Commit graph

6598 commits

Author SHA1 Message Date
pettai
a1d19e3c9f OpenDNSSEC 1.3.13 - 2013-02-20
Bugfixes:
* OPENDNSSEC-388: Signer Engine: Internal serial should take into account
  the inbound serial.
* OPENDNSSEC-242: Signer Engine: Could get stuck on load signconf while
  signconf was not changed.
* Signer Engine: Fixed locking and notification on the drudge work queue,
  signals could be missed so that drudgers would stall when there was work to
  be done.
2013-02-21 15:51:17 +00:00
dholland
9570ccfb13 Revbump all elisp packages after emacs changes. 2013-02-17 19:17:55 +00:00
agc
9a1be438bb Update ipv6-toolkit from 1.3beta to 1.3
Changes since previous version:

+ Minor documentation updates
+ gmake no longer needed to build
+ updated patch - still needed to quieten compiler for ctype warnings
  (reported upstream)
2013-02-16 22:39:46 +00:00
wiz
a75b0835ea Fix incorrect expansion (use PYPKGPREFIX instead of hardcoded py27) 2013-02-16 12:07:26 +00:00
wiz
a96f4900ac Recursive bump for png-1.6. 2013-02-16 11:18:58 +00:00
obache
0d34aa549d recursive bump from boost-lib shlib update. 2013-02-15 11:53:59 +00:00
schmonz
e1c8f84acd Update to 1.7.1. From the changelog:
* Fix autoconf issues...
2013-02-14 19:48:04 +00:00
taca
5740baec1d Oops, forgot to "cvs rm" an obsolete patch file.
Thanks to wiz@ noted via mail.
2013-02-13 15:09:48 +00:00
taca
35a4dfdb52 Update OpenSSL to 1.0.1e. ("Corrected fix" was already incorporated in pkgsrc.)
OpenSSL version 1.0.1e released
===============================

OpenSSL - The Open Source toolkit for SSL/TLS
http://www.openssl.org/

The OpenSSL project team is pleased to announce the release of
version 1.0.1e of our open source toolkit for SSL/TLS. This new
OpenSSL version is a new feature release. For a complete
list of changes, please see

    http://www.openssl.org/source/exp/CHANGES.

The most significant changes are:

   o Corrected fix for CVE-2013-0169
2013-02-13 14:35:19 +00:00
drochner
62040fbfdc update to 3.0.28
changes: bugfixes

This prevents the recent TLS CBC padding timing attack (CVE-2013-1619).
2013-02-12 13:16:25 +00:00
agc
cbf2fbae6f Fix the package name to reflect that this is version 1.3beta 2013-02-11 07:22:29 +00:00
agc
418d2db14c Add and enable ipv6-toolkit 2013-02-11 06:56:32 +00:00
agc
6fe3e391c6 Initial import of the SI6 ipv6-toolkit, a security assessment and
troubleshooting package for ipv6, into the Packages Collection. This is version
1.3b.

	The SI6 Networks' IPv6 toolkit is a set of IPv6
	security/trouble-shooting tools, that can send arbitrary IPv6-based
	packets.

	flow6:	A tool to perform a security asseessment of the IPv6 Flow Label.
	frag6:  A tool to perform IPv6 fragmentation-based attacks and to
		perform a security assessment of a number of fragmentation-related
		aspects.
	icmp6:	A tool to perform attacks based on ICMPv6 error messages.
	jumbo6:	A tool to assess potential flaws in the handling of IPv6 Jumbograms.
	na6:	A tool to send arbitrary Neighbor Advertisement messages.
	ni6:	A tool to send arbitrary ICMPv6 Node Information messages, and
		assess possible flaws in the processing of such packets.
	ns6:	A tool to send arbitrary Neighbor Solicitation messages.
	ra6:	A tool to send arbitrary Router Advertisement messages.
	rd6:	A tool to send arbitrary ICMPv6 Redirect messages.
	rs6:	A tool to send arbitrary Router Solicitation messages.
	scan6:	An IPv6 address scanning tool.
	tcp6:	A tool to send arbitrary TCP segments and perform a variety of
		TCP-based attacks.
2013-02-11 06:55:05 +00:00
taca
b7723b1dfc Depends on rubygems when ruby's version is 1.8.7.
Bump PKGREVISION.
2013-02-11 05:01:13 +00:00
taca
59c36ebd61 Update ruby-net-ssh-gateway to 1.2.0.
=== 1.2.0 / 06 Feb 2013

