Commit graph

11558 commits

Author SHA1 Message Date
wiz
6c32e61981 security/Makefile: + py-pip-audit 2021-11-16 16:05:11 +00:00
wiz
bb76ea7afc security/py-pip-audit: import py-pip-audit-0.0.5
pip-audit is a prototype tool for scanning Python environments for
packages with known vulnerabilities. It uses the Python Packaging
Advisory Database via the PyPI JSON API as a source of vulnerability
reports.
2021-11-16 16:04:40 +00:00
wiz
7626a35008 libtasn1: update to 4.18.0.
* Noteworthy changes in release 4.18.0 (2021-11-09) [stable]
- Improve GTK-DOC manual.  Closes: #35.
- Improve --help and --version for tools with gnulib.  Closes: #37.
- Update gnulib files and various maintenance fixes.
2021-11-16 14:32:39 +00:00
wiz
025613e28f *: recursive bump for gstreamer 1.18.5 2021-11-15 22:53:55 +00:00
wiz
9ccb1c2f8a cyrus-sasl: use BLAKE2s
Remove checksums for file that is commented out in Makefile
2021-11-15 18:12:45 +00:00
adam
26f15a4ed9 py-oath: updated to 1.4.4
1.4.4:
add long description
2021-11-14 20:37:46 +00:00
adam
9476fbb52f py-acme py-certbot*: updated to 1.21.0
Certbot 1.21.0

Added

Certbot will generate a web.config file on Windows in the challenge path
when the webroot plugin is used, if one does not exist. This web.config file
lets IIS serve challenge files while they do not have an extension.

Changed

We changed the PGP key used to sign the packages we upload to PyPI. Going
forward, releases will be signed with one of three different keys. All of
these keys are available on major key servers and signed by our previous PGP
key. The fingerprints of these new keys are:
BF6BCFC89E90747B9A680FD7B6029E8500F7DB16
86379B4F0AF371B50CD9E5FF3402831161D1D280
20F201346BF8F3F455A73F9A780CC99432A28621

Fixed

More details about these changes can be found on our GitHub repo.
2021-11-13 17:30:26 +00:00
pin
a4e235cd31 security/pleaser: update to 0.5.0
-backslashes within arguments now require escaping
-editmode=keep to preserve the file permission bits from an existing file
-exact_{rule,target,name,hostname,dir} which are literal
-nix bump to 0.23.0
-deprecating regex term in favour of rule
2021-11-10 07:33:51 +00:00
taca
92f31616cb security/clamav-doc: update to 0.103.4
Update documentation part.
2021-11-08 14:50:12 +00:00
taca
9f8416394e security/clamav: update to 0.103.4
ClamAV 0.103.4 is a critical patch release with the following fixes:

- FreshClam:
  - Add a 24-hour cool-down for FreshClam clients that have received an HTTP
    403 (Forbidden) response from the CDN.
    This is to reduce the volume of 403-response data served to blocked
    FreshClam clients that are configured with a tight update-loop.
  - Fixed a bug where FreshClam treats an empty CDIFF as an incremental update
    failure instead of as an intentional request to download the whole CVD.

- ClamDScan: Fix a scan error when broken symlinks are encountered on macOS with
  "FollowDirectorySymlinks" and "FollowFileSymlinks" options disabled.

- Overhauled the scan recursion / nested archive extraction logic and added new
  limits on embedded file-type recognition performed during the "raw" scan of
  each file. This limits embedded file-type misidentification and prevents
  detecting embedded file content that is found/extracted and scanned at other
  layers in the scanning process.

- Fix an issue with the FMap module that failed to read from some nested files.

- Fixed an issue where failing to load some rules from a Yara file containing
  multiple rules may cause a crash.

- Fixed assorted compiler warnings.

- Fixed assorted Coverity static code analysis issues.

- Scan limits:
  - Added virus-name suffixes to the alerts that trigger when a scan limit has
    been exceeded. Rather than simply `Heuristics.Limits.Exceeded`, you may now
    see limit-specific virus-names, to include:
    - `Heuristics.Limits.Exceeded.MaxFileSize`
    - `Heuristics.Limits.Exceeded.MaxScanSize`
    - `Heuristics.Limits.Exceeded.MaxFiles`
    - `Heuristics.Limits.Exceeded.MaxRecursion`
    - `Heuristics.Limits.Exceeded.MaxScanTime`
  - Renamed the `Heuristics.Email.ExceedsMax.*` alerts to align with the other
    limit alerts names. These alerts include:
    - `Heuristics.Limits.Exceeded.EmailLineFoldcnt`
    - `Heuristics.Limits.Exceeded.EmailHeaderBytes`
    - `Heuristics.Limits.Exceeded.EmailHeaders`
    - `Heuristics.Limits.Exceeded.EmailMIMEPartsPerMessage`
    - `Heuristics.Limits.Exceeded.EmailMIMEArguments`
  - Fixed an issue where the Email-related scan limits would alert even when the
    "AlertExceedsMax" (`--alert-exceeds-max`) scan option is not enabled.
  - Fixes an issue in the Zip parser where exceeding the "MaxFiles" limit or
    the "MaxFileSize" limit would abort the scan but would fail to alert.
    The Zip scan limit issues were independently identified and reported by
    Aaron Leliaert and Max Allan.

- Fixed a leak in the Email parser when using the `--gen-json` scan option.

- Fixed an issue where a failure to record metadata in the Email parser when
  using the `--gen-json` scan option could cause the Email parser to abort the
  scan early and fail to extract and scan additional content.

- Fixed a file name memory leak in the Zip parser.

- Fixed an issue where certain signature patterns may cause a crash or cause
  unintended matches on some systems when converting characters to uppercase if
  a UTF-8 unicode single-byte grapheme becomes a multi-byte grapheme.
  Patch courtesy of Andrea De Pasquale.

Other fixes backported from 0.104.0:

- Fixed a crash in programs that use libclamav when the programs don't set a
  callback for the "virus found" event.
  Patch courtesy of Markus Strehle.

- Added checks to the the SIS archive parser to prevent an SIS file entry from
  pointing to the archive, which would result in a loop. This was not an actual
  infinite loop, as ClamAV's scan recursion limit limits the depth of nested
  archive extraction.

- ClamOnAcc: Fixed a socket file descriptor leak that could result in a crash
  when all available file descriptors are exhausted.

- FreshClam: Fixed an issue where FreshClam would download a CVD repeatedly if a
  zero-byte CDIFF is downloaded or if the incremental update failed and if the
  CVD downloaded after that is older than advertised.
  Patch courtesy of Andrew Williams.

- ClamDScan:
  - Fixed a memory leak of the scan target filename when using the
    `--fdpass` or `--stream` options.
  - Fixed an issue where ClamDScan would fail to scan any file after excluding
    a file with the "ExcludePath" option when using when using the `--multiscan`
    (`-m`) option along with either `--fdpass` or `--stream`.
    Also fixed a memory leak of the accidentally-excluded paths in this case.
  - Fixed a single file path memory leak when using `--fdpass`.
  - Fixed an issue where the "ExcludePath" regex may fail to exclude absolute
    paths when the scan is invoked with a relative path.

Special thanks to the following for code contributions and bug reports:
- Aaron Leliaert
- Andrea De Pasquale
- Andrew Williams
- Markus Strehle
- Max Allan
2021-11-08 14:49:23 +00:00
rhialto
4242013307 net/hercules4sdl-crypto: new package
needed for emulators/hercules4sdl.
2021-11-06 16:42:37 +00:00
fox
6fc68b7ba4 security/wolfssl: Update to v5.0.0
Changes since v4.8.1:

wolfSSL Release 5.0.0 (Nov 01, 2021)

Release 5.0.0 of wolfSSL embedded TLS has bug fixes and new features including:
Vulnerabilities

  * [\Low] Hang with DSA signature creation when a specific q value is used in a
    maliciously crafted key. If a DSA key with an invalid q value of either 1 or
    0 was decoded and used for creating a signature, it would result in a hang
    in wolfSSL. Users that are creating signatures with DSA and are using keys
    supplied from an outside source are affected.
  * [\Low] Issue with incorrectly validating a certificate that has multiple
    subject alternative names when given a name constraint. In the case where
    more than one subject alternative name is used in the certificate, previous
    versions of wolfSSL could incorrectly validate the certificate. Users
    verifying certificates with multiple alternative names and name constraints,
    are recommended to either use the certificate verify callback to check for
    this case or update the version of wolfSSL used. Thanks to Luiz Angelo Daros
    de Luca for the report.

New Feature Additions
New Product

  * FIPS 140-3 -- currently undergoing laboratory testing, code review and
    ultimately CMVP validation. Targeting the latest FIPS standard.

Ports

  * IoT-Safe with TLS demo
  * SE050 port with support for RNG, SHA, AES, ECC (sign/verify/shared secret)
    and ED25519
  * Support for Renesas TSIP v1.13 on RX72N

Post Quantum

  * Support for OQS's (liboqs version 0.7.0) implementation of NIST Round 3 KEMs
    as TLS 1.3 groups --with-liboqs
  * Hybridizing NIST ECC groups with the OQS groups
  * Remove legacy NTRU and QSH
  * Make quantum-safe groups available to the compatibility layer

Linux Kernel Module

  * Full support for FIPS 140-3, with in-kernel power on self test (POST) and
    conditional algorithm self test(s) (CAST)
  * --enable-linuxkm-pie -- position-independent in-kernel wolfCrypt container,
      for FIPS
  * Vectorized x86 acceleration in PK algs (RSA, ECC, DH, DSA) and AES/AES-GCM
  * Vectorized x86 acceleration in interrupt handlers
  * Support for Linux-native module signatures
  * Complete SSL/TLS and Crypto API callable from other kernel module(s)
  * Support for LTS kernel lines: 3.16, 4.4, 4.9, 5.4, 5.10

Compatibility Layer Additions

  * Ports
      * Add support for libssh2
      * Add support for pyOpenSSL
      * Add support for libimobiledevice
      * Add support for rsyslog
      * Add support for OpenSSH 8.5p1
      * Add support for Python 3.8.5
  * API/Structs Added
      * ERR_lib_error_string
      * EVP_blake2
      * wolfSSL_set_client_CA_list
      * wolfSSL_EVP_sha512_224
      * wolfSSL_EVP_sha512_256
      * wc_Sha512_224/2256Hash
      * wc_Sha512_224/256Hash
      * wc_InitSha512_224/256
      * wc_InitSha512_224/256_ex
      * wc_Sha512_224/256Update
      * wc_Sha512_224/256FinalRaw
      * wc_Sha512_224/256Final
      * wc_Sha512_224/256Free
      * wc_Sha512_224/256GetHash
      * wc_Sha512_224/256Copy
      * wc_Sha512_224/256SetFlags
      * wc_Sha512_224/256GetFlags
      * wc_Sha512_224/256Transform
      * EVP_MD_do_all and OBJ_NAME_do_all
      * EVP_shake128
      * EVP_shake256
      * SSL_CTX_set_num_tickets
      * SSL_CTX_get_num_tickets
      * SSL_CIPHER_get_auth_nid
      * SSL_CIPHER_get_cipher_nid
      * SSL_CIPHER_get_digest_nid
      * SSL_CIPHER_get_kx_nid
      * SSL_CIPHER_is_aead
      * SSL_CTX_set_msg_callback
      * a2i_IPADDRESS
      * GENERAL_NAME_print
      * X509_VERIFY_PARAM_set1_ip
      * EVP_CIPHER_CTX_set_iv_length
      * PEM_read_bio_RSA_PUBKEY
      * i2t_ASN1_OBJECT
      * DH_set_length
      * Set_tlsext_max_fragment_length
      * AUTHORITY_iNFO_ACCESS_free
      * EVP_PBE_scrypt
      * ASN1_R_HEADER_TOO_LONG
      * ERR_LIB
      * X509_get_default_cert_file/file_env/dir/dir_env() stubs
      * SSL_get_read_ahead/SSL_set_read_ahead()
      * SSL_SESSION_has_ticket()
      * SSL_SESSION_get_ticket_lifetime_hint()
      * DIST_POINT_new
      * DIST_POINT_free
      * DIST_POINTS_free
      * CRL_DIST_POINTS_free
      * sk_DIST_POINT_push
      * sk_DIST_POINT_value
      * sk_DIST_POINT_num
      * sk_DIST_POINT_pop_free
      * sk_DIST_POINT_free
      * X509_get_extension_flags
      * X509_get_key_usage
      * X509_get_extended_key_usage
      * ASN1_TIME_to_tm
      * ASN1_TIME_diff
      * PEM_read_X509_REQ
      * ERR_load_ERR_strings
      * BIO_ssl_shutdown
      * BIO_get_ssl
      * BIO_new_ssl_connect
      * BIO_set_conn_hostname
      * NID_pkcs9_contentType

Misc.

  * KCAPI: add support for using libkcapi for crypto (Linux Kernel)
  * Configure option for --with-max-rsa-bits= and --with-max-ecc-bits=
  * SP ARM Thumb support for Keil and performance improvements
  * Add support for WOLFSSL_VERIFY_POST_HANDSHAKE verify mode
  * PKCS #11: support static linking with PKCS #11 library
    --enable-pkcs11=static LIBS=-l
  * Add build option --enable-wolfclu for use with wolfCLU product
  * Add support for X9.42 header i.e “BEGIN X9.42 DH PARAMETERS”
  * Add --enable-altcertchains for configuring wolfSSL with alternate
    certificate chains feature enabled
  * Add public API wc_RsaKeyToPublicDer_ex to allow getting RSA public key
    without ASN.1 header (can return only seq + n + e)
  * Add SNI and TLSx options to CMake build

Fixes
PORT Fixes

  * Add return value checking for FREESCALE_RNGA
  * Fix MMCAU_SHA256 type warnings
  * Fixes for building with Microchip XC32 and ATECC

Math Library Fixes

  * TFM check that the modulus length is valid for fixed data array size
  * TFM fp_submod_ct fix check for greater
  * Check return value of mp_grow in mp_mod_2d
  * Fix for ECC point multiply to error out on large multipliers
  * SP ECC error on multiplier larger than curve order

TLS 1.3

  * TLS1.3 sanity check for cases where a private key is larger than the configured maximum
  * Fix early data max size handling in TLS v1.3
  * Fixes for PK callbacks with TLS v1.3
  * Check min downgrade when no extensions are sent with the ServerHello

Misc.

