Commit graph

394 commits

Author SHA1 Message Date
jperkin
0838186bb1 Add back manual page which somehow was removed yet got past install checks. 2014-10-15 19:55:53 +00:00
jperkin
5fbce38631 Update to openssl-1.0.1j.
Changes between 1.0.1i and 1.0.1j [15 Oct 2014]

  *) SRTP Memory Leak.

     A flaw in the DTLS SRTP extension parsing code allows an attacker, who
     sends a carefully crafted handshake message, to cause OpenSSL to fail
     to free up to 64k of memory causing a memory leak. This could be
     exploited in a Denial Of Service attack. This issue affects OpenSSL
     1.0.1 server implementations for both SSL/TLS and DTLS regardless of
     whether SRTP is used or configured. Implementations of OpenSSL that
     have been compiled with OPENSSL_NO_SRTP defined are not affected.

     The fix was developed by the OpenSSL team.
     (CVE-2014-3513)
     [OpenSSL team]

  *) Session Ticket Memory Leak.

     When an OpenSSL SSL/TLS/DTLS server receives a session ticket the
     integrity of that ticket is first verified. In the event of a session
     ticket integrity check failing, OpenSSL will fail to free memory
     causing a memory leak. By sending a large number of invalid session
     tickets an attacker could exploit this issue in a Denial Of Service
     attack.
     (CVE-2014-3567)
     [Steve Henson]

  *) Build option no-ssl3 is incomplete.

     When OpenSSL is configured with "no-ssl3" as a build option, servers
     could accept and complete a SSL 3.0 handshake, and clients could be
     configured to send them.
     (CVE-2014-3568)
     [Akamai and the OpenSSL team]

  *) Add support for TLS_FALLBACK_SCSV.
     Client applications doing fallback retries should call
     SSL_set_mode(s, SSL_MODE_SEND_FALLBACK_SCSV).
     (CVE-2014-3566)
     [Adam Langley, Bodo Moeller]

  *) Add additional DigestInfo checks.

     Reencode DigestInto in DER and check against the original when
     verifying RSA signature: this will reject any improperly encoded
     DigestInfo structures.

     Note: this is a precautionary measure and no attacks are currently known.

     [Steve Henson]
2014-10-15 19:04:40 +00:00
wiz
cda18437be Remove pkgviews: don't set PKG_INSTALLATION_TYPES in Makefiles. 2014-10-09 14:05:50 +00:00
wiz
e8647fedbb Remove SVR4_PKGNAME, per discussion on tech-pkg. 2014-10-09 13:44:32 +00:00
wiz
40fcfa905a Fix typo in previous. From PR 49131. 2014-08-21 15:48:52 +00:00
wiz
8465272e00 On AIX, openssl ignores $CC & defaults to using the aix-cc profile
& building with /usr/vac/bin/cc, add the necessary checks to Makefile
to use the correct profile depending on what CC/ABI is set to.

Patch from Sevan Janiyan in PR 49131, but moved a few lines to not
affect Darwin.
2014-08-21 08:02:56 +00:00
obache
c62adf2f13 Update openssl to 1.0.1i.
Changes between 1.0.1h and 1.0.1i [6 Aug 2014]

  *) Fix SRP buffer overrun vulnerability. Invalid parameters passed to the
     SRP code can be overrun an internal buffer. Add sanity check that
     g, A, B < N to SRP code.

     Thanks to Sean Devlin and Watson Ladd of Cryptography Services, NCC
     Group for discovering this issue.
     (CVE-2014-3512)
     [Steve Henson]

  *) A flaw in the OpenSSL SSL/TLS server code causes the server to negotiate
     TLS 1.0 instead of higher protocol versions when the ClientHello message
     is badly fragmented. This allows a man-in-the-middle attacker to force a
     downgrade to TLS 1.0 even if both the server and the client support a
     higher protocol version, by modifying the client's TLS records.

     Thanks to David Benjamin and Adam Langley (Google) for discovering and
     researching this issue.
     (CVE-2014-3511)
     [David Benjamin]

  *) OpenSSL DTLS clients enabling anonymous (EC)DH ciphersuites are subject
     to a denial of service attack. A malicious server can crash the client
     with a null pointer dereference (read) by specifying an anonymous (EC)DH
     ciphersuite and sending carefully crafted handshake messages.