* Added public cert. All gem releases are now signed. See INSTALL in readme.
2013-02-11 02:08:16 +00:00
taca
b4413c408d Update ruby-net-sftp to 2.1.1.
=== 2.1.0 / 06 Feb 2013

* Added public cert. All gem releases are now signed. See INSTALL in readme.
* Remove self-require, it causes a warning in Ruby 1.9.2. [jbarnette]
* Allow for upload to use the filename of the local file by default [czarneckid]
* Properly handle receiving less data than requested. [thedarkone]
* Added option to create directory on directory upload [Pablo Merino]
* Remove a warnings in tests [kachick]
2013-02-11 02:07:37 +00:00
taca
dc91076e52 Update ruby-net-scp to 1.1.0.
=== 1.1.0 / 06 Feb 2013

* Added public cert. All gem releases are now signed. See INSTALL in readme.
2013-02-11 02:07:09 +00:00
taca
d8ef2538e8 Update ruby-net-ssh to 2.6.5.
=== 2.6.5 / 06 Feb 2013

* Fixed path in gemspec [thanks priteau]

=== 2.6.4 / 06 Feb 2013

* Added license info to gemspec [jordimassaguerpla]
* Added public cert. All gem releases are now signed.


=== 2.6.3 / 10 Jan 2013

* Small doc fix and correct error class for PKey::EC key type [Andreas Wolff]
* Improve test dependencies [Kenichi Kamiya]
2013-02-11 02:06:29 +00:00
ryoon
5482a9caec Bump PKGREVISION from audio/jack. 2013-02-09 22:11:28 +00:00
wiz
4c38f925c6 Remove obsolete sentence about idea. 2013-02-09 15:49:55 +00:00
jperkin
34c14adeed Fix NetBSD/amd64 build. 2013-02-08 15:58:02 +00:00
jperkin
86215ba544 Apply upstream patch to fix data corruption.
Bump PKGREVISION.
2013-02-08 14:11:08 +00:00
wiz
5c15aed9d8 Revert API depends change, not needed.
Ok jperkin.
2013-02-07 11:30:57 +00:00
tron
b6e0049ff9 Reduce minium required OpenSSL version to 1.0.1c (instead of 1.0.1d) which
is what NetBSD 6.0* ships with.

The minimum ABI version was incorrect anyway and a result of an unnecessary
revision bump of the "openssl" package.
2013-02-07 10:22:57 +00:00
jperkin
84991145cf PKGREVISION bumps for the security/openssl 1.0.1d update. 2013-02-06 23:20:50 +00:00
jperkin
a6e80dcb89 Update OpenSSL to 1.0.1d. Changes are far too numerous to list, the main one being
that we can now take advantage of AES-NI support in modern processors to significantly
increase performance.

Miscellaneous pkgsrc changes:

 - Remove unnecessary warning message on Solaris.
 - Fix RPATH for libgost.so.
 - MD2 support is optional, enabled by default for compatability.
2013-02-06 21:40:33 +00:00
jperkin
7cbb9ad82e PKGREVISION bumps for net/libpcap update. 2013-02-06 19:30:54 +00:00
taca
3bc15789dc Update openssl to 0.9.8y.
Changes between 0.9.8x and 0.9.8y [5 Feb 2013]

  *) Make the decoding of SSLv3, TLS and DTLS CBC records constant time.

     This addresses the flaw in CBC record processing discovered by
     Nadhem Alfardan and Kenny Paterson. Details of this attack can be found
     at: http://www.isg.rhul.ac.uk/tls/

     Thanks go to Nadhem Alfardan and Kenny Paterson of the Information
     Security Group at Royal Holloway, University of London
     (www.isg.rhul.ac.uk) for discovering this flaw and Adam Langley and
     Emilia Käsper for the initial patch.
     (CVE-2013-0169)
     [Emilia Käsper, Adam Langley, Ben Laurie, Andy Polyakov, Steve Henson]

  *) Return an error when checking OCSP signatures when key is NULL.
     This fixes a DoS attack. (CVE-2013-0166)
     [Steve Henson]