   * Previously wolfSSL enum values were used as NID’s. Now only the
     compatibility layer NID enums are the NID values:
      * CTC_SHAwDSA -> NID_dsaWithSHA1
      * CTC_SHA256wDSA -> NID_dsa_with_SHA256
      * CTC_MD2wRSA -> NID_md2WithRSAEncryption
      * CTC_MD5wRSA -> NID_md5WithRSAEncryption
      * CTC_SHAwRSA -> NID_sha1WithRSAEncryption
      * CTC_SHA224wRSA -> NID_sha224WithRSAEncryption
      * CTC_SHA256wRSA -> NID_sha256WithRSAEncryption
      * CTC_SHA384wRSA -> NID_sha384WithRSAEncryption
      * CTC_SHA512wRSA -> NID_sha512WithRSAEncryption
      * CTC_SHA3_224wRSA -> NID_RSA_SHA3_224
      * CTC_SHA3_256wRSA -> NID_RSA_SHA3_256
      * CTC_SHA3_384wRSA -> NID_RSA_SHA3_384
      * CTC_SHA3_512wRSA -> NID_RSA_SHA3_512
      * CTC_SHAwECDSA -> NID_ecdsa_with_SHA1
      * CTC_SHA224wECDSA -> NID_ecdsa_with_SHA224
      * CTC_SHA256wECDSA -> NID_ecdsa_with_SHA256
      * CTC_SHA384wECDSA -> NID_ecdsa_with_SHA384
      * CTC_SHA512wECDSA -> NID_ecdsa_with_SHA512
      * CTC_SHA3_224wECDSA -> NID_ecdsa_with_SHA3_224
      * CTC_SHA3_256wECDSA -> NID_ecdsa_with_SHA3_256
      * CTC_SHA3_384wECDSA -> NID_ecdsa_with_SHA3_384
      * CTC_SHA3_512wECDSA -> NID_ecdsa_with_SHA3_512
      * DSAk -> NID_dsa
      * RSAk -> NID_rsaEncryption
      * ECDSAk -> NID_X9_62_id_ecPublicKey
      * BASIC_CA_OID -> NID_basic_constraints
      * ALT_NAMES_OID -> NID_subject_alt_name
      * CRL_DIST_OID -> NID_crl_distribution_points
      * AUTH_INFO_OID -> NID_info_access
      * AUTH_KEY_OID -> NID_authority_key_identifier
      * SUBJ_KEY_OID -> NID_subject_key_identifier
      * INHIBIT_ANY_OID -> NID_inhibit_any_policy
   * Fix for DES IV size used with FIPSv2
   * Fix signed comparison issue with serialSz
   * Fix missing CBIOSend and properly guard hmac in DupSSL()
   * Fix calculation of length of encoding in ssl.c
   * Fix encoding to check proper length in asn.c
   * Fix for wc_ecc_ctx_free and heap hint
   * Fix for debug messages with AF_ALG build
   * Fix for static memory with bucket size matching.
   * Fixes for SRP with heap hint.
   * Fixes for CAAM build macros and spelling for Keil build
   * Sniffer fix for possible math issue around 64-bit pointer and 32-bit unsigned int
   * Fix for sniffer TCP sequence rollover
   * wolfSSL_PEM_write_bio_PUBKEY to write only the public part
   * Fix for sending only supported groups in TLS extension
   * Fix for sniffer to better handle spurious retransmission edge case
   * SSL_set_alpn_protos and SSL_CTX_set_alpn_protos now returns 0 on
     successFixes issue with SSL_CTX_set1_curves_list and SSL_set1_curves_list
     not checking the last character of the names variable provided, non-0 on
     failure to better match expected return values
   * Fixes and improvements for crypto callbacks with TLS (mutual auth)
   * Fix for bad memory_mutex lock on static memory cleanup
   * Zero terminate name constraints strings when parsing certificates
   * Fix for verifying a certificate when multiple permitted name constraints are used
   * Fix typo in ifdef for HAVE_ED448
   * Fix typos in comments in SHA512
   * Add sanity check on buffer size with ED25519 key decode
   * Sanity check on PKCS7 stream amount read
   * PKCS7 fix for double free on error case and sanity check on set serial number
   * Sanity check on PKCS7 input size wc_PKCS7_ParseSignerInfo
   * Forgive a DTLS session trying to send too much at once

Improvements/Optimizations
Build Options and Warnings

   * Rework of RC4 disable by default and depreciation
   * wolfSSL as a Zephyr module (without setup.sh)
   * Add include config.h to bio.c
   * Support for PKCS7 without AES CBC.
   * Fixes for building without AES CBC
   * Added WOLFSSL_DH_EXTRA to --enable-all and --enable-sniffer
   * Add a CMake option to build wolfcrypt test and bench code as libraries
   * GCC makefile: allow overriding and provide more flexibility

Math Libraries

   * Improve performance of fp_submod_ct() and fp_addmod_ct()
   * Improve performance of sp_submod_ct() and sp_addmod_ct()
   * SP int, handle even modulus with exponentiation

Misc.

   * Cleanups for Arduino examples and memory documentation
   * Refactor hex char to byte conversions
   * Added GCC-ARM TLS server example
   * Improvements to session locking to allow per-row
   * Improved sniffer statistics and documentation
   * EVP key support for heap hint and crypto callbacks
   * Reduced stack size for dh_generation_test and Curve ASN functions
   * Espressif README Syntax / keyword highlighting / clarifications
   * AARCH64 SHA512: implementation using crypto instructions added
   * wc_RsaPSS_CheckPadding_ex2 added for use with HEAP hint
   * wc_AesKeyWrap_ex and wc_AesKeyUnWrap_ex bound checks on input and output sizes
   * Add additional error handling to wolfSSL_BIO_get_len
   * Add code to use popen and the command 'host', useful with qemu
   * Adjustment to subject alt names order with compatibility layer to better match expected order
   * Reduce BIO compatibility layer verbosity
   * Set a default upper bound on error queue size with compatibility layer
   * WOLFSSL_CRL_ALLOW_MISSING_CDP macro for Skip CRL verification in case no CDP in peer cert
   * Fixes for scan-build LLVM-13 and expanded coverage
   * Increase the default DTLS_MTU_ADDITIONAL_READ_BUFFER and make it adjustable
2021-11-06 04:37:24 +00:00
bsiegert
41533c256a Revbump all Go packages after go117 update 2021-11-05 20:02:39 +00:00
wiz
83ce3ac3c4 heimdal: add upstream bug report link 2021-11-05 09:14:28 +00:00
adam
6e4892d6c0 heimdal: fix build race condition 2021-11-04 18:21:20 +00:00
adam
641138b475 libgpg-error: updated to 1.43
Noteworthy changes in version 1.43 (2021-11-03) [C32/A32/R1]
-----------------------------------------------

 * Fix for building against GNU libc 2.34.  [T5547]

 * Fix build problems on macOS.  [T5440,T5610]

 * Fix gpgrt-config problems.  [T5381,T5595]

 * Fix gpgrt_free for legacy platforms.  [448bf7b01cad]

 * Fix truncation of error message in the middle of a character.
   [T5048]

 * Fix the --disable-threads configure options.  [T5495]

 * Improve lock-obj generation for cross-builds [99ae862a96a5]

 * Improve cross-builds. [T5365]

 * Improve gpgrt_wait_processes.  [T5381]

 * Allow config files to read values from the Windows Registry and
   from envvars.  [b1790f4cc71f]

 * Update the Russian and Czech translations.
2021-11-03 20:53:16 +00:00
adam
86e7f89fee py-OpenSSL: updated to 21.0.0
21.0.0

Backward-incompatible changes:
- The minimum ``cryptography`` version is now 3.3.
- Drop support for Python 3.5

Changes:
- Raise an error when an invalid ALPN value is set.
- Added ``OpenSSL.SSL.Context.set_min_proto_version`` and ``OpenSSL.SSL.Context.set_max_proto_version``
  to set the minimum and maximum supported TLS version
- Updated ``to_cryptography`` and ``from_cryptography`` methods to support an upcoming release of ``cryptography`` without raising deprecation warnings.
2021-11-02 09:45:53 +00:00
wiz
a00699d5c3 tor-browser: update to 10.5.10.
Translations Update
    Revert bug 40049 [torbutton]
    Bug 40051: Implement 2021 Year End Campaign look in about:tor
2021-11-01 21:41:59 +00:00
wiz
d0f535bf4f polkit: update to 0.120.
--------------
polkit 0.120
--------------

Changes since polkit 0.119:

 Inigo Martinez:
    transition from Intltool to gettext

 Simon McVittie:
    several tarball, meson and pipeline fixups

 Hugo Carvalho:
    Portuguese translation

 Sergiu Bivol:
    Romanian translation
2021-11-01 10:20:48 +00:00
adam
fde0e97518 py-authlib: updated to 0.15.5
Version 0.15.5
Make Authlib compatible with latest httpx
Make Authlib compatible with latest werkzeug
Allow customize RFC7523 alg value
2021-10-28 19:51:53 +00:00
adam
fc70ef0746 py-certifi: change LICENSE to mpl-2.0 2021-10-26 12:38:18 +00:00
nia
3df0f20e22 security: Replace RMD160 checksums with BLAKE2s checksums
All checksums have been double-checked against existing RMD160 and
SHA512 hashes

Unfetchable distfiles (fetched conditionally?):
./security/cyrus-sasl/distinfo cyrus-sasl-dedad73e5e7a75d01a5f3d5a6702ab8ccd2ff40d.patch.v2
2021-10-26 11:16:56 +00:00
schmonz
7b51ca7785 Update to 5.60. From the changelog:
* New features
  - New 'sessionResume' service-level option to allow
    or disallow session resumption
  - Added support for the new SSL_set_options() values.
  - Download fresh ca-certs.pem for each new release.
* Bugfixes
  - Fixed 'redirect' with 'protocol'.  This combination is
    not supported by 'smtp', 'pop3' and 'imap' protocols.
  - Enforced minimum WIN32 log window size.
  - Fixed support for password-protected private keys with
    OpenSSL 3.0 (thx to Dmitry Belyavskiy).
  - Added missing TLS options supported in OpenSSL 1.1.1k.
2021-10-24 21:33:48 +00:00
wen
44917486d9 Update to 0.32
Upstream changes:
0.32    2021-09-14
    - Add ->get_pattern and ->set_pattern.
        - https://github.com/shlomif/String-Random/pull/5
        - Thanks to https://github.com/ology
2021-10-24 08:18:14 +00:00
ryoon
3a75b8bf75 mozilla-rootcerts-openssl: Generate replaced PLIST automatically 2021-10-22 16:56:39 +00:00
wiz
6c40cfe439 heimdal: fix su -> ksu name change with kerberos-prefix-cmds option
Bump PKGREVISION, since it's on by default.
2021-10-22 07:31:54 +00:00
wiz
6fa127e9f4 heimdal: fix fetch stage 2021-10-21 09:02:25 +00:00
wiz
d6aa7c0da6 heimdal: remove hcrypto PLIST_VAR
It was always set to yes.
2021-10-21 07:51:41 +00:00
wiz
b5d6d92ccd *: recursive bump for heimdal 7.7.0
its buildlink3.mk now includes openssl's buildlink3.mk
2021-10-21 07:46:31 +00:00
wiz
2f3ae03ef6 heimdal: update to 7.7.0.
This version supports openssl 1.1, so re-enable it.

Release Notes - Heimdal - Version Heimdal 7.7

 Bug fixes

 - PKCS#11 hcrypto back-end
   . initialize the p11_module_load function list
   . verify that not only is a mechanism present but that its mechanism
     info states that it offers the required encryption, decryption or
     digest services
 - krb5:
   . Starting with 7.6, Heimdal permitted requesting authenticated
     anonymous tickets.  However, it did not verify that a KDC in fact
     returned an anonymous ticket when one was requested.
   - Cease setting the KDCOption reaquest_anonymous flag when issuing
     S4UProxy (constrained delegation) TGS requests.
   . when the Win2K PKINIT compatibility option is set, do
     not require krbtgt otherName to match when validating KDC
     certificate.
   . set PKINIT_BTMM flag per Apple implementation
   . use memset_s() instead of memset()
 - kdc:
   . When generating KRB5SignedPath in the AS, use the reply client name
     rather than the one from the request, so validation will work
     correctly in the TGS.
   . allow checksum of PA-FOR-USER to be HMAC_MD5.  Even if tgt used
     an enctype with a different checksum.  Per [MS-SFU] 2.2.1
     PA-FOR-USER the checksum is always HMAC_MD5, and that's what
     Windows and MIT clients send.

     In heimdal both the client and kdc use instead the
     checksum of the tgt, and therefore work with each other
     but Windows and MIT clients fail against heimdal KDC.

     Both Windows and MIT KDCs would allow any keyed checksum
     to be used so Heimdal client interoperates with them.

     Change Heimdal KDC to allow HMAC_MD5 even for non RC4
     based tgt in order to support per-spec clients.
   . use memset_s() instead of memset().
   - Detect Heimdal 1.0 through 7.6 clients that issue S4UProxy
     (constrained delegation) TGS Requests with the request
     anonymous flag set.  These requests will be treated as
     S4UProxy requests and not anonymous requests.
 - HDB:
   . Set SQLite3 backend default page size to 8KB.
   . Add hdb_set_sync() method
 - kadmind:
   . disable HDB sync during database load avoiding unnecessary disk i/o.
 - ipropd:
   . disable HDB sync during receive_everything.  Doing an fsync
     per-record when receiving the complete HDB is a performance
     disaster.  Among other things, if the HDB is very large, then
     one slave receving a full HDB can cause other slaves to timeout
     and, if HDB write activity is high enough to cause iprop log
     truncation, then also need full syncs, which leads to a cycle of
     full syncs for all slaves until HDB write activity drops.
     Allowing the iprop log to be larger helps, but improving
     receive_everything() performance helps even more.
 - kinit:
   . Anonymous PKINIT tickets discard the realm information used
     to locate the issuing AS. Store the issuing realm in the
     credentials cache in order to locate a KDC which can renew them.
   . Do not leak the result of krb5_cc_get_config() when determining
     anonymous PKINIT start realm.
  - klist:
    . Show transited-policy-checked, ok-as-delegate and anonymous
      flags when listing credentials.
 - tests:
   . Regenerate certs so that they expire before the 2038 armageddon
     so the test suite will pass on 32-bit operating systems until the
     underlying issues can be resolved.
 - Solaris:
   . Define _STDC_C11_BCI for memset_s prototype
 - build tooling:
   . Convert from python 2 to python 3
 - documentation
   . rename verify-password to verify-password-quality
   . hprop default mode is encrypt
   . kadmind "all" permission does not include "get-keys"
   . verify-password-quality might not be stateless

Release Notes - Heimdal - Version Heimdal 7.6

 Security

 - CVE-2018-16860 Heimdal KDC: Reject PA-S4U2Self with unkeyed checksum

    When the Heimdal KDC checks the checksum that is placed on the
    S4U2Self packet by the server to protect the requested principal
    against modification, it does not confirm that the checksum
    algorithm that protects the user name (principal) in the request
    is keyed.  This allows a man-in-the-middle attacker who can
    intercept the request to the KDC to modify the packet by replacing
    the user name (principal) in the request with any desired user
    name (principal) that exists in the KDC and replace the checksum
    protecting that name with a CRC32 checksum (which requires no
    prior knowledge to compute).

