configuration files to include DragonFly, which results in
   additional generated files.
2) Update PLIST.DragonFly (it was wrong in any case)
2011-12-17 16:09:46 +00:00
obache
9ce09e1be1 Change default PKGNAME scheme for PECL packages.
Drop ${PHP_BASE_VARS} from PKGVERSION by default.

It used to be required to support multiple php version.
But after PHP version based ${PHP_PKG_PREFIX} was introduced,
such trick is not required anymore.
In addition to this, such version name schme invokes unwanted version bump
when base php version is bumped, plus, such version scheme is hard to
use for DEPENDS pattern.

To avoid downgrading of package using such legacy version scheme,
PECL_LEGACY_VERSION_SCHEME is introduced.
If it is defined, current version scheme is still used for currently
supported PHP version (5 and 53), but instead of ${PHP_BASE_VARS},
current fixed PHP base version in pkgsrc is used to avoid unwanted version bump
from update of PHP base package.
With newer PHP (54, or so on), new version scheme will be used if
it is defined.
This trick will not be required and should be removed after php5 and php53 will
be gone away from pkgsrc.
2011-12-17 13:46:27 +00:00
marino
496574aa65 security/qca2-ossl: Support OpenSSL 1.0
DragonFly in on OpenSSL 1.0 and this package wasn't building due to the
missing MD5 digest that no longer builds by default on the latest versions
of OpenSSL.  FreeBSD already ran into this and patched qca-ossl, and this
ports their fix to pkgsrc.
2011-12-17 12:46:51 +00:00
sbd
e712fa45e9 Add missing mk/termcap buildlink.
Bump PKGREVISION
2011-12-17 10:16:32 +00:00
drochner
46c6b83cc9 -explicitely disable kerberos support to avoid PLIST fluctuations
(seen in bulk build)
-fix obvious typo in asm code (fixes i386 build)
-don't install nettle library to avoid conflict with pkgsrc/nettle
bump PKGREV
2011-12-16 12:54:41 +00:00
pettai
032935490e Version 1.10.4
* liboath: Fix build so that OATH_VERSION_NUMBER is actually defined.
It was an empty value in the last release due to a bug in the build
scripts.

Version 1.10.3

* liboath: Allow strcmp callback to return negative to signal errors.
* Fix bugs in build scripts for generating version numbers.
* Update gnulib files.
2011-12-14 09:04:13 +00:00
sbd
45a9125c16 Regenerate diffs for GNU patch. 2011-12-14 03:05:04 +00:00
spz
2c74875e63 added prevention of CVE-2011-4122 taken from NetBSD src 2011-12-13 15:57:08 +00:00
pettai
7de344ff50 OpenDNSSEC 1.3.4
Bugfixes:
* Signer: Use debug instead of warning for drudgers queue being full,
  also sleep 10 ms if it is full to not hog CPU. This increased signing speed
  on single core machines by a factor of 2.
2011-12-12 09:07:22 +00:00
cheusov
49f2c83601 Fix build failure on Solaris (PR 28226). 2011-12-10 20:50:51 +00:00
sbd
0478a33acf In OWN_DIRS_PERMS change ROOT_GROUP to REAL_ROOT_GROUP 2011-12-09 01:53:11 +00:00
jym
7d749dc405 Update stunnel to 4.50 (from 4.46).
Version 4.50, 2011.12.03, urgency: MEDIUM:

    New features
        Added Android port.
        Updated INSTALL.FIPS.
    Bugfixes
        Fixed internal memory allocation problem in inetd mode.
        Fixed FIPS mode on Microsoft Vista, Server 2008, and Windows 7. This fix required to compile OpenSSL FIPS-compliant DLLs with MSVC 9.0, instead of MSVC 10.0. msvcr100.dll was replaced with msvcr90.dll. GPL compatibility issues are explained in the GPL FAQ: http://www.gnu.org/licenses/gpl-faq.html#WindowsRuntimeAndGPL
        POP3 server-side protocol negotiation updated to report STLS capability (thx to Anthony Morgan).

Version 4.49, 2011.11.28, urgency: MEDIUM:

    Bugfixes
        Missing Microsoft Visual C++ Redistributable (msvcr100.dll) required by FIPS-compliant OpenSSL library was added to the Windows installer.
        A bug was fixed causing crashes on MacOS X and some other platforms.

Version 4.48, 2011.11.26, urgency: MEDIUM:

    New features
        FIPS support on Win32 platform added. OpenSSL 0.9.8r DLLs based on FIPS 1.2.3 canister are included with this version of stunnel. FIPS mode can be disabled with "fips = no" configuration file option.
    Bugfixes
        Fixed canary initialization problem on Win32 platform.

Version 4.47, 2011.11.21, urgency: MEDIUM:

    Internal improvements
        CVE-2010-3864 workaround improved to check runtime version of OpenSSL rather than compiled version, and to allow OpenSSL 0.x.x >= 0.9.8p.
        Encoding of man page sources changed to UTF-8.
    Bugfixes
        Handling of socket/SSL close in transfer() function was fixed.
        Logging was modified to save and restore system error codes.
        Option "service" was restricted to Unix, as since stunnel 4.42 it wasn't doing anything useful on Windows platform.
2011-12-08 19:37:57 +00:00
jmmv
8f8d690b51 Move the *_amd64 PLIST entries out of the common file and into all of the
platform files except Darwin.  Also add the *_sse2 entries to Darwin.

Note that both *_amd64 and *_sse2 are conditional on x86_64, so this
division of files per platform is easier to do by PLIST tweaks than by
further Makefile conditionals.

This fixes the build of botan under OS X Lion with ABI=64 and should be
a no-op for all other platforms.
2011-12-08 03:01:03 +00:00
joerg
c48e0e55bb Fix build with newer GCC 2011-12-06 19:47:32 +00:00