  *) Call OCSP Stapling callback after ciphersuite has been chosen, so
     the right response is stapled. Also change SSL_get_certificate()
     so it returns the certificate actually sent.
     See http://rt.openssl.org/Ticket/Display.html?id=2836.
     (This is a backport)
     [Rob Stradling <rob.stradling@comodo.com>]

  *) Fix possible deadlock when decoding public keys.
     [Steve Henson]
2013-02-05 15:54:30 +00:00
wiz
b31a3cc86f Update HOMEPAGE and remove commented-out sf MASTER_SITE.
From Bug Hunting.
2013-02-03 12:37:40 +00:00
jperkin
ee199d4196 Bump libssh dependency. Fixes bulk builds. 2013-02-02 01:18:03 +00:00
wiz
4be7058799 Reset MAINTAINER/OWNER (became observers) 2013-02-01 22:21:05 +00:00
is
ab202964fb Make pkg_info show the upstream version, for comparison to advisories etc. 2013-02-01 21:55:55 +00:00
is
93d8ddae69 fix typo 2013-02-01 21:50:45 +00:00
is
48d34e3762 Commit missing file, and fix the version gate. Thanks to Noud de Brouwer
for beta-testing the package.
2013-02-01 16:47:51 +00:00
is
52352e2425 Update libssh to (upstream) 0.5.4 == (our) 0.54.
(We need to keep the old numbering syntax to make versions compare
correctly.)

There are only two consumers in pkgsrc; one of them (remmina and
remmina-plugins) actually needed library version 0.4 or later, and
didn't build the ssh/sftp/nx plugins without. Hydra is also supposed
to build with 0.4.x and later.)

Upstream changelogs:

0.5.4:
        CVE-2013-0176 - NULL dereference leads to denial of service
        Fixed several NULL pointer dereferences in SSHv1.
        Fixed a free crash bug in options parsing.

and for completeness 0.5.3:

        This is an important SECURITY and maintenance release in
        order to address CVE-2012-4559, CVE-2012-4560, CVE-2012-4561
        and CVE-2012-4562.

        CVE-2012-4559 - Fix multiple double free() flaws
        CVE-2012-4560 - Fix multiple buffer overflow flaws
        CVE-2012-4561 - Fix multiple invalid free() flaws
        CVE-2012-4562 - Fix multiple improper overflow checks

        (...)

Suggested by Noud de Brouwer in wip/libssh and PR pkg/47518, but needed
some changes to PLIST as well as to make "pkg_admin audit" and updates
compare correctly.
2013-02-01 13:33:49 +00:00
is
34fd957ba1 Update libssh to (upstream) 0.5.4 == (our) 0.54.
(We need to keep the old numbering syntax to make versions compare
correctly.)

There are only two consumers in pkgsrc; one of them (remmina and
remmina-plugins) actually needed library version 0.4 or later, and
didn't build the ssh/sftp/nx plugins without. Hydra is also supposed
to build with 0.4.x and later.)

Upstream changelogs:

0.5.4:
	CVE-2013-0176 - NULL dereference leads to denial of service
	Fixed several NULL pointer dereferences in SSHv1.
	Fixed a free crash bug in options parsing.

and for completeness 0.5.3:

	This is an important SECURITY and maintenance release in
	order to address CVE-2012-4559, CVE-2012-4560, CVE-2012-4561
	and CVE-2012-4562.

	CVE-2012-4559 - Fix multiple double free() flaws
	CVE-2012-4560 - Fix multiple buffer overflow flaws
	CVE-2012-4561 - Fix multiple invalid free() flaws
	CVE-2012-4562 - Fix multiple improper overflow checks

	(...)
2013-02-01 13:33:48 +00:00
is
58dbecccf4 Update libssh to (upstream) 0.5.4 == (our) 0.54.
(We need to keep the old numbering syntax to make versions compare
correctly.)

There are only two consumers in pkgsrc; one of them (remmina and
remmina-plugins) actually needed library version 0.4 or later, and
didn't build the ssh/sftp/nx plugins without. Hydra is also supposed
to build with 0.4.x and later.)

Upstream changelogs:

0.5.4:
        CVE-2013-0176 - NULL dereference leads to denial of service
        Fixed several NULL pointer dereferences in SSHv1.
        Fixed a free crash bug in options parsing.

and for completeness 0.5.3:

        This is an important SECURITY and maintenance release in
        order to address CVE-2012-4559, CVE-2012-4560, CVE-2012-4561
        and CVE-2012-4562.