    This would allow a S4U2Self ticket requested on behalf of user
    name (principal) user@EXAMPLE.COM to any service to be changed
    to a S4U2Self ticket with a user name (principal) of
    Administrator@EXAMPLE.COM. This ticket would then contain the
    PAC of the modified user name (principal).

 - CVE-2019-12098, client-only:

    RFC8062 Section 7 requires verification of the PA-PKINIT-KX key excahnge
    when anonymous PKINIT is used.  Failure to do so can permit an active
    attacker to become a man-in-the-middle.

 Bug fixes

 - Happy eyeballs: Don't wait for responses from known-unreachable KDCs.
 - kdc: check return copy_Realm, copy_PrincipalName, copy_EncryptionKey
 - kinit:
   . cleanup temporary ccaches
   . see man page for "kinit --anonymous" command line syntax change
 - kdc: Make anonymous AS-requests more RFC8062-compliant.
 - Updated expired test certificates
 - Solaris:
   . PKCS#11 hcrypto backend broken since 7.0.1
   . Building with Sun Pro C

 Features

 - kuser: support authenticated anonymous AS-REQs in kinit
 - kdc: support for anonymous TGS-REQs
 - kgetcred support for anonymous service tickets
 - Support builds with OpenSSL 1.1.1

Release Notes - Heimdal - Version Heimdal 7.5

 Security

 - Fix CVE-2017-17439, which is a remote denial of service
   vulnerability:

     In Heimdal 7.1 through 7.4, remote unauthenticated attackers
     are able to crash the KDC by sending a crafted UDP packet
     containing empty data fields for client name or realm.

 Bug fixes

 - Handle long input lines when reloading database dumps.

 - In pre-forked mode (default on Unix), correctly clear
   the process ids of exited children, allowing new child processes
   to replace the old.

 - Fixed incorrect KDC response when no-cross realm TGT exists,
   allowing client requests to fail quickly rather than time
   out after trying to get a correct answer from each KDC.

Release Notes - Heimdal - Version Heimdal 7.4

 Security

 - Fix CVE-2017-11103: Orpheus' Lyre KDC-REP service name validation

   This is a critical vulnerability.

   In _krb5_extract_ticket() the KDC-REP service name must be obtained from
   encrypted version stored in 'enc_part' instead of the unencrypted version
   stored in 'ticket'.  Use of the unecrypted version provides an
   opportunity for successful server impersonation and other attacks.

   Identified by Jeffrey Altman, Viktor Duchovni and Nico Williams.

   See https://www.orpheus-lyre.info/ for more details.

Release Notes - Heimdal - Version Heimdal 7.3

 Security

 - Fix transit path validation.  Commit f469fc6 (2010-10-02) inadvertently
   caused the previous hop realm to not be added to the transit path
   of issued tickets.  This may, in some cases, enable bypass of capath
   policy in Heimdal versions 1.5 through 7.2.

   Note, this may break sites that rely on the bug.  With the bug some
   incomplete [capaths] worked, that should not have.  These may now break
   authentication in some cross-realm configurations.
   (CVE-2017-6594)

Release Notes - Heimdal - Version Heimdal 7.2

 Bug fixes
 - Portability improvements
 - More strict parsing of encoded URI components in HTTP KDC
 - Fixed memory leak in malloc error recovery in NTLM GSSAPI mechanism
 - Avoid overly specific CPU info in krb5-config in aid of reproducible builds
 - Don't do AFS string-to-key tests when feature is disabled
 - Skip mdb_stat test when the command is not available
 - Windows: update SHA2 timestamp server
 - hdb: add missing export hdb_generate_key_set_password_with_ks_tuple
 - Fix signature of hdb_generate_key_set_password()
 - Windows: enable KX509 support in the KDC
 - kdc: fix kx509 service principal match
 - iprop: handle case where master sends nothing new
 - ipropd-slave: fix incorrect error codes
 - Allow choice of sqlite for HDB pref
 - check-iprop: don't fail to kill daemons
 - roken: pidfile -> rk_pidfile
 - kdc: _kdc_do_kx509 fix use after free error
 - Do not detect x32 as 64-bit platform.
 - No sys/ttydefaults.h on CYGWIN
 - Fix check-iprop races
 - roken_detach_prep() close pipe

Release Notes - Heimdal - Version Heimdal 7.1

 Security

 - kx509 realm-chopping security bug
 - non-authorization of alias additions/removals in kadmind
   (CVE-2016-2400)

 Feature

 - iprop has been revamped to fix a number of race conditions that could
   lead to inconsistent replication
 - Hierarchical capath support
 - AES Encryption with HMAC-SHA2 for Kerberos 5
   draft-ietf-kitten-aes-cts-hmac-sha2-11
 - hcrypto is now thread safe on all platforms
 - libhcrypto has new backends: CNG (Windows), PKCS#11 (mainly for
   Solaris), and OpenSSL.  OpenSSL is now a first-class libhcrypto backend.
   OpenSSL 1.0.x and 1.1 are both supported. AES-NI used when supported by
   backend
 - HDB now supports LMDB
 - Thread support on Windows
 - RFC 6113  Generalized Framework for Kerberos Pre-Authentication (FAST)
 - New GSS APIs:
   . gss_localname
 - Allow setting what encryption types a principal should have with
   [kadmin] default_key_rules, see krb5.conf manpage for more info
 - Unify libhcrypto with LTC (libtomcrypto)
 - asn1_compile 64-bit INTEGER functionality
 - HDB key history support including --keepold kadmin password option
 - Improved cross-realm key rollover safety
 - New krb5_kuserok() and krb5_aname_to_localname() plug-in interfaces
 - Improved MIT compatibility
   . kadm5 API
   . Migration from MIT KDB via "mitdb" HDB backend
   . Capable of writing the HDB in MIT dump format
 - Improved Active Directory interoperability
   . Enctype selection issues for PAC and other authz-data signatures
   . Cross realm key rollover (kvno 0)
 - New [kdc] enctype negotiation configuration:
   . tgt-use-strongest-session-key
   . svc-use-strongest-session-key
   . preauth-use-strongest-session-key
   . use-strongest-server-key
 - The KDC process now uses a multi-process model improving
   resiliency and performance
 - Allow batch-mode kinit with password file
 - SIGINFO support added to kinit cmd
 - New kx509 configuration options:
   . kx509_ca
   . kca_service
   . kx509_include_pkinit_san
   . kx509_template
 - Improved Heimdal library/plugin version safety
 - Name canonicalization
   . DNS resolver searchlist
   . Improved referral support
   . Support host:port host-based services
 - Pluggable libheimbase interface for DBs
 - Improve IPv6 Support
 - LDAP
   . Bind DN and password
   . Start TLS
 - klist --json
 - DIR credential cache type
 - Updated upstream SQLite and libedit
 - Removed legacy applications: ftp, kx, login, popper, push, rcp, rsh,
   telnet, xnlock
 - Completely remove RAND_egd support
 - Moved kadmin and ktutil to /usr/bin
 - Stricter fcache checks (see fcache_strict_checking krb5.conf setting)
    . use O_NOFOLLOW
    . don't follow symlinks
    . require cache files to be owned by the user
    . require sensible permissions (not group/other readable)
 - Implemented gss_store_cred()
 - Many more

 Bug fixes
 - iprop has been revamped to fix a number of race conditions that could
   lead to data loss
 - Include non-loopback addresses assigned to loopback interfaces
   when requesting tickets with addresses
 - KDC 1DES session key selection (for AFS rxkad-k5 compatibility)
 - Keytab file descriptor and lock leak
 - Credential cache corruption bugs
   (NOTE: The FILE ccache is still not entirely safe due to the
   fundamentally unsafe design of POSIX file locking)
 - gss_pseudo_random() interop bug
 - Plugins are now preferentially loaded from the run-time install tree
 - Reauthentication after password change in init_creds_password
 - Memory leak in the client kadmin library
 - TGS client requests renewable/forwardable/proxiable when possible
 - Locking issues in DB1 and DB3 HDB backends
 - Master HDB can remain locked while waiting for network I/O
 - Renewal/refresh logic when kinit is provided with a command
 - KDC handling of enterprise principals
 - Use correct bit for anon-pkinit
 - Many more
2021-10-21 07:46:02 +00:00
schmonz
9f076f9d11 Update to 3.4.1. From the changelog:
The shared library major version of libtls has been bumped to 22.

tls_connect(3) and friends now strip a trailing dot from servername.

This patch imports the missing scripts/wrap-compiler-for-flag-check
file, which was incorrectly causing compiler flags to not be used.

From the upstream LibreSSL changelog:

* New Features
  - Added support for OpenSSL 1.1.1 TLSv1.3 APIs.
  - Enabled the new X.509 validator to allow verification of
    modern certificate chains.
* Portable Improvements
  - Added Universal Windows Platform (UWP) build support.
  - Fixed mingw-w64 builds on newer versions with missing SSP support.
* API and Documentation Enhancements
  - Added the following APIs from OpenSSL
    BN_bn2binpad BN_bn2lebinpad BN_lebin2bn EC_GROUP_get_curve
    EC_GROUP_order_bits EC_GROUP_set_curve
    EC_POINT_get_affine_coordinates
    EC_POINT_set_affine_coordinates
    EC_POINT_set_compressed_coordinates EVP_DigestSign
    EVP_DigestVerify SSL_CIPHER_find SSL_CTX_get0_privatekey
    SSL_CTX_get_max_early_data SSL_CTX_get_ssl_method
    SSL_CTX_set_ciphersuites SSL_CTX_set_max_early_data
    SSL_CTX_set_post_handshake_auth SSL_SESSION_get0_cipher
    SSL_SESSION_get_max_early_data SSL_SESSION_is_resumable
    SSL_SESSION_set_max_early_data SSL_get_early_data_status
    SSL_get_max_early_data SSL_read_early_data SSL_set0_rbio
    SSL_set_ciphersuites SSL_set_max_early_data
    SSL_set_post_handshake_auth
    SSL_set_psk_use_session_callback
    SSL_verify_client_post_handshake SSL_write_early_data
  - Added AES-GCM constants from RFC 7714 for SRTP.
* Compatibility Changes
  - Implement flushing for TLSv1.3 handshakes behavior, needed for Apache.
  - Call the info callback on connect/accept exit in TLSv1.3,
    needed for p5-Net-SSLeay.
  - Default to using named curve parameter encoding from
    pre-OpenSSL 1.1.0, adding OPENSSL_EC_EXPLICIT_CURVE.
  - Do not ignore SSL_TLSEXT_ERR_FATAL from the ALPN callback.
* Testing and Proactive Security
  - Added additional state machine test coverage.
  - Improved integration test support with ruby/openssl tests.
  - Error codes and callback support in new X.509 validator made
    compatible with p5-Net_SSLeay tests.
* Internal Improvements
  - Numerous fixes and improvements to the new X.509 validator to
    ensure compatible error codes and callback support compatible
    with the legacy OpenSSL validator.
2021-10-18 14:33:04 +00:00
nia
4de68cf3bf acmesh: update to 3.0.1
Changes:

- We don't have bugs for the DST roots, but we add a new useful command "--set-default-chain" for the users to fix the chains fast.
- More dns apis are added.
- More deploy hooks are added.
- Normal bug fixes.
2021-10-17 09:02:46 +00:00
tm
6c21fadbe1 Update fail2ban to 0.11.2
ver. 0.11.2 (2020/11/23) - heal-the-world-with-security-tools

Fixes:
* [stability] prevent race condition - no ban if filter (backend) is continuously busy if
  too many messages will be found in log, e. g. initial scan of large log-file or journal (gh-2660)
* pyinotify-backend sporadically avoided initial scanning of log-file by start
* python 3.9 compatibility (and Travis CI support)
* restoring a large number (500+ depending on files ulimit) of current bans when using PyPy fixed
* manual ban is written to database, so can be restored by restart (gh-2647)
* `jail.conf`: don't specify `action` directly in jails (use `action_` or `banaction` instead)
* no mails-action added per default anymore (e. g. to allow that `action = %(action_mw)s` should be specified
  per jail or in default section in jail.local), closes gh-2357
* ensure we've unique action name per jail (also if parameter `actname` is not set but name deviates from standard name, gh-2686)
* don't use `%(banaction)s` interpolation because it can be complex value (containing `[...]` and/or quotes),
  so would bother the action interpolation
* fixed type conversion in config readers (take place after all interpolations get ready), that allows to
  specify typed parameters variable (as substitutions) as well as to supply it in other sections or as init parameters.
* `action.d/*-ipset*.conf`: several ipset actions fixed (no timeout per default anymore), so no discrepancy
  between ipset and fail2ban (removal from ipset will be managed by fail2ban only, gh-2703)
* `action.d/cloudflare.conf`: fixed `actionunban` (considering new-line chars and optionally real json-parsing
   with `jq`, gh-2140, gh-2656)
* `action.d/nftables.conf` (type=multiport only): fixed port range selector, replacing `:` with `-` (gh-2763)
* `action.d/firewallcmd-*.conf` (multiport only): fixed port range selector, replacing `:` with `-` (gh-2821)
* `action.d/bsd-ipfw.conf`: fixed selection of rule-no by large list or initial `lowest_rule_num` (gh-2836)
* `filter.d/common.conf`: avoid substitute of default values in related `lt_*` section, `__prefix_line`
  should be interpolated in definition section (inside the filter-config, gh-2650)
* `filter.d/dovecot.conf`:
  - add managesieve and submission support (gh-2795);
  - accept messages with more verbose logging (gh-2573);
* `filter.d/courier-smtp.conf`: prefregex extended to consider port in log-message (gh-2697)
* `filter.d/traefik-auth.conf`: filter extended with parameter mode (`normal`, `ddos`, `aggressive`) to handle
  the match of username differently (gh-2693):
  - `normal`: matches 401 with supplied username only
  - `ddos`: matches 401 without supplied username only
  - `aggressive`: matches 401 and any variant (with and without username)
* `filter.d/sshd.conf`: normalizing of user pattern in all RE's, allowing empty user (gh-2749)