     Thanks to Felix Gröbert (Google) for discovering and researching this
     issue.
     (CVE-2014-3510)
     [Emilia Käsper]

  *) By sending carefully crafted DTLS packets an attacker could cause openssl
     to leak memory. This can be exploited through a Denial of Service attack.
     Thanks to Adam Langley for discovering and researching this issue.
     (CVE-2014-3507)
     [Adam Langley]

  *) An attacker can force openssl to consume large amounts of memory whilst
     processing DTLS handshake messages. This can be exploited through a
     Denial of Service attack.
     Thanks to Adam Langley for discovering and researching this issue.
     (CVE-2014-3506)
     [Adam Langley]

  *) An attacker can force an error condition which causes openssl to crash
     whilst processing DTLS packets due to memory being freed twice. This
     can be exploited through a Denial of Service attack.
     Thanks to Adam Langley and Wan-Teh Chang for discovering and researching
     this issue.
     (CVE-2014-3505)
     [Adam Langley]

  *) If a multithreaded client connects to a malicious server using a resumed
     session and the server sends an ec point format extension it could write
     up to 255 bytes to freed memory.

     Thanks to Gabor Tyukasz (LogMeIn Inc) for discovering and researching this
     issue.
     (CVE-2014-3509)
     [Gabor Tyukasz]

  *) A malicious server can crash an OpenSSL client with a null pointer
     dereference (read) by specifying an SRP ciphersuite even though it was not
     properly negotiated with the client. This can be exploited through a
     Denial of Service attack.

     Thanks to Joonas Kuorilehto and Riku Hietamäki (Codenomicon) for
     discovering and researching this issue.
     (CVE-2014-5139)
     [Steve Henson]

  *) A flaw in OBJ_obj2txt may cause pretty printing functions such as
     X509_name_oneline, X509_name_print_ex et al. to leak some information
     from the stack. Applications may be affected if they echo pretty printing
     output to the attacker.

     Thanks to Ivan Fratric (Google) for discovering this issue.
     (CVE-2014-3508)
     [Emilia Käsper, and Steve Henson]

  *) Fix ec_GFp_simple_points_make_affine (thus, EC_POINTs_mul etc.)
     for corner cases. (Certain input points at infinity could lead to
     bogus results, with non-infinity inputs mapped to infinity too.)
     [Bodo Moeller]
2014-08-07 01:29:45 +00:00
ryoon
f0c3019e41 SCO OpenServer 5.0.7/3.2 does not support SSSE3. 2014-07-18 10:32:37 +00:00
wiz
65b61e5b69 Update to 1.0.1h:
Major changes between OpenSSL 1.0.1g and OpenSSL 1.0.1h [5 Jun 2014]

      o Fix for CVE-2014-0224
      o Fix for CVE-2014-0221
      o Fix for CVE-2014-0195
      o Fix for CVE-2014-3470
      o Fix for CVE-2010-5298
2014-06-05 12:16:06 +00:00
obache
103141f651 Fixes missing override of pc files.
PR pkg/48871.

Bump PKGREVISION.
2014-06-05 03:14:05 +00:00
obache
77c21dcc36 No reason to require gtar. 2014-06-05 02:53:18 +00:00
wiz
7eeb51b534 Bump for perl-5.20.0.
Do it for all packages that
* mention perl, or
* have a directory name starting with p5-*, or
* depend on a package starting with p5-
like last time, for 5.18, where this didn't lead to complaints.
Let me know if you have any this time.
2014-05-29 23:35:13 +00:00
obache
09986a2875 one more catch up to removal of /boot/common on Haiku. 2014-05-18 11:20:53 +00:00
obache
132dcc3b78 catch up to removal of /boot/common on Haiku. 2014-05-18 11:18:17 +00:00
wiz
cb806de263 Set LICENSE. 2014-05-15 09:59:32 +00:00
rodent
4ff3edbefc Fix build on OpenBSD/sparc64. Defuzz patches (sorry if this is annoying). 2014-05-13 02:23:11 +00:00
obache
88baaa4e71 Remove BUILTIN_PKG.openssl masquerade for NetBSD.
We need buitin version to check suficient API, not for security fix.
2014-04-27 01:57:51 +00:00
obache
99be5331b2 removed obsolated patche entries. 2014-04-08 23:58:03 +00:00
obache
397c6236b4 Update openssl to 1.0.1g.
(CVE-2014-0076 is already fixed in pkgsrc).