        CVE-2012-4559 - Fix multiple double free() flaws
        CVE-2012-4560 - Fix multiple buffer overflow flaws
        CVE-2012-4561 - Fix multiple invalid free() flaws
        CVE-2012-4562 - Fix multiple improper overflow checks

        (...)

Suggested by Noud de Brouwer in wip/libssh and PR pkg/47518, but needed
some changes to PLIST as well as to make "pkg_admin audit" and updates
compare correctly.
2013-02-01 13:33:48 +00:00
is
6e6a3ae980 Update libssh to (upstream) 0.5.4 == (our) 0.54.
(We need to keep the old numbering syntax to make versions compare
correctly.)

There are only two consumers in pkgsrc; one of them (remmina and
remmina-plugins) actually needed library version 0.4 or later, and
didn't build the ssh/sftp/nx plugins without. Hydra is also supposed
to build with 0.4.x and later.)

Upstream changelogs:

0.5.4:
	CVE-2013-0176 - NULL dereference leads to denial of service
	Fixed several NULL pointer dereferences in SSHv1.
	Fixed a free crash bug in options parsing.

and for completeness 0.5.3:

	This is an important SECURITY and maintenance release in
	order to address CVE-2012-4559, CVE-2012-4560, CVE-2012-4561
	and CVE-2012-4562.

	CVE-2012-4559 - Fix multiple double free() flaws
	CVE-2012-4560 - Fix multiple buffer overflow flaws
	CVE-2012-4561 - Fix multiple invalid free() flaws
	CVE-2012-4562 - Fix multiple improper overflow checks

	(...)
2013-02-01 13:33:48 +00:00
jperkin
e684297678 Fix the first master site. 2013-02-01 13:13:22 +00:00
hans
f214b5b652 Use LIBABISUFFIX when creating the .pc files to make builtin openssl
work on 64bit SunOS and possibly others.
2013-02-01 12:34:15 +00:00
wiz
07c4cc2d86 Update mozilla root certificates to 20121229 version. 2013-01-31 09:39:00 +00:00
wiz
5d4ee43520 automake-1.13 compat. 2013-01-26 23:11:13 +00:00
wiz
0fda9cd3d1 Fix for automake-1.13. 2013-01-26 22:02:06 +00:00
adam
d1ab9d8533 Revbump after graphics/jpeg and textproc/icu 2013-01-26 21:36:13 +00:00
wiz
6a3821f2ae Fix build with automake-1.13. 2013-01-23 17:26:27 +00:00
riz
4e08b046b7 Set up PLIST_VARS for ppc and arm, and use them to point out that arm
doesn't have hardware timer support, so gets one less file installed.

Package builds on evbarm now.
2013-01-23 16:45:27 +00:00
rhaen
b916c2ca65 - updated to 2.15
ChangeLog:

2.15    2012-09-07      Abhijit Menon-Sen <ams@toroid.org>

    * Include 'strict' in PREREQ_PM to silence cpantesters. No
      functional changes.
2013-01-23 10:25:06 +00:00
drochner
7ca9b4fd6a wants to use pkg-config 2013-01-15 11:29:21 +00:00
drochner
ed45871cce add patch from upstream to fix possible keyring corruption
on import of corrupted keys (CVE-2012-6085), bump PKGREV
from "Bug Hunting" per PR pkg/47442
2013-01-15 11:21:50 +00:00
wiz
981b808730 Update to 5.81:
5.81  Mon Jan 14 05:17:08 MST 2013
	- corrected load subroutine (SHA.pm) to prevent double-free
		-- Bug #82655: Security issue - segfault
		-- thanks to Victor Efimov and Nicholas Clark
			for technical expertise and suggestions

5.80  Mon Dec 10 14:15:26 MST 2012
	- obtained noticeable speedup on Intel/gcc
		-- by setting -O1 and -fomit-frame-pointer
		-- SHA-1 about 63% faster, SHA-2 improves 11-20%

5.74  Sat Nov 24 03:10:18 MST 2012
	- handle wide-string input by converting to bytes first
		-- viz. use SvPVbyte instead of SvPV in SHA.xs
		-- thanks to Eric Brine for summary and code

5.73  Wed Oct 31 04:32:44 MST 2012
	- provided workaround for DEC compiler bug (ref. Makefile.PL)
2013-01-15 10:47:15 +00:00