New Features and Enhancements:
* fail2ban-regex:
  - speedup formatted output (bypass unneeded stats creation)
  - extended with prefregex statistic
  - more informative output for `datepattern` (e. g. set from filter) - pattern : description
* parsing of action in jail-configs considers space between action-names as separator also
  (previously only new-line was allowed), for example `action = a b` would specify 2 actions `a` and `b`
* new filter and jail for GitLab recognizing failed application logins (gh-2689)
* new filter and jail for Grafana recognizing failed application logins (gh-2855)
* new filter and jail for SoftEtherVPN recognizing failed application logins (gh-2723)
* `filter.d/guacamole.conf` extended with `logging` parameter to follow webapp-logging if it's configured (gh-2631)
* `filter.d/bitwarden.conf` enhanced to support syslog (gh-2778)
* introduced new prefix `{UNB}` for `datepattern` to disable word boundaries in regex;
* datetemplate: improved anchor detection for capturing groups `(^...)`;
* datepattern: improved handling with wrong recognized timestamps (timezones, no datepattern, etc)
  as well as some warnings signaling user about invalid pattern or zone (gh-2814):
  - filter gets mode in-operation, which gets activated if filter starts processing of new messages;
    in this mode a timestamp read from log-line that appeared recently (not an old line), deviating too much
    from now (up too 24h), will be considered as now (assuming a timezone issue), so could avoid unexpected
    bypass of failure (previously exceeding `findtime`);
  - better interaction with non-matching optional datepattern or invalid timestamps;
  - implements special datepattern `{NONE}` - allow to find failures totally without date-time in log messages,
    whereas filter will use now as timestamp (gh-2802)
* performance optimization of `datepattern` (better search algorithm in datedetector, especially for single template);
* fail2ban-client: extended to unban IP range(s) by subnet (CIDR/mask) or hostname (DNS), gh-2791;
* extended capturing of alternate tags in filter, allowing combine of multiple groups to single tuple token with new tag
  prefix `<F-TUPLE_`, that would combine value of `<F-V>` with all value of `<F-TUPLE_V?_n?>` tags (gh-2755)
2021-10-16 19:37:01 +00:00
schmonz
96ec4403de Fix build on OpenBSD with native LibreSSL with patches taken from
OpenBSD ports. NFCI on other platforms.
2021-10-16 14:02:56 +00:00
wiz
337b1e2813 mozilla-rootcerts-openssl: ... and update PLIST for 2.7 2021-10-15 13:06:11 +00:00
wiz
e13fd0a962 mozilla-rootcerts-openssl: adapt for mozilla-rootcerts change 2021-10-14 12:42:43 +00:00
wiz
e6e70fac03 mozilla-rootcerts: mention mozilla-rootcerts-openssl more prominently 2021-10-14 12:42:16 +00:00
wiz
867f88dfaf mozilla-rootcerts-openssl: bump for 20211014. 2021-10-14 12:40:10 +00:00
tron
3278c24f5e mozilla-rootcerts: Use date of the last change as the version number 2021-10-14 07:35:54 +00:00
tron
8cff9a6ea4 mozilla-rootcerts: update to 20211014 data 2021-10-14 07:21:43 +00:00
fcambus
6e99436bb8 minisign: update to 0.10.
- Minisign can be compiled with Zig instead of cmake+make+a C toolchain
- Minimal VERIFY_ONLY versions can be built again
- Prehashing is now enabled by default, regardless of the input size. Support
  for non-prehashed signatures will eventually be removed
- Legacy signatures can be rejected with the addition of the -H flag
2021-10-13 07:28:08 +00:00
adam
ac4deb91b9 gnupg2: updated to 2.2.32
Noteworthy changes in version 2.2.32 (2021-10-06)
-------------------------------------------------
* dirmngr: Fix Let's Encrypt certificate chain validation.
* dirmngr: New option --ignore-cert.
* gpg: Fix --list-packets for AEAD packets with unknown key.
2021-10-12 18:48:00 +00:00
adam
7379cf525f py-acme-tiny: updated to 5.0.1
Release 5.0.1
CHANGELOG
* Set interpreter to 'python3', so running `./acme-tiny.py --help` will use python3 by default
  NOTE: You can still run using python 2 by running `python acme-tiny.py --help`
2021-10-11 17:50:16 +00:00
adam
75e32e53cd py-gssapi: updated to 1.7.2
Release v1.7.2: George (Patch 2)

Fix broken symlink in GitHub release asset
Add wheels for macOS - both x86_64 and arm64
Fix distutil deprecation on Python 3.10 by using setuptools instead

Release v1.7.0: George

Support for running tests against Heimdal in CI
Add Kerberos specific GSS-API Extensions
Tidy up docs and turn warnings into errors
Support DCE IOV functions on macOS
2021-10-11 12:50:58 +00:00
adam
23bdbd2bbe py-paramiko: updated to 2.8.0
2.8.0 2021-10-09
[Feature] Add a prefetch keyword argument to SFTPClient.get/SFTPClient.getfo so users who need to skip SFTP prefetching are able to conditionally turn it off. Thanks to Github user @h3ll0r for the PR.
[Bug] Newer server-side key exchange algorithms not intended to use SHA1 (diffie-hellman-group14-sha256, diffie-hellman-group16-sha512) were incorrectly using SHA1 after all, due to a bug causing them to ignore the hash_algo class attribute. This has been corrected. Big thanks to @miverson for the report and to Benno Rice for the patch.
[Support] Remove leading whitespace from OpenSSH RSA test suite static key fixture, to conform better to spec. Credit: Alex Gaynor.
[Support] Add missing test suite fixtures directory to MANIFEST.in, reinstating the ability to run Paramiko’s tests from an sdist tarball. Thanks to Sandro Tosi for reporting the issue and to Blazej Michalik for the PR.
[Support]: Update our CI to catch issues with sdist generation, installation and testing.
[Support]: Administrivia overhaul, including but not limited to:
Migrate CI to CircleCI
Primary dev branch is now main (renamed)
Many README edits for clarity, modernization etc; including a bunch more (and consistent) status badges & unification with main project site index
PyPI page much more fleshed out (long_description is now filled in with the README; sidebar links expanded; etc)
flake8, pytest configs split out of setup.cfg into their own files
Invoke/invocations (used by maintainers/contributors) upgraded to modern versions
2021-10-11 09:34:52 +00:00
pin
85425e3c40 security/gpg-tui: update to 0.8.1
[0.8.1] - 2021-10-10

Added:
-Support changing the default file explorer

Changed:
-Include the manpage of configuration file in binary releases
-Allow dead code for event handler fields
-Apply clippy::needless_lifetimes suggestion
-Improve the Docker build and push workflow
-Merge the build and test steps in CI workflow
-Disable the terminal buffer check temporarily
-Disable the gpg info renderer test
-Bump dependencies

Fixed:
-Use implicit reference for state module tests
-Use a fixed line width for renderer tests

Removed:
-Remove the hardcoded last character from renderer tests
2021-10-11 08:58:06 +00:00
adam
111ca8bb1a py-acme py-certbot: updated to 1.20.0
1.20.0

Added

* Added `--no-reuse-key`. This remains the default behavior, but the flag may be
  useful to unset the `--reuse-key` option on existing certificates.

Fixed

* The certbot-dns-rfc2136 plugin in Certbot 1.19.0 inadvertently had an implicit
  dependency on `dnspython>=2.0`. This has been relaxed to `dnspython>=1.15.0`.
2021-10-10 18:43:11 +00:00
tnn
529b2aa5ad remove redundant do-install, CHECK_RELRO_SKIP, INSTALLATIONS_DIRS ...
... for packages where the go-module.mk defaults DTRT as-is.
2021-10-09 10:41:07 +00:00
adam
99a7be1e3a py-certifi: updated to 2021.10.8
2021.10.8:
Unknown changes
2021-10-09 08:44:53 +00:00
adam
4ac014248c py-cryptodome: updated to 3.11.0
3.11.0

Resolved issues

Especially for very small bit sizes, Crypto.Util.number.getPrime() was occasionally generating primes larger than given the bit size.
Correct typing annotations for PKCS115_Cipher.decrypt().
decrypt() method of a PKCS#1v1.5 cipher returned a bytearray instead of bytes.
External DSA domain parameters were accepted even when the modulus (p) was not prime. This affected Crypto.PublicKey.DSA.generate() and Crypto.PublicKey.DSA.construct().
2021-10-09 08:40:21 +00:00
bsiegert
a235babfa8 Revbump all Go packages after go117 update 2021-10-08 18:55:02 +00:00
nia
fa4b2904a6 security: Remove SHA1 hashes for distfiles 2021-10-07 14:53:40 +00:00
wiz
cb4c52cb8a tor-browser: update to 10.5.8.
Update Firefox to 78.15.0esr
Bug 40049: Add banner for VPN survey to about:tor
Bug 40363: Change bsaes git url
2021-10-07 12:17:10 +00:00
dsainty
e59ae4b9e0 Change the broken documentation link to just direct to the ZoneMinder home page 2021-10-05 12:24:27 +00:00
adam
680c424122 gnupg2: updated to 2.2.31
Noteworthy changes in version 2.2.31 (2021-09-15)
-------------------------------------------------
  * agent: Fix a regression in GET_PASSPHRASE.
  * scd: Fix an assertion failure in close_pcsc_reader.
  * scd: Add support for PC/SC in "GETINFO reader_list".

Noteworthy changes in version 2.2.30 (2021-08-26)
-------------------------------------------------
  * gpg: Extended gpg-check-pattern to support accept rules,
    conjunctions, and case-sensitive matching.
  * agent: New option --pinentry-formatted-passphrase.
  * agent: New option --check-sym-passphrase-pattern.
  * agent: Use the sysconfdir for the pattern files.
  * agent: Add "checkpin" inquiry for use by pinentry.
  * wkd: Fix client issue with leading or trailing spaces in
    user-ids.
  * Pass XDG_SESSION_TYPE and QT_QPA_PLATFORM envvars to Pinentry.
  * Under Windows use LOCAL_APPDATA for the socket directory.

Noteworthy changes in version 2.2.29 (2021-07-04)
-------------------------------------------------
  * Fix regression in 2.2.28 for Yubikey NEO.
  * Change the default keyserver to keyserver.ubuntu.com.  This is a
    temporary change due to the shutdown of the SKS keyserver pools.
  * gpg: Let --fetch-key return an exit code on failure.
  * dirmngr: Fix regression in KS_GET for mail address pattern.
  * Add fallback in case the Windows console can't cope with Unicode.
  * Improve initialization of SPR532 in the CCID driver and make the
    driver more robust.
  * Make test suite work in presence of a broken Libgcrypt
    installation.
  * Make configure option --disable-ldap work again.


Noteworthy changes in version 2.2.28 (2021-06-10)
-------------------------------------------------
  * gpg: Auto import keys specified with --trusted-keys.
  * gpg: Allow decryption w/o public key but with correct card
    inserted.
  * gpg: Allow fingerprint based lookup with --locate-external-key.
  * gpg: Lookup a missing public key of the current card via LDAP.
  * gpg: New option --force-sign-key.
  * gpg: Use a more descriptive password prompt for symmetric
    decryption.
  * gpg: Do not use the self-sigs-only option for LDAP keyserver
    imports.
  * gpg: Keep temp files when opening images via xdg-open.
  * gpg: Fix mailbox based search via AKL keyserver method.
  * gpg: Fix sending an OpenPGP key with umlaut to an LDAP keyserver.
  * gpg: Allow ECDH with a smartcard returning only the x-coordinate.
  * gpgsm: New option --ldapserver as an alias for --keyserver.  Note
    that configuring servers in gpgsm and gpg is deprecated; please
    use the dirmngr configuration options.
  * gpgsm: Support AES-GCM decryption.
  * gpgsm: Support decryption of password protected files.
  * gpgsm: Lock keyboxes also during a search to fix lockups on
    Windows.
  * agent: Skip unknown unknown ssh curves seen on
    cards.
  * scdaemon: New option --pcsc-shared.
  * scdaemon: Backport PKCS#15 card support from GnuPG 2.3
  * scdaemon: Fix CCID driver for SCM SPR332/SPR532.
  * scdaemon: Fix possible PC/SC removed card problem.
  * scdaemon: Fix unblock PIN by a Reset Code with KDF.
  * scdaemon: Support compressed points.
  * scdaemon: Prettify S/N for Yubikeys and fix reading for early
    Yubikey 5 tokens.
  * dirmngr: New option --ldapserver to avoid the need for the
    separate dirmngr_ldapservers.conf file.
  * dirmngr: The dirmngr_ldap wrapper has been rewritten to properly
    support ldap-over-tls and starttls for X.509 certificates and
    CRLs.
  * dirmngr: OpenPGP LDAP keyservers may now also be configured using
    the same syntax as used for X.509 and CRL LDAP servers.  This
    avoids the former cumbersome quoting rules and adds a flexible set
    of flags to control the connection.
  * dirmngr: The "ldaps" scheme of an OpenPGP keyserver URL is now
    interpreted as ldap-with-starttls on port 389.  To use the
    non-standardized ldap-over-tls the new LDAP configuration method
    of the new attribute "gpgNtds" needs to be used.
  * dirmngr: Return the fingerprint as search result also for LDAP
    OpenPGP keyservers.  This requires the modernized LDAP schema.
  * dirmngr: An OpenPGP LDAP search by a mailbox now ignores revoked
    keys.
  * gpgconf: Make runtime changes with non-default homedir work.
  * gpgconf: Do not translate an empty string to the PO file's meta
    data.
  * gpgconf: Fix argv overflow if --homedir is used.
  * gpgconf: Return a new pseudo option "compliance_de_vs".
  * gpgtar: Fix file size computation under Windows.
  * Full Unicode support for the Windows command line.
  * Fix problem with Windows Job objects and auto start of our
    daemons.
  * i18n: In German always use "Passwort" instead of "Passphrase" in
    prompts.
2021-10-05 12:14:28 +00:00
nia
2a87e74329 botan-devel: Fix PLIST on non-x86. 2021-10-01 12:13:08 +00:00
nia
7449ba64ed gnupg: asm is unsafe for MKPIE on i386 2021-09-30 11:17:10 +00:00
schmonz
91b32785f5 Update to 1.1 to fix build with pkgsrc zig. From the changelog:
- Update to Zig 0.8.0
- Fix password length option
- Updates for Zig 0.7.0
- Add password option
- Handle empty/malformed files
- Add contrib folder and script that prepares wordlists
- Replace default wordlist
  The previous wordlist was derived from an English dictionary from
  LibreOffice. It contained slurs and other hurtful words. It is
  replaced with the EFF long wordlist. I apologise for including the
  LibreOffice dictionary.
- Clean up options parsing
2021-09-29 19:35:55 +00:00
adam
5e7c36d9d2 revbump for boost-libs 2021-09-29 19:00:02 +00:00
adam
e00ba7c71d py-cryptodome: updated to 3.10.4
3.10.4 (25 September 2021)

Resolved issues

Output of Crypto.Util.number.long_to_bytes() was not always a multiple of blocksize.