 OpenSSL CHANGES
 _______________

 Changes between 1.0.1f and 1.0.1g [7 Apr 2014]

  *) A missing bounds check in the handling of the TLS heartbeat extension
     can be used to reveal up to 64k of memory to a connected client or
     server.

     Thanks for Neel Mehta of Google Security for discovering this bug and to
     Adam Langley <agl@chromium.org> and Bodo Moeller <bmoeller@acm.org> for
     preparing the fix (CVE-2014-0160)
     [Adam Langley, Bodo Moeller]

  *) Fix for the attack described in the paper "Recovering OpenSSL
     ECDSA Nonces Using the FLUSH+RELOAD Cache Side-channel Attack"
     by Yuval Yarom and Naomi Benger. Details can be obtained from:
     http://eprint.iacr.org/2014/140

     Thanks to Yuval Yarom and Naomi Benger for discovering this
     flaw and to Yuval Yarom for supplying a fix (CVE-2014-0076)
     [Yuval Yarom and Naomi Benger]

  *) TLS pad extension: draft-agl-tls-padding-03

     Workaround for the "TLS hang bug" (see FAQ and opensslPR#2771): if the
     TLS client Hello record length value would otherwise be > 255 and
     less that 512 pad with a dummy extension containing zeroes so it
     is at least 512 bytes long.

     [Adam Langley, Steve Henson]
2014-04-08 06:20:44 +00:00
obache
8f680591fb p5-Perl4-CoreLibs is not required for perl<5.16 2014-04-08 02:48:38 +00:00
he
2a6526e1ff Rename all remaining patch-?? files using the newer naming convention.
Add a fix for CVE-2014-0076:

  Fix for the attack described in the paper "Recovering OpenSSL
  ECDSA Nonces Using the FLUSH+RELOAD Cache Side-channel Attack"
  by Yuval Yarom and Naomi Benger. Details can be obtained from:
  http://eprint.iacr.org/2014/140

  Thanks to Yuval Yarom and Naomi Benger for discovering this
  flaw and to Yuval Yarom for supplying a fix.

Fix from culled from
http://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=2198be3483259de374f91e57d247d0fc667aef29

Bump PKGREVISION.
2014-04-02 12:11:35 +00:00
jperkin
9e7a1ba4b9 Set USE_GCC_RUNTIME=yes for packages which build shared libraries but do
not use libtool to do so.  This is required to correctly depend upon a
gcc runtime package (e.g. gcc47-libs) when using USE_PKGSRC_GCC_RUNTIME.
2014-03-13 11:08:49 +00:00
obache
b19d0b31b2 Cygwin DLLs are handled automatically now. 2014-03-08 09:10:52 +00:00
obache
84aefd5c1e Cygwin also has shlib. 2014-03-08 08:53:14 +00:00
obache
90a8b0055f adapt to Haiku R1alpha4 2014-03-03 06:56:35 +00:00
obache
7202a177b8 Fixes builtin detection with CHECK_BUILTIN.openssl=yes.
Define BUILTINK_API_DEPENDS.openssl same as buildlink3.mk if not defined yet
for the case checking builtin (CHECK_BUILTIN.openssl==yes).
2014-02-22 09:45:36 +00:00
tron
4c3dc82f94 Undo undesired ABI version bump done by "blbump" script. 2014-02-12 23:23:17 +00:00
tron
6c2b758ecf Set minimum required API version of OpenSSL to 1.0.1c:
1.) OpenSSL 0.9.8* doesn't support TLS 1.2, Elliptic curve cryptography
    and other modern TLS features.
2.) Supporting OpenSSL 0.9.8* causes extra maintenance overhead.

