Commit graph

11120 commits

Author SHA1 Message Date
nia
6e2ea1baf5 stunnel: update to 5.59
### Version 5.59, 2021.04.05, urgency: HIGH
* Security bugfixes
  - OpenSSL DLLs updated to version 1.1.1k.
* New features
  - Client-side "protocol = ldap" support (thx to Bart
    Dopheide and Seth Grover).
* Bugfixes
  - The test suite fixed not to require external connectivity.
  - Fixed paths in generated manuals (thx to Tatsuki Makino).
  - Fixed configuration reload when compression is used.
  - Fixed compilation with early releases of OpenSSL 1.1.1.
2021-04-21 09:02:32 +00:00
adam
ff1b1666ef libgcrypt: updated to 1.9.3
Noteworthy changes in version 1.9.3 (2021-04-19)
------------------------------------------------

 * Bug fixes:
   - Fix build problems on i386 using gcc-4.7.
   - Fix checksum calculation in OCB decryption for AES on s390.
   - Fix a regression in gcry_mpi_ec_add related to certain usages of
     curve 25519.
   - Fix a symbol not found problem on Apple M1.
   - Fix for Apple iOS getentropy peculiarity.
   - Make keygrip computation work for compressed points.

* Performance:
   - Add x86_64 VAES/AVX2 accelerated implementation of Camellia.
   - Add x86_64 VAES/AVX2 accelerated implementation of AES.
   - Add VPMSUMD acceleration for GCM mode on PPC.

 * Internal changes.
   - Harden MPI conditional code against EM leakage.
   - Harden Elgamal by introducing exponent blinding.
   - Fix memory leaks in the error code paths of EdDSA.
2021-04-21 08:28:31 +00:00
pin
0c59914cdf security/lxqt-openssh-askpass: update to 0.17.0
lxqt-openssh-askpass-0.17.0 / 2021-04-15
========================================
  * Updated README.md.
2021-04-20 18:29:35 +00:00
pin
7ec78410a8 security/lxqt-sudo: update to 0.17.0
lxqt-sudo-0.17.0 / 2021-04-15
=============================
  - Handled Qt5.15's deprecations.
2021-04-20 18:28:19 +00:00
pin
11754e328d security/lxqt-policykit: update to 0.17.0
lxqt-policykit-0.17.0 / 2021-04-15
==================================
  - Completely moved to Qt5 signal/slot syntax.
  - A better memory handling in PolicykitAgent.
  - Code cleanup.
  - Improved code readability.
2021-04-20 18:23:38 +00:00
wiz
c3e5c57b0b tor-browser-https-everywhere: update to 2021.4.15.
2021.4.15
* Add DuckDuckGo Smarter Encryption update channel
* Bloom filter for rulesets
* Firefox Fenix option page updates for Android users
* Move to Python 3 from Python 3.6
* Fix undefined type access
* Fix empty default types
2021-04-20 16:23:49 +00:00
leot
57d50dda9f amass: Update to 3.11.13
Changes:
3.11.13
-------
 - Update user_guide.md
 - Removed the previous CI/CD configuration

3.11.12
-------
 - format: write characterization tests for parse.go
 - Moved the DNS resolvers package to another repository
 - Increased speed of the Google certificate transparency data source
 - Addressing crash during cleanup issue #599
 - Added the Security Weekly interview information

3.11.11
-------
 - Improved data source service performance
 - Addressing #519 by noticing expired contexts quickly

3.11.10
-------
 - Support for the AMASS_CONFIG environment variable
2021-04-17 11:07:03 +00:00
leot
71a2738860 sqlmap: Update to 1.5.4
Changes:
1.5.4
-----
No changelog shared by upstream but according commit messages mostly bug fixes.
2021-04-17 10:33:20 +00:00
ryoon
633bec58e9 *: Recursive revbump from devel/nss 2021-04-15 11:23:03 +00:00
adam
49008cacac py-acme py-certbot*: updated to 1.14.0
Certbot 