3.10.3 (22 September 2021)

Resolved issues

Fixed symbol conflict between different versions of libgmp.
Improved robustness of PKCS#1v1.5 decryption against timing attacks.
Fixed segmentation faults on Apple M1 and other Aarch64 SoCs, when the GMP library add accessed via ctypes. Do not use GMP's own sscanf and snprintf routines: instead, use simpler conversion routines.
Workaround for cffi calling ctypes.util.find_library(), which invokes gcc and ld on Linux, considerably slowing down all imports. On certain configurations, that may also leave temporary files behind.
Fix RSAES-OAEP, as it didn't always fail when zero padding was incorrect.

New features

Added support for SHA-3 hash functions to HMAC.
2021-09-29 09:38:06 +00:00
wiz
33dc5de577 *: recursive bump for vala 0.54 2021-09-29 09:10:30 +00:00
jperkin
e9f20c268e clamav: Support GCC >= 10. 2021-09-28 12:59:40 +00:00
ryoon
df33a8e1bb apg: Pass LDFLAGS to fix RELRO build. Bump PKGREVISION 2021-09-28 09:20:34 +00:00
adam
bdb48af815 py-josepy: updated to 1.10.0
1.10.0 (2021-09-27)
-------------------
* josepy is now compliant with PEP-561: type checkers will fetch types from the inline
  types annotations when josepy is installed as a dependency in a Python project.
* Added a `field` function to assist in adding type annotations for Fields in classes.
  If the field function is used to define a `Field` in a `JSONObjectWithFields` based
  class without a type annotation, an error will be raised.
* josepy's tests can no longer be imported under the name josepy, however, they are still
  included in the package and you can run them by installing josepy with "tests" extras and
  running `python -m pytest`.

1.9.0 (2021-09-09)
------------------
* Removed pytest-cache testing dependency.
* Fixed a bug that sometimes caused incorrect padding to be used when
  serializing Elliptic Curve keys as JSON Web Keys.
2021-09-28 05:33:57 +00:00
wiz
c948ae1fd3 openssh: update to 8.8p1.
Changes:
One year of development, details at
https://www.openssh.com/releasenotes.html
2021-09-26 15:37:51 +00:00
nia
ee1c2e4700 pam-u2f: security update to 1.1.1
* Version 1.1.1 (released 2021-05-19)
** Fix an issue where PIN authentication could be bypassed (CVE-2021-31924).
** Fix an issue with nodetect and non-resident credentials.
** Fix build issues with musl libc.
** Add support for self-attestation in pamu2fcfg.
** Fix minor bugs found by fuzzing.
2021-09-22 14:22:45 +00:00
nia
714e11c6dc botan-devel: work around broken CPU arch detection on arm 2021-09-20 09:09:21 +00:00
taca
1d3feb8154 security/ruby-rex-exploitation: update to 0.1.28
0.1.28 (2021-02-11)

* Land #28, Update for ruby 3 support
2021-09-19 17:19:13 +00:00
taca
9129244208 security/ruby-rex-bin_tools: update to 0.1.8
0.1.8 (2020-11-30)

* Land #6, Update gemspec
2021-09-19 17:17:49 +00:00
taca
e74712f1e0 security/ruby-rex-encoder: update to 0.1.6
0.1.6 (2020-11-30)

* Land #3, Update gemspec
2021-09-19 17:15:42 +00:00
taca
7b2ac739f6 security/ruby-rex-core: update to 0.1.17
* Land #11, Remove tainted calls
2021-09-19 17:13:46 +00:00
taca
e85a14a45f security/ruby-rex-powershell: update to 0.1.93
0.1.91 (2021-04-23)

* Land #30, Implement the rc4 wrapper

0.1.92 (2021-07-09)

* Land #31, add method to obfuscate string literals
* Land #32, fix unit tests

0.1.93 (2021-07-19)

* Land #33, Add github actions for tests
* Land #35, Add W^X powershell payload templates
2021-09-19 17:12:30 +00:00
taca
7be9a04d3c security/ruby-rex-socket: update to 0.1.33
0.1.30 (2021-03-25)

* Land #31, Consistently return nil as the failure indicator

0.1.31 (2021-08-05)

* Land #37, Honor the SSLVersion for server sockets

0.1.32 (2021-08-05)

* Land #36, Use getsockname to get the real local info

0.1.33 (2021-08-05)

* Land #35, Fix Default IPv6 LocalHost
2021-09-19 17:09:00 +00:00
taca
22911fcd23 security/ruby-rex-random_identifier: update to 0.1.8
0.1.6 (2020-11-30)

* Land #4, Update gemspec

0.1.7 (2021-07-19)

* Merge pull request #5 from sjanusz-r7/add-github-action-tests;
  Add Github action tests

0.1.8 (2021-07-20)

* Land #6, Add language option to generator
2021-09-19 17:05:20 +00:00
taca
f6c27e080a security/ruby-rex-text: update to 0.2.37
0.2.35 (2021-04-08)

* Land #41, Add rand_password method to Rex::Text

0.2.36 (2021-07-01)

* Land #30, Fix for vbapplication payload generation

0.2.37 (2021-08-13)

* Land #24, Implement Rex::Text random function name generator
2021-09-19 17:01:33 +00:00
taca
51a3061ece security/ruby-metasploit-payloads: update to 2.0.55
2.0.55 (2021-09-14)

* Land #499, Add support for updating terminal size dynamically
2021-09-19 16:57:47 +00:00
taca
f42dbfdcdb security/ruby-metasploit-model: update to 4.0.3
pkgsrc change: depends on rails60 or rails61.  It should be changed from
4.0.2.

4.0.3 (2021-09-16)

* Update Ubuntu version & Ruby Setup action
2021-09-19 16:54:22 +00:00
taca
fb8e5045bf security/ruby-metasploit-concern: update to 4.0.3
pkgsrc change: depends on rails60 or rails61.  It should be changed from
4.0.2.

4.0.4 (2021-09-16)

* Update Ubuntu version & Ruby Setup action
2021-09-19 16:51:27 +00:00
taca
e8c6f64db0 security/ruby-chef-vault: update to 4.1.4
4.1.4 (2021-09-09)

Merged Pull Requests

* added back the begin and end #380 (nikhil2611)

4.1.3 (2021-09-07)

Merged Pull Requests

* Upgrade to GitHub-native Dependabot #371 (dependabot-preview[bot])
* fix-verify-pipeline #377 (jayashrig158)
* Replaced exception with the warnings and removed related failing
  specs(used earlier for raising issue) #367 (sanga1794)
2021-09-19 16:47:19 +00:00
dsainty
024379e2b9 Reinstate the comment that the 5.6 limitation is for php-mysql, because that's
valuable insight, and still unfortunately the case.

No functional change.
2021-09-19 00:11:15 +00:00
bsiegert
a7061b5550 Revbump all Go packages after go117 update 2021-09-17 13:52:45 +00:00
adam
f70d880594 py-asyncssh: updated to 2.7.2
Release 2.7.2
* Fixed a regression related to server host key selection when attempting
  to use a leading '+' to add algorithms to the front of the default list.
* Fixed logging to properly handle SFTPName objects with string filenames.
* Fixed SSH_EXT_INFO to only be sent after the first key exchange.
2021-09-16 10:35:27 +00:00
adam
48d359f81f py-acme py-certbot*: updated to 1.19.0
Certbot 1.19.0

Added

The certbot-dns-rfc2136 plugin always assumed the use of an IP address as the
target server, but this was never checked. Until now. The plugin raises an error
if the configured target server is not a valid IPv4 or IPv6 address.
Our acme library now supports requesting certificates for IP addresses.
This feature is still unsupported by Certbot and Let's Encrypt.

Changed

Several attributes in certbot.display.util module are deprecated and will
be removed in a future release of Certbot. Any import of these attributes will
emit a warning to prepare the transition for developers.
zope based interfaces in certbot.interfaces module are deprecated and will
be removed in a future release of Certbot. Any import of these interfaces will
emit a warning to prepare the transition for developers.
We removed the dependency on chardet from our acme library. Except for when
downloading a certificate in an alternate format, our acme library now
assumes all server responses are UTF-8 encoded which is required by RFC 8555.

Fixed

Fixed parsing of Defined values in the Apache plugin to allow for = in the value.
Fixed a relatively harmless crash when issuing a certificate with --quiet/-q.
2021-09-15 12:05:14 +00:00
wiz
4caea9f70e tor-browser: update to 10.5.6.
Update Firefox to 78.14.0esr
2021-09-14 22:35:44 +00:00
adam
9fd8ef312c py-asyncssh: updated to 2.7.1
Release 2.7.1 (6 Sep 2021)
--------------------------

* Added an option to allow encrypted keys to be ignored when no passphrase
  is set. This behavior previously happened by default when loading keys
  from default locations, but now this option to load_keypairs() can be
  specified when loading any set of keys.

* Changed loading of default keys to automatically skip key types which
  aren't supported due to missing dependencies.

* Added the ability to specify "default" for server_host_key_algs, as
  a way for a client to request that its full set of default algorithms
  be advertised to the server, rather than just the algorithms matching
  keys in the client's known hosts list. Thanks go to Manfred Kaiser
  for suggesting this improvement.

* Added support for tilde-expansion in the config file "include"
  directive. Thanks go to Zack Cerza for reporting this and suggesting
  a fix.

* Improved interoperatbility of AsyncSSH SOCKS listener by sending a zero
  address rather than an empty hostname in the SOCKS CONNECT response.
  Thanks go to Github user juouy for reporting this and suggesting a fix.

* Fixed a couple of issues related to sending SSH_EXT_INFO messages.

* Fixed an issue with using SSHAcceptor as an async context manager.
  Thanks go to Paulo Costa for reporing this.

* Fixed an issue where a tunnel wasn't always cleaned up properly when
  creating a remote listener.

* Improved handling of connection drops, avoiding exceptions from being
  raised in some cases when the transport is abruptly closed.

* Made AsyncSSH SFTP support more tolerant of file permission values with
  undefined bits set. Thanks go to GitHub user ccwufu for reporting this.

* Added some missing key exchange algorithms in the AsyncSSH documentation.
  Thanks go to Jeremy Norris for noticing and reporting this.

* Added support for running AsyncSSH unit tests on systems with OpenSSL
  3.0 installed. Thanks go to Ken Dreyer for raising this issue and
  pointing out the new OpenSSL "provider" support for legacy algorithms.
2021-09-13 08:39:47 +00:00
wiz
da8fed24db age: update to 1.0.0.
v1.0.0 is the first stable release of the Go CLI and API, twenty
months after the first beta.
2021-09-12 09:08:32 +00:00
wen
c9d26b5951 Update to 2.072
Upstream changes:
2.072
- add PEM_certs2file and PEM_file2certs in IO::Socket::SSL::Utils based
  on idea by rovo89 in #101
- certs/*.p12 used for testing should now work with OpenSSL 3.0 too #108
- update public suffix database
2021-09-12 07:20:31 +00:00
wen
4cb1139ff0 Update to 0.32
Upstream changes:
0.32 Wed Sep 8 2021
    - Prefix internal bn2sv function so it doesn't collide with Net::SSLeay
    - Ensure that verify() leaves openssl error stack clean on failure
    - Fixed broken SEE ALSO links.
    - prevent outer $SIG{__DIE__} handler from being called during optional require.
    - omit done_testing since it does not work for older perl versions
2021-09-12 07:15:21 +00:00
taca
e92875fc90 security/pear-Crypt_GPG: update to 1.6.6
1.6.6 (2021-09-05)

* Fix possible infinite loop.
* Use configured debug handler also in CLI.
* Support generating keys without a user name.
2021-09-06 15:08:44 +00:00
wen
cb10ac144b Update to 0.08
Upstream changes:
0.08 Wed Oct 21 2020
- Switch to XSLoader

0.07 Wed Oct 21 2020
- Rename the subroutine compress to not conflict with libz's symbol
- Update manifest and .gitignore
- Move modules to lib/
- drop use vars and Exporter
- Do not provide examples of indirect calls to the module.
2021-09-05 06:38:54 +00:00
wen
5123b1203b Update to 0.073
Upstream changes:
0.073   2021-07-18
        - fix #73 CPAN testers failure with Math::BigInt 1.99982
        - fix #70 remove lto related hacks from Makefile.PL
        - fix #72 drop optional prereqs JSON::XS + Cpanel::JSON::XS, use optionally only JSON
2021-09-05 04:04:36 +00:00
pin
74208eba0e security/gpg-tui: update to 0.8.0
Added:
-Add a configuration file
-Support global locations for the configuration file
-Check GPG_TUI_CONFIG environment variable for config file
-Add manpage for the configuration file (gpg-tui.toml.5)
-Add :style command for changing styles

Changed:
-Rename the shell completions binary
-Use the correct name for completions binary
-Update the example shell completions command
-Bump dependencies

Fixed:
-Disable tests for the completions binary
-Build only the main binary in Dockerfile
-Update the build dependencies for the docker image
2021-09-04 20:42:52 +00:00
adam
f9acf61f56 py-google-auth-oauthlib: updated to 0.4.6
0.4.6

Bug Fixes
remove dependency on six
2021-09-01 18:24:19 +00:00
taca
1d30d97d70 security/ruby-metasploit_payloads-mettle: update to 1.0.11
1.0.11 (2021-08-02)

From commit logs:
* Add brackets to linux proc names like ps does.
* Only wrap process names in brackets on linux.
* Use the entire process path.
* Use a preprocessor directive instead of strcasestr.
2021-08-31 16:17:42 +00:00
taca
a81abb2077 security/ruby-metasploit-payloads: update to 2.0.54
No release note is available.  Please refer commit log
<https://github.com/rapid7/metasploit-payloads/compare/v2.0.47...v2.0.54>
in details.
2021-08-31 16:12:20 +00:00
adam
a8f2415e77 libssh2: updated to 1.10.0
libssh2 1.10