As a result NetBSD 5.*, all versions of Mac OS X and possibly other
platforms will now use OpenSSL from "pkgsrc".
2014-02-12 23:16:21 +00:00
bsiegert
3fe5611529 Add support for MirBSD to OpenSSL. 2014-01-14 21:51:00 +00:00
tron
be45876be2 Update "openssl" package to version 1.0.1f. Changes since 1.0.1e:
- Fix for TLS record tampering bug. A carefully crafted invalid
  handshake could crash OpenSSL with a NULL pointer exception.
  Thanks to Anton Johansson for reporting this issues.
  (CVE-2013-4353)
- Keep original DTLS digest and encryption contexts in retransmission
  structures so we can use the previous session parameters if they need
  to be resent. (CVE-2013-6450)
  [Steve Henson]
- Add option SSL_OP_SAFARI_ECDHE_ECDSA_BUG (part of SSL_OP_ALL) which
  avoids preferring ECDHE-ECDSA ciphers when the client appears to be
  Safari on OS X.  Safari on OS X 10.8..10.8.3 advertises support for
  several ECDHE-ECDSA ciphers, but fails to negotiate them.  The bug
  is fixed in OS X 10.8.4, but Apple have ruled out both hot fixing
  10.8..10.8.3 and forcing users to upgrade to 10.8.4 or newer.
  [Rob Stradling, Adam Langley]
2014-01-10 14:32:42 +00:00
is
3171d9ec1f The syntax of the Configure architecture table changed recently. Our
entries for NetbSD architectures without assembler routines and Interix
containing ::::::... need to be updated, else -fPIC ends up in the
object-to-build list of crypto/modes. The correct entry snippet is
stored in ${no_asm}.
make test has run successfully in pkgsrc-current and -2013Q3 on
Shark (arm, asm-less) as well as i386 (with asm routines).
2013-12-21 12:21:47 +00:00
obache
4a153fe6a6 Use find-headers instead of find-files to detect builtin header files. 2013-11-23 12:10:13 +00:00
joerg
b48dad7d32 For Linux/POWERPC64 override the default target, otherwise bad things
happen (TM).
2013-10-29 21:33:21 +00:00
obache
0d0cc39bb3 Change to create fake *.pc files much close to real one.
Fixes to detect its prefix with `pkg-config --variable=prefix", such as CMake.
2013-10-06 12:54:10 +00:00
jperkin
2ac838771f Unbreak previous. 2013-10-05 07:01:06 +00:00
joerg
51c643e22a Don't mess with the normal PLIST.${OPSYS} logic. Use a variable to
control whether PLIST.shlib should be included or not.
2013-10-03 11:15:48 +00:00
joerg
2f73225a5c Fix case. 2013-10-02 20:03:33 +00:00
joerg
45614db3ea Cygwin specific shared libraries. 2013-10-02 20:00:27 +00:00
joerg
a859a8f210 Drop Windows specific parts to get results consistent with all other
platforms for the man pages.
2013-10-02 19:59:31 +00:00
richard
57973e7744 fix openssl builtin support, at least for solaris 2013-08-27 05:42:34 +00:00
ryoon
aa2940ea0f Bump PKGREVISION.
* For DragonFly, use its own condition.
* Add Debian GNU/kFreeBSD support.
2013-07-26 11:27:02 +00:00
adam
63e774599d Allow absolute paths arguments for Configure (e.g. -isysroot /path) 2013-06-13 07:51:26 +00:00
obache
93cd6e0bac require `fgrep' as a tool.
fixes build on Haiku, noticed by diger in pkgsrc-users@.
2013-06-07 07:17:15 +00:00
sbd
adbfb4120e Fix openssl pod docs to work with the very picky pod2man from perl-5.18.0. 2013-06-01 08:03:55 +00:00
wiz
d2ca14a3f1 Bump all packages for perl-5.18, that
a) refer 'perl' in their Makefile, or
b) have a directory name of p5-*, or
c) have any dependency on any p5-* package

Like last time, where this caused no complaints.
2013-05-31 12:39:57 +00:00
obache
3d31ddfc09 prevent to reorder libcrypt and libcrypto for Cygwin,
it break to build openssl module for ruby193.
2013-04-03 11:56:20 +00:00
taca
3231eb3717 Oops, forgot to "cvs rm" an obsolete patch file.
Thanks to wiz@ noted via mail.
2013-02-13 15:09:48 +00:00
taca
e7d146917c Update OpenSSL to 1.0.1e. ("Corrected fix" was already incorporated in pkgsrc.)
OpenSSL version 1.0.1e released
===============================

OpenSSL - The Open Source toolkit for SSL/TLS
http://www.openssl.org/

The OpenSSL project team is pleased to announce the release of
version 1.0.1e of our open source toolkit for SSL/TLS. This new
OpenSSL version is a new feature release. For a complete
list of changes, please see

    http://www.openssl.org/source/exp/CHANGES.

The most significant changes are:

   o Corrected fix for CVE-2013-0169
2013-02-13 14:35:19 +00:00
jperkin
74d287ece9 Fix NetBSD/amd64 build. 2013-02-08 15:58:02 +00:00
jperkin
5d16921570 Apply upstream patch to fix data corruption.
Bump PKGREVISION.
2013-02-08 14:11:08 +00:00