This release includes the following enhancements and bugfixes:

 o adds agent forwarding support
 o adds OpenSSH Agent support on Windows
 o adds ECDSA key support using the Mbed TLS backend
 o adds ECDSA cert authentication
 o adds diffie-hellman-group14-sha256, diffie-hellman-group16-sha512,
   diffie-hellman-group18-sha512 key exchanges
 o adds support for PKIX key reading when using ed25519 with OpenSSL
 o adds support for EWOULDBLOCK on VMS systems
 o adds support for building with OpenSSL 3
 o adds support for using FIPS mode in OpenSSL
 o adds debug symbols when building with MSVC
 o adds support for building on the 3DS
 o adds unicode build support on Windows
 o restores os400 building
 o increases min, max and opt Diffie Hellman group values
 o improves portiablity of the make file
 o improves timeout behavior with 2FA keyboard auth
 o various improvements to the Wincng backend
 o fixes reading parital packet replies when using an agent
 o fixes Diffie Hellman key exchange on Windows 1903+ builds
 o fixes building tests with older versions of OpenSSL
 o fixes possible multiple definition warnings
 o fixes potential cast issues _libssh2_ecdsa_key_get_curve_type()
 o fixes potential use after free if libssh2_init() is called twice
 o improved linking when using Mbed TLS
 o fixes call to libssh2_crypto_exit() if crypto hasn't been initialized
 o fixes crash when loading public keys with no id
 o fixes possible out of bounds read when exchanging keys
 o fixes possible out of bounds read when reading packets
 o fixes possible out of bounds read when opening an X11 connection
 o fixes possible out of bounds read when ecdh host keys
 o fixes possible hang when trying to read a disconnected socket
 o fixes a crash when using the delayed compression option
 o fixes read error with large known host entries
 o fixes various warnings
 o fixes various small memory leaks
 o improved error handling, various detailed errors will now be reported
 o builds are now using OSS-Fuzz
 o builds now use autoreconf instead of a custom build script
 o cmake now respects install directory
 o improved CI backend
 o updated HACKING-CRYPTO documentation
 o use markdown file extensions
 o improved unit tests
2021-08-30 16:43:19 +00:00
gdt
bb0c243bf1 security/ccid: Update to 1.4.36
1.4.36 - 30 August 2021, Ludovic Rousseau
   - Add support of
     - Lenovo Lenovo Smartcard Wired Keyboard II
     - REINER SCT tanJack USB
     - SafeNet eToken 5110+ FIPS
     - SafeNet eToken 5300 C
     - jSolutions s.r.o. Multi SIM card reader 4/8
   - parse: fix check when bNumDataRatesSupported = 0
2021-08-30 16:16:55 +00:00
wiz
2b838918d1 libssh: update to 0.96.
version 0.9.6 (released 2021-08-26)
  * CVE-2021-3634: Fix possible heap-buffer overflow when rekeying with
    different key exchange mechanism
  * Fix several memory leaks on error paths
  * Reset pending_call_state on disconnect
  * Fix handshake bug with AEAD ciphers and no HMAC overlap
  * Use OPENSSL_CRYPTO_LIBRARIES in CMake
  * Ignore request success and failure message if they are not expected
  * Support more identity files in configuration
  * Avoid setting compiler flags directly in CMake
  * Support build directories with special characters
  * Include stdlib.h to avoid crash in Windows
  * Fix sftp_new_channel constructs an invalid object
  * Fix Ninja multiple rules error
  * Several tests fixes
2021-08-30 15:57:11 +00:00
wiz
1c7d4d020b libgcrypt: update to 1.9.4.
Noteworthy changes in version 1.9.4 (2021-08-22)  [C23/A3/R4]
------------------------------------------------

 * Bug fixes:

   - Fix Elgamal encryption for other implementations.
     [#5328,CVE-2021-33560]

   - Fix alignment problem on macOS.  [#5440]

   - Check the input length of the point in ECDH.  [#5423]

   - Fix an abort in gcry_pk_get_param for "Curve25519".  [#5490]

 * Other features:

   - Add GCM and CCM to OID mapping table for AES. [a83fb13a3b]
2021-08-30 15:53:43 +00:00
adam
490f16feaa py-trustme: updated to 0.9.0
0.9.0:
Unknown changes
2021-08-29 13:02:44 +00:00
he
38077e8185 Upgrade security/vault to version 1.6.6.
Pkgsrc changes:
 * Note that we need go >= 1.15.15.

Upstream changes:

26 August 2021

SECURITY:

 * UI Secret Caching: The Vault UI erroneously cached and exposed
   user-viewed secrets between authenticated sessions in a single
   shared browser, if the browser window / tab was not refreshed or
   closed between logout and a subsequent login. This vulnerability,
   CVE-2021-38554, was fixed in Vault 1.8.0 and will be addressed in
   pending 1.7.4 / 1.6.6 releases.

CHANGES:

 * go: Update go version to 1.15.15 [GH-12423]

IMPROVEMENTS:

 * db/cassandra: Added tls_server_name to specify server name for
   TLS validation [GH-11820]

BUG FIXES:

 * physical/raft: Fix safeio.Rename error when restoring snapshots
   on windows [GH-12377]
 * secret: fix the bug where transit encrypt batch doesn't work
   with key_version [GH-11628]
 * secrets/database: Fixed an issue that prevented external database
   plugin processes from restarting after a shutdown. [GH-12087]
 * ui: Automatically refresh the page when user logs out [GH-12035]
 * ui: Fixes metrics page when read on counter config not allowed [GH-12348]
 * ui: fix oidc login with Safari [GH-11884]
2021-08-27 09:24:41 +00:00
jperkin
da67e4ca1c security: Spell R-gitcreds correctly.
Should hopefully unbreak bulk builds.
2021-08-27 06:02:26 +00:00
adam
21706577cb mit-krb5: updated to 1.18.4
Major changes in 1.18.4

Fix a denial of service attack against the KDC encrypted challenge code [CVE-2021-36222].
Fix a memory leak when gss_inquire_cred() is called without a credential handle.
2021-08-26 06:31:33 +00:00
adam
e11bfb6311 openssl: fix building on Darwin 2021-08-25 15:22:05 +00:00
jperkin
8ddcb85c06 openssl: Update to 1.1.1l.
Changes between 1.1.1k and 1.1.1l [24 Aug 2021]

*) Fixed an SM2 Decryption Buffer Overflow.

   In order to decrypt SM2 encrypted data an application is expected to call the
   API function EVP_PKEY_decrypt(). Typically an application will call this
   function twice. The first time, on entry, the "out" parameter can be NULL and,
   on exit, the "outlen" parameter is populated with the buffer size required to
   hold the decrypted plaintext. The application can then allocate a sufficiently
   sized buffer and call EVP_PKEY_decrypt() again, but this time passing a non-NULL
   value for the "out" parameter.

   A bug in the implementation of the SM2 decryption code means that the
   calculation of the buffer size required to hold the plaintext returned by the
   first call to EVP_PKEY_decrypt() can be smaller than the actual size required by
   the second call. This can lead to a buffer overflow when EVP_PKEY_decrypt() is
   called by the application a second time with a buffer that is too small.

   A malicious attacker who is able present SM2 content for decryption to an
   application could cause attacker chosen data to overflow the buffer by up to a
   maximum of 62 bytes altering the contents of other data held after the
   buffer, possibly changing application behaviour or causing the application to
   crash. The location of the buffer is application dependent but is typically
   heap allocated.
   (CVE-2021-3711)
   [Matt Caswell]

*) Fixed various read buffer overruns processing ASN.1 strings

   ASN.1 strings are represented internally within OpenSSL as an ASN1_STRING
   structure which contains a buffer holding the string data and a field holding
   the buffer length. This contrasts with normal C strings which are repesented as
   a buffer for the string data which is terminated with a NUL (0) byte.

   Although not a strict requirement, ASN.1 strings that are parsed using OpenSSL's
   own "d2i" functions (and other similar parsing functions) as well as any string
   whose value has been set with the ASN1_STRING_set() function will additionally
   NUL terminate the byte array in the ASN1_STRING structure.

   However, it is possible for applications to directly construct valid ASN1_STRING
   structures which do not NUL terminate the byte array by directly setting the
   "data" and "length" fields in the ASN1_STRING array. This can also happen by
   using the ASN1_STRING_set0() function.

   Numerous OpenSSL functions that print ASN.1 data have been found to assume that
   the ASN1_STRING byte array will be NUL terminated, even though this is not
   guaranteed for strings that have been directly constructed. Where an application
   requests an ASN.1 structure to be printed, and where that ASN.1 structure
   contains ASN1_STRINGs that have been directly constructed by the application
   without NUL terminating the "data" field, then a read buffer overrun can occur.

   The same thing can also occur during name constraints processing of certificates
   (for example if a certificate has been directly constructed by the application
   instead of loading it via the OpenSSL parsing functions, and the certificate
   contains non NUL terminated ASN1_STRING structures). It can also occur in the
   X509_get1_email(), X509_REQ_get1_email() and X509_get1_ocsp() functions.

   If a malicious actor can cause an application to directly construct an
   ASN1_STRING and then process it through one of the affected OpenSSL functions
   then this issue could be hit. This might result in a crash (causing a Denial of
   Service attack). It could also result in the disclosure of private memory
   contents (such as private keys, or sensitive plaintext).
   (CVE-2021-3712)
   [Matt Caswell]
2021-08-25 11:25:25 +00:00
manu
e8bd7982c5 Only use -z nodelete linker flag if it is available.
This should fix the build on platforms that do not use GNU ld
such as MacOSX.
2021-08-24 15:07:28 +00:00
mef
f72be38d2b (security/R-{oskeyring,gitgreds}) Added version 0.1.1
Added security/R-oskeyring version 0.1.1
Added security/R-gitgreds version 0.1.1
2021-08-24 10:17:40 +00:00
mef
b13e5054da security/R-gitgreds: import R-gitcreds-0.1.1
Query, set, delete credentials from the 'git' credential store. Manage
'GitHub' tokens and other 'git' credentials. This package is to be
used by other packages that need to authenticate to 'GitHub' and/or
other 'git' repositories.
2021-08-24 10:13:49 +00:00
mef
b785670e78 security/R-oskeyring: import R-oskeyring-0.1.1
Aims to support all features of the system credential store, including
non-portable ones. Supports 'Keychain' on 'macOS', and 'Credential
Manager' on 'Windows'. See the 'keyring' package if you need a
portable 'API'.
2021-08-24 10:12:57 +00:00
adam
9b65082302 py-acme-tiny: updated to 4.1.1
Release 4.1.1
CHANGELOG
* Support already valid authorizations
* Moved to Github Actions workflows for automated tests, started using Let's Encrypt pebble test server, increased test coverage to 100%
* Added test to ensure path traversal can't be exploited
* Started logging Account IDs for later reference
* Various README updates
2021-08-24 08:33:53 +00:00
ryoon
73d6e9b157 acmesh: Update to 3.0.0
Changelog:
    Zerossl.com is set a default CA now: https://github.com/acmesh-official/acme.sh/wiki/Change-default-CA-to-ZeroSSL
    SSL.com is supported now: https://github.com/acmesh-official/acme.sh/wiki/SSL.com-CA
    Add more retry logic for unstable network connections.
    More dns apis are aded.
    Bug fixes.
2021-08-23 15:00:02 +00:00
wiz
fc6e057bbf tor-browser: update to 10.5.5.
Bug 40582: Tor Browser 10.5.2 tabs always crash on Fedora Xfce Rawhide
2021-08-21 05:47:16 +00:00
manu
cd6edcbc18 Prevent dynamic unload of libp11-kit.so
The library sets up a pthread_atfork() hook. If we let be unload, we
get a callback to stale memory.
2021-08-19 12:56:22 +00:00
manu
b52f5b8b59 Add files I forgot to cvs add
Thanks to wiz@ for pointing out
2021-08-18 23:19:26 +00:00
manu
3f4087be86 More decoding of TLS values, especially TLSv1.3 ciphers
Not submitted upstream, as it is an abandonware.
2021-08-18 13:34:07 +00:00
wiz
b8e1617491 *: recursive bump for openexr 3.1 2021-08-15 14:23:57 +00:00
wiz
67498633c5 tor-browser: update to 10.5.4.
This version updates Firefox to 78.13.0esr. This version includes
important security updates to Firefox.

Warning:

Tor Browser will stop supporting version 2 onion services very
soon. Please see the previously published deprecation timeline.
Migrate your services and update your bookmarks to version 3 onion
services as soon as possible.

The full changelog since Tor Browser 10.5.2:

    Windows + OS X + Linux
        Update Firefox to 78.13.0esr
        Update NoScript to 11.2.11
        Bug 40041: Remove V2 Deprecation banner on about:tor for desktop
        Bug 40506: Saved Logins not available in 10.5
        Bug 40524: Update DuckDuckGo onion site URL in search preferences and onboarding
2021-08-15 13:21:41 +00:00
wiz
22ac649525 tor-browser-noscript: update to 11.2.11.
v 11.2.11
============================================================
x [nscl] Fixed JavaScript access to CSS rules broken on
  Chromium when unrestricted CSS is disabled - issue #204
x Prevent Chromium builds from being sent to AMO for signing
x [nscl] Fixed CPU/RAM overload on some pages with
  unrestricted CSS disabled but scripting enabled (not
  recommended setting) - issue #194, issue #199
x [nscl] Fixed CPU spikes on Chromium triggered by automatic
  file downloads (thanks ptheborg for report)

v 11.2.10
============================================================
x Cross-browser file naming consistency, in spite of version
  numbering incompatibilities
x [nscl] Fix for potential race conditions on certain page
  transitions (issue #205)
x Handle exception when accessing navigator.serviceWorker on
  sandboxed frames
x MS Edge support

v 11.2.9
============================================================
x [L10n] Updated de, mk
x Replace deprecated extension.getURL() with
  runtime.getURL()
x REUSE-compliant licensing boilerplate
x Remove unused/refactored-out files
x Relicensing as GPL3+
x [nscl] Fixed infinite recursion issue on window.open
  wrappers
x Avoid treating JavaScript files as embeddings when opened
  as top-level documents
2021-08-15 13:20:11 +00:00
wiz
0a9513d692 putty: remove patch that was removed from distinfo during 0.76 update 2021-08-12 07:14:27 +00:00
bsiegert
624af70d8a Revbump all Go packages after go116 update 2021-08-11 19:35:03 +00:00
adam
070440fb09 py-google-auth-oauthlib: updated to 0.4.5
0.4.5 (2021-07-26)

Documentation

fix links to installed app, client secrets docs
omit mention of Python 2.7 in 'CONTRIBUTING.rst'
add Samples section to CONTRIBUTING.rst
2021-08-11 09:52:16 +00:00
adam
4d9140ac7e py-google-auth: updated to 1.34.0
v1.34.0

Features

support refresh callable on google.oauth2.credentials.Credentials

Bug Fixes

do not use the GAE APIs on gen2+ runtimes
2021-08-11 09:51:14 +00:00
pin
2a0bb4c735 security/gpg-tui: update to 0.7.4
[0.7.4] - 2021-08-07
Added:
    Add config for splash screen to check SHA256 hash of assets

Changed:
    Bump rust-embed to 6.0.0
    Bump tui to 0.16.0
    Bump gpgme to 0.10.0
    Center the options menu title

Fixed:
    Mark the unsupported algorithms as unrecognized/unknown
    Fix the failing test about options menu title
2021-08-07 14:38:20 +00:00
adam
cd4c483fd6 py-acme py-certbot*: updated to 1.18.0
1.18.0

Added

New functions that Certbot plugins can use to interact with the user have been added to certbot.display.util. We plan to deprecate using IDisplay with zope in favor of these new functions in the future.
The Plugin, Authenticator and Installer classes are added to certbot.interfaces module as alternatives to Certbot's current zope based plugin interfaces. The API of these interfaces is identical, but they are based on Python's abc module instead of zope. Certbot will continue to detect plugins that implement either interface, but we plan to drop support for zope based interfaces in a future version of Certbot.
The class certbot.configuration.NamespaceConfig is added to the Certbot's public API.

Changed

When self-validating HTTP-01 challenges using acme.challenges.HTTP01Response.simple_verify, we now assume that the response is composed of only ASCII characters. Previously we were relying on the default behavior of the requests library which tries to guess the encoding of the response which was error prone.
acme: the .client.Client and .client.BackwardsCompatibleClientV2 classes are now deprecated in favor of .client.ClientV2.
The certbot.tests.patch_get_utility* functions have been deprecated. Plugins should now patch certbot.display.util themselves in their tests or use certbot.tests.util.patch_display_util as a temporary workaround.
In order to simplify the transition to Certbot's new plugin interfaces, the classes Plugin and Installer in certbot.plugins.common module and certbot.plugins.dns_common.DNSAuthenticator now implement Certbot's new plugin interfaces. The Certbot plugins based on these classes are now automatically detected as implementing these interfaces.
We added a dependency on chardet to our acme library so that it will be used over charset_normalizer in newer versions of requests.

Fixed

The Apache authenticator no longer crashes with "Unable to insert label" when encountering a completely empty vhost. This issue affected Certbot 1.17.0.
Users of the Certbot snap on Debian 9 (Stretch) should no longer encounter an "access denied" error when installing DNS plugins.
2021-08-05 10:52:00 +00:00
pin
b7e960b816 security/pleaser: update to 0.4.2
-Fix example
-Check should fail if handed a non-regular file
-Document control characters
-Optional environment passthrough
-Removing superfluous backtick
-Child should be handled in parent
-Removing redundant util.rs
-Reorganising tests to storage overheads
-Clippy suggestions
-Removing need to drop privs in child
-Forking can be done as low priv user
2021-08-02 15:04:48 +00:00
pin
3334277ea8 security/gpg-tui: update to 0.7.3
[0.7.3] - 2021-07-25

Added:
-Add Wayland clipboard support (#30)
-Add 'in the media' section to README.md

Changed:
-Import the test key from keyserver in CI workflow

Fixed:
-Handle clipboard errors
2021-08-02 14:54:56 +00:00
ryoon
ce5e37658b *: Recursive revbump from audio/pulseaudio-15.0 2021-07-30 12:26:37 +00:00
wiz
bb20a4a7be tor-browser-https-everywhere: update to 2021.7.13.
2021.7.13
* Amend Incognito Key for Chrome and Firefox #20092
* Fix unexpected arithmetic operations on strings #20043
* Remove Top Alexa Labeller #20083
* Update deprecated log function #20101
* Patch Chrome Test Failure #20102
2021-07-29 10:08:41 +00:00
adam
3dc81c8130 py-google-auth: updated to 1.33.1
1.33.1 (2021-07-20)

Bug Fixes
fallback to source creds expiration in downscoped tokens

Reverts
revert "feat: service account is able to use a private token endpoint

1.33.0 (2021-07-14)

Features
define CredentialAccessBoundary classes
define google.auth.downscoped.Credentials class
service account is able to use a private token endpoint

Bug Fixes
fix fetch_id_token credential lookup order to match adc

Documentation
fix code block formatting in 'user-guide.rst'

1.32.1 (2021-06-30)

Bug Fixes
avoid leaking sub-session created for '_auth_request'

1.32.0 (2021-06-16)

Features
allow scopes for self signed jwt

1.31.0 (2021-06-09)

Features
define useful properties on google.auth.external_account.Credentials

Bug Fixes
avoid deleting items while iterating
2021-07-27 05:24:28 +00:00
gdt
d6cca9c4cb security/ccid: Update to 1.4.35
packaging changes: stop re-running bootstrap.  upstream documents just
running configure, and regen causes trouble.

upstream changes are minor
2021-07-25 18:03:38 +00:00
ryoon
88eeac75f2 putty: Update to 0.67
Changelog:
These features are new in 0.76 (released 2021-07-17):

    New option to abandon an SSH connection if the server allows you to authenticate in a trivial manner.
    Bug fix: Windows PuTTY crashed when the 'Use system colours' option was used.
    Bug fix: crash on Windows when using MIT Kerberos together with 'Restart Session'.
    Bug fix: Windows PuTTY leaked named pipes after contacting Pageant.
    Bug fix: Windows PuTTY didn't update the window while you held down the scrollbar arrow buttons long enough to 'key-repeat'.
    Bug fix: user colour-palette reconfiguration via 'Change Settings' were delayed-action.
    Bug fix: server colour-palette reconfigurations were sometimes lost.
    Bug fix: a tight loop could occur on reading a truncated private key file.
    Bug fix: the Windows Pageant GUI key list didn't display key lengths.

These features were new in 0.75 (released 2021-05-08):

    Security fix: on Windows, a server could DoS the whole Windows GUI by telling the PuTTY window to change its title repeatedly at high speed.
    Pageant now supports loading a key still encrypted, and decrypting it later by prompting for the passphrase on first use.
    Upgraded default SSH key fingerprint format to OpenSSH-style SHA-256.
    Upgraded private key file format to PPK3, with improved passphrase hashing and no use of SHA-1.
    Terminal now supports ESC [ 9 m for strikethrough text.
    New protocols: bare ssh-connection layer for use over already-secure IPC channels, and SUPDUP for talking to very old systems such as PDP-10s.
    PuTTYgen now supports alternative provable-prime generation algorithm for RSA and DSA.
    The Unix tools can now connect directly to a Unix-domain socket.
2021-07-24 14:54:08 +00:00
fox
9d39fefc3b security/wolfssl: Updates to v4.8.1
Changes since v4.8.0:

wolfSSL Release 4.8.1 (July 16, 2021)

Release 4.8.1 of wolfSSL embedded TLS has an OCSP vulnerability fix:
Vulnerabilities

  * [High] OCSP verification issue when response is for a certificate with no
    relation to the chain in question BUT that response contains the NoCheck
    extension which effectively disables ALL verification of that one cert.
    Users who should upgrade to 4.8.1 are TLS client users doing OCSP, TLS
    server users doing mutual auth with OCSP, and CertManager users doing OCSP
    independent of TLS. Thanks to Jan Nauber, Marco Smeets, Werner Rueschenbaum
    and Alissa Kim of Volkswagen Infotainment for the report.
2021-07-24 04:45:06 +00:00
adam
ecd01efeea py-acme, py-certbot*: updated to 1.17.0
Certbot 1.17.0

Added

Add Void Linux overrides for certbot-apache.

Changed

We changed how dependencies are specified between Certbot packages. For this
and future releases, higher level Certbot components will require that lower
level components are the same version or newer. More specifically, version X
of the Certbot package will now always require acme>=X and version Y of a
plugin package will always require acme>=Y and certbot=>Y. Specifying
dependencies in this way simplifies testing and development.
The Apache authenticator now always configures virtual hosts which do not have
an explicit ServerName. This should make it work more reliably with the
default Apache configuration in Debian-based environments.

Fixed

When we increased the logging level on our nginx "Could not parse file" message,
it caused a previously-existing inability to parse empty files to become more
visible. We have now added the ability to correctly parse empty files, so that
message should only show for more significant errors.
2021-07-23 07:26:43 +00:00
tm
04fcf41b48 acmesh: fix sub-folder installation for notify and dnsapi support
It's required to install sub-folders which contains scripts for notify and
dnsapi support. Change default folder for scripts to share folder and symlink
to sbin.

Bump PKGREVISION.
2021-07-22 19:05:14 +00:00
tnn
ab9578d7c4 g/c RUSTFLAGS from individual package Makefiles. Handled by cargo.mk. 2021-07-22 16:16:35 +00:00
pin
79ae77ebb6 security/gpg-tui: update to 0.7.2
[0.7.2] - 2021-07-20

Added:
-Add the missing views for signature notations

Changed:
-Mark the default signing key with a symbol

Fixed:
-Override the default key for all gpg fallback commands
-Sleep the event handler thread if input is disabled (#29)
2021-07-20 20:22:26 +00:00
wiz
0d7f067e58 py-kerberos: mark as only supporting mit-krb5
With heimdal, you'll get undefined symbol errors like this one:
/usr/pkg/lib/python3.8/site-packages/kerberos.so: Undefined PLT symbol "krb5_free_keytab_entry_contents"

Bump PKGREVISION.
2021-07-20 17:43:12 +00:00
gdt
57fd8baa6d security/ca-certifcates: Extned DESCR
Note that this package is irregular because it modifies configuration
outside of pkgsrc.

Add a see-also for mozilla-rootcerts{,-openssl}.
2021-07-20 12:59:06 +00:00
pin
34d35a7cce security/gpg-tui: update to 0.7.1
[0.7.1] - 2021-07-17

Added:
-Add an example for selection mode to README.md

Changed:
-Update README.md about libxkbcommon-dev dependency (#26)

Fixed:
-Run the terminal on stderr and use stdout for output (#27)
2021-07-19 15:19:45 +00:00
dholland
e2f8c178c8 PR 55733 Joern Clausen: use GNU m4 with security/openssl on Solaris.
Seems that Solaris's m4 overflows internal limits.
2021-07-18 23:11:08 +00:00
wiz
67b746ade6 tor-browser: update to 10.5.2.
10.5.2

Windows + OS X + Linux

    Update Firefox to 78.12.0esr
    Bug 40497: Cannot set multiple pages as home pages in 10.5a17
    Bug 40507: Full update is not downloaded after applying partial update fails
    Bug 40510: open tabs get redirected to about:torconnect on restart

10.5.1

Android-only

10.5

    All Platforms
        Update NoScript to 11.2.9
        Update Tor Launcher to 0.2.30
        Translations update
        Bug 25483: Provide Snowflake based on Pion for Windows, macOS, and Linux
        Bug 33761: Remove unnecessary snowflake dependencies
        Bug 40064: Bump libevent to 2.1.12
        Bug 40137: Migrate https-everywhere storage to idb
        Bug 40261: Bump versions of snowflake and webrtc
        Bug 40263: Update domain front for Snowflake
        Bug 40302: Update version of snowflake
        Bug 40030: DuckDuckGo redirect to html doesn't work
    Windows + OS X + Linux
        Bug 27476: Implement about:torconnect captive portal within Tor Browser [tor-browser]
        Bug 32228: Bookmark TPO support domains in Tor Browser
        Bug 33803: Add a secondary nightly MAR signing key [tor-browser]
        Bug 33954: Consider different approach for Bug 2176
        Bug 34345: "Don't Bootstrap" Startup Mode
        Bug 40011: Rename tor-browser-brand.ftl to brand.ftl
        Bug 40012: Fix about:tor not loading some images in 82
        Bug 40138: Move our primary nightly MAR signing key to tor-browser
        Bug 40209: Implement Basic Crypto Safety
        Bug 40428: Correct minor Cryptocurrency warning string typo
        Bug 40429: Update Onboarding for 10.5
        Bug 40455: Block or recover background requests after bootstrap
        Bug 40456: Update the SecureDrop HTTPS-Everywhere update channel
        Bug 40475: Include clearing CORS preflight cache
        Bug 40478: Onion alias url rewrite is broken
        Bug 40484: Bootstrapping page show Quickstart text
        Bug 40490: BridgeDB bridge captcha selection is broken in alpha
        Bug 40495: Onion pattern is focusable by click on about:torconnect
        Bug 40499: Onion Alias doesn't work with TOR_SKIP_LAUNCH
    Linux
        Bug 40089: Remove CentOS 6 support for Tor Browser 10.5
    Build System
        All Platforms
            Update Go to 1.15.13
            Bug 23631: Use rootless containers [tor-browser-build]
            Bug 33693: Change snowflake and meek dummy address [tor-browser]
            Bug 40016: getfpaths is not setting origin_project
            Bug 40169: Update apt package cache after calling pre_pkginst, too
            Bug 40194: Remove osname part in cbindgen filename
        Windows + OS X + Linux
            Bug 40081: Build Mozilla code with --enable-rust-simd
            Bug 40104: Use our TMPDIR when creating our .mar files
            Bug 40133: Bump Rust version for ESR 78 to 1.43.0
            Bug 40166: Update apt cache before calling pre_pkginst in container-image config
        Linux
            Bug 26238: Move to Debian Jessie for our Linux builds
            Bug 31729: Support Wayland
            Bug 40041: Remove CentOS 6 support for 10.5 series
            Bug 40103: Add i386 pkg-config path for linux-i686
            Bug 40112: Strip libstdc++ we ship
            Bug 40118: Add missing libdrm dev package to firefox container
            Bug 40235: Bump apt for Jessie containers
2021-07-15 13:50:16 +00:00
fox
053f9119a5 security/wolfssl: Updates to v4.8.0
Changes since v4.7.0:

wolfSSL Release 4.8.0 (July 09, 2021)

Release 4.8.0 of wolfSSL embedded TLS has bug fixes and new features including:
Vulnerabilities

  * [Low] OCSP request/response verification issue. In the case that the serial
    number in the OCSP request differs from the serial number in the OCSP
    response the error from the comparison was not resulting in a failed
    verification. We recommend users that have wolfSSL version 4.6.0 and 4.7.0
    with OCSP enabled update their version of wolfSSL. Version 4.5.0 and earlier
    are not affected by this report. Thanks to Rainer, Roee, Barak, Hila and
    Shoshi (from Cymotive and CARIAD) for the report.
  * [Low] CVE-2021-24116: Side-Channel cache look up vulnerability in base64 PEM
    decoding for versions of wolfSSL 4.5.0 and earlier. Versions 4.6.0 and up
    contain a fix and do not need to be updated for this report. If decoding a
    PEM format private key using version 4.5.0 and older of wolfSSL then we
    recommend updating the version of wolfSSL used. Thanks to Florian Sieck, Jan
    Wichelmann, Sebastian Berndt and Thomas Eisenbarth for the report.

New Feature Additions
New Product

  * Added wolfSentry build with --enable-wolfsentry and tie-ins to wolfSSL code
    for use with wolfSentry

Ports

  * QNX CAAM driver added, supporting ECC black keys, CMAC, BLOBs, and TRNG use
  * _WIN32_WCE wolfCrypt port added
  * INTIME_RTOS directory support added
  * Added support for STM32G0
  * Renesas RX: Added intrinsics for rot[rl], revl (thanks @rliebscher)
  * Added support for running wolfcrypt/test/testwolfcrypt on Dolphin emulator
    to test DEVKITPRO port
  * Zephyr project port updated to latest version 2.6.X

ASN1 and PKCS

  * Storing policy constraint extension from certificate added
  * Added support for NID_favouriteDrink pilot
  * Added the API function wc_EncryptPKCS8Key to handle encrypting a DER,
    PKCS#8-formatted key

Compatibility Layer Additions

  * Open Source PORTS Added/Updated
      * OpenVPN
      * OpenLDAP
      * socat-1.7.4.1
      * Updated QT port for 5.15.2
  * Changes to extend set_cipher_list() compatibility layer API to have
    set_ciphersuites compatibility layer API capability
  * Added more support for SHA3 in the EVP layer
  * API Added
     * MD5/MD5_Transform
     * SHA/SHA_Transform/SHA1_Transform
     * SHA224/SHA256_Transform/SHA512_Transform
     * SSL_CTX_get0_param/SSL_CTX_set1_param
     * X509_load_crl_file
     * SSL_CTX_get_min_proto_version
     * EVP_ENCODE_CTX_new
     * EVP_ENCODE_CTX_free
     * EVP_EncodeInit
     * EVP_EncodeUpdate
     * EVP_EncodeFinal
     * EVP_DecodeInit
     * EVP_DecodeUpdate
     * EVP_DecodeFinal
     * EVP_PKEY_print_public
     * BIO_tell
     * THREADID_current
     * THREADID_hash
     * SSL_CTX_set_ecdh_auto
     * RAND_set_rand_method()
     * X509_LOOKUP_ctrl()
     * RSA_bits
     * EC_curve_nist2nid
     * EC_KEY_set_group
     * SSL_SESSION_set_cipher
     * SSL_set_psk_use_session_callback
     * EVP_PKEY_param_check
     * DH_get0_pqg
     * CRYPTO_get_ex_new_index
     * SSL_SESSION_is_resumable
     * SSL_CONF_cmd
     * SSL_CONF_CTX_finish
     * SSL_CTX_keylog_cb_func
     * SSL_CTX_set_keylog_callback
     * SSL_CTX_get_keylog_callback

Misc.

  * Added wolfSSL_CTX_get_TicketEncCtx getter function to return the ticket
    encryption ctx value
  * Added wc_AesKeyWrap_ex and wc_AesKeyUnWrap_ex APIs to accept an Aes object
    to use for the AES operations
  * Added implementation of AES-GCM streaming (--enable-aesgcm-stream)
  * Added deterministic generation of k with ECC following RFC6979 when the
    macro WOLFSL_ECDSA_DETERMINISTIC_K is defined and wc_ecc_set_deterministic
    function is called
  * Implemented wc_DsaParamsDecode and wc_DsaKeyToParamsDer
  * Asynchronous support for TLS v1.3 TLSX ECC/DH key generation and key
    agreement
  * Added crypto callback support for Ed/Curve25519 and SHA2-512/384
  * TLS 1.3 OPwolfSSL_key_update_response function added to see if a update
    response is needed

Fixes

  * Fix for detecting extra unused bytes that are in an ASN1 sequence appended
    to the end of a valid ECC signature
  * Fix for keyid with ktri CMS (breaks compatibility with previous keyid ASN1
    syntax)
  * Fix for failed handshake if a client offers more than 150 cipher
    suites. Thanks to Marcel Maehren, Philipp Nieting, Robert Merget from Ruhr
    University Bochum Sven Hebrok, Juraj Somorovsky from Paderborn University
  * Fix for default order of deprecated elliptic curves SECP224R1, SECP192R1,
    SECP160R1. Thanks to Marcel Maehren, Philipp Nieting, Robert Merget from
    Ruhr University Bochum Sven Hebrok, Juraj Somorovsky from Paderborn
    University
  * Fix for corner TLS downgrade case where a TLS 1.3 setup that allows for
    downgrades but has TLS 1.3 set as the minimum version would still downgrade
    to TLS 1.2

PKCS7 (Multiple fixes throughout regarding memory leaks with SMIME and heap
buffer overflows due to streaming functionality)

  * Fix PKCS7 dynamic content save/restore in PKCS7_VerifySignedData
  * Fix for heap buffer overflow on compare with wc_PKCS7_DecryptKtri
  * Fix for heap buffer overflow with wc_PKCS7_VerifySignedData
  * Fix for heap buffer overflow with wc_PKCS7_DecodeEnvelopedData
  * Check size of public key used with certificate passed into
    wc_PKCS7_InitWithCert before XMEMCPY to avoid overflow
  * Fix for heap buffer overflow fix for wolfSSL_SMIME_read_PKCS7
  * Fix to cleanly free memory in error state with wolfSSL_SMIME_read_PKCS7
  * SMIME error checking improvements and canonicalize multi-part messages
    before hashing

DTLS Fixes

  * DTLS fix to correctly move the Tx sequence number forward
  * DTLS fix for sequence and epoch number with secure renegotiation cookie
    exchange
  * Fix for Chacha-Poly AEAD for DTLS 1.2 with secure renegotiation

PORT Fixes

  * Fix AES, aligned key for the HW module with DCP port
  * Fix ATECC608A TNGTLS certificate size issue (thanks @vppillai)
  * Fixes for mingw compile warnings
  * Fixes for NXP LTC ECC/RSA
  * Fix ESP32 RSA hw accelerator initialization issue
  * Fixes for STM32 PKA with ECC
  * Fixes for STM32 AES GCM for HAL's that support byte sized headers
  * Espressif ESP32 SHA_CTX macro conflict resolved

Math Library Fixes

  * For platforms that support limits.h or windows make sure both
    SIZEOF_LONG_LONG and SIZEOF_LONG are set to avoid issues with CTC_SETTINGS
  * SP C 32/64: fix corner cases around subtraction affecting RSA PSS use
  * Fix to return the error code from sp_cond_swap_ct when malloc fails
  * Fix potential memory leak with small stack in the function fp_gcd
  * Static Analysis Fixes
  * Fixes made from Coverity analysis including:
  * Cleanups for some return values,
  * Fix for leak with wolfSSL_a2i_ASN1_INTEGER
  * Sanity check on length in wolfSSL_BN_rand
  * Sanity check size in TLSX_Parse catching a possible integer overflow
  * Fixes found with -fsanitize=undefined testing
  * Fix null dereferences or undefined memcpy calls
  * Fix alignment in myCryptoDevCb
  * Fix default DTLS context assignment
  * Added align configure option to force data alignment

Misc.

  * Fix for wolfSSL_ASN1_TIME_adj set length
  * Fix for freeing structure on error case in the function AddTrustedPeer
  * Return value of SSL_read when called after bidirectional shutdown
  * Fix for build options ./configure --enable-dtls --disable-asn
  * FIx for detection of a salt length from an RSA PSS signature
  * Fix to free up globalRNGMutex mutex when cleaning up global RNG
  * Fix leak when multiple hardware names are in SAN
  * Fix nonblocking ret value from CRL I/O callbacks
  * Fix wolfSSL_BIO_free_all return type to better match for compatibility layer
  * Fix for make distcheck, maintainer-clean, to allow distribution builds
  * Fix for async with fragmented packets
  * Fix for the build or RSA verify or public only
  * Fix for return value of wolfSSL_BIO_set_ssl to better match expected
    compatibility layer return value
  * Fix for sanity checks on size of issuer hash and key along with better
    freeing on error cases with DecodeBasicOcspResponse
  * Fix for potential memory leak with wolfSSL_OCSP_cert_to_id

Improvements/Optimizations
DTLS/TLS Code Base

  * Improved TLS v1.3 time rollover support
  * TLS 1.3 PSK: use the hash algorithm to choose cipher suite
  * TLS Extended Master Secret ext: TLS13 - send in second Client Hello if in
    first
  * TLS Encrypt then MAC: check all padding bytes are the same value
  * wolfSSL_GetMaxRecordSize updated to now take additional cipher data into
    account
  * Updated session export/import with DTLS to handle a new internal options
    flag
  * Refactored dtls_expected_peer_handshake_number handling
  * Added wolfSSL_CTX_get_ephemeral_key and wolfSSL_get_ephemeral_key for
    loading a constant key in place of an ephemeral one
  * Improved checking of XSNPRINTF return value in DecodePolicyOID

Build Options and Warnings

  * Added wolfSSL_CTX_set_verify to the ABI list
  * Adjusted FP_ECC build to not allow SECP160R1, SECP160R2, SECP160K1 and
    SECP224K1. FP_ECC does not work with scalars that are the length of the
    order when the order is longer than the prime.
  * Added CMake support for CURVE25519, ED25519, CURVE448, and ED448
  * cmake addition to test paths when building
  * Added support for session tickets in CMake
  * Added support for reproducible builds with CMake
  * Turn on reproducible-build by default when enable-distro
  * Windows Project: Include the X448 and Ed448 files
  * GCC-11 compile time warning fixes
  * Fix for compiling build of ./configure '--disable-tlsv12'
    '-enable-pkcallbacks'
  * Added build error for insecure build combination of secure renegotiation
    enabled with extended master secret disabled when session resumption is
    enabled
  * Updated building and running with Apple M1
  * Apache httpd build without TLS 1.3 macro guard added
  * Enable SHA3 and SHAKE256 requirements automatically when ED448 is enabled
  * Added option for AES CBC cipher routines to return BAD_LENGTH_E when called
    with an input buffer length not a multiple of AES_BLOCK_SIZE
  * Macro WOLFSSL_SP_INT_DIGIT_ALIGN added for alignment on buffers with SP
    build. This was needed for compiler building on a Renesas board.
  * Build support with no hashes enabled an no RNG compiled in
  * Allow use of FREESCALE hardware RNG without a specific port
  * Resolved some warnings with Windows builds and PBKDF disabled
  * Updated the version of autoconf and automake along with fixes for some new
    GCC-10 warnings

Math Libraries

  * SP: Thumb implementation that works with clang
  * SP math all: sp_cmp handling of negative values
  * SP C ECC: mont sub - always normalize after sub before check for add
  * TFM math library prime checking, added more error checks with small stack
    build
  * Sanity checks on 0 value with GCD math function
  * fp_exptmod_ct error checking and small stack variable free on error
  * Sanity check on supported digit size when calling mp_add_d in non fastmath
    builds
  * Support for mp_dump with SP Math ALL
  * WOLFSSL_SP_NO_MALLOC for both the normal SP build and small SP build now
  * WOLFSSL_SP_NO_DYN_STACK added for SP small code that is not small stack
    build to avoid dynamic stack

PKCS 7/8

  * wc_PKCS7_DecodeCompressedData to optionally handle a packet without content
    wrapping
  * Added setting of content type parsed with PKCS7
    wc_PKCS7_DecodeAuthEnvelopedData and wc_PKCS7_DecodeEnvelopedData
  * PKCS8 code improvements and refactoring

Misc.

  * Sanity checks on null inputs to the functions wolfSSL_X509_get_serialNumber
    and wolfSSL_X509_NAME_print_ex
  * Added ARM CryptoCell support for importing public key with
    wc_ecc_import_x963_ex()
  * Improved checking for possible use of key->dp == NULL cases with ECC
    functions
  * Updated SHAKE256 to compile with NIST FIPS 202 standard and added support
    for OID values (thanks to strongX509)
  * Improved ECC operations when using WOLFSSL_NO_MALLOC
  * Added WOLFSSL_SNIFFER_FATAL_ERROR for an return value when sniffer is in a
    fatal state
  * Allow parsing spaces in Base64_SkipNewline
  * Issue callback when exceeding depth limit rather than error out with
    OPENSSL_EXTRA build
  * Added NXP LTC RSA key generation acceleration

For additional vulnerability information visit the vulnerability page at
https://www.wolfssl.com/docs/security-vulnerabilities/

See INSTALL file for build instructions.
More info can be found on-line at https://wolfssl.com/wolfSSL/Docs.html
2021-07-15 04:39:31 +00:00
bsiegert
2a170b1b26 go-crypto: get rid of Makefile.common
The go-crypto-acme package no longer exists, so the common Makefile is no
longer needed.
2021-07-13 11:46:56 +00:00
bsiegert
267ed82d11 Revbump all Go packages after go116 update 2021-07-13 11:36:30 +00:00
jperkin
171def8045 openssl: Stop passing CFLAGS/LDFLAGS to configure.
If this ever worked it only did by accident.  Specifying, for example,
"-arch arm64" as used on macOS is enough to break its custom configure
script that assumes all arguments start with "-".

The flags seem to propogate through the environment normally.
2021-07-10 15:40:52 +00:00
adam
06bf5239b7 py-stix: mark as not for Python 2.7 2021-07-09 18:59:05 +00:00
adam
2178fc8040 py-cybox: mark as not for Python 2.7 2021-07-09 18:58:29 +00:00
schmonz
0efaad1271 On Mac OS X Snow Leopard with ABI=64, configure was selecting a 32-bit
build (and then failing in the assembler). Override its choice on
Darwin/x86_64 by specifying KERNEL_BITS=${ABI} in CONFIGURE_ENV.
2021-07-09 18:22:56 +00:00
pin
a160409cf8 security/gpg-tui: update to 0.7.0
[0.7.0] - 2021-07-07

Added:
-Add --select option (#24)

Changed:
-Extend the FromStr implementation of CopyType
-Rename clipboard module and CopyType struct to 'selection'
2021-07-08 13:19:50 +00:00
rhialto
c3ec16f64a security/pam-af: "Fix" missing pam_sm_authenticate().
Hacky workaround for

Jul  5 16:38:36 murthe sshd: in openpam_dispatch(): /usr/pkg/lib/security/pam_af.so: no pam_sm_authenticate()
Jul  5 16:38:36 murthe sshd: in openpam_check_error_code(): pam_sm_authenticate(): unexpected return value 2

See http://mail-index.netbsd.org/tech-pkg/2021/07/05/msg025227.html and
http://gnats.netbsd.org/39313.
2021-07-06 20:01:17 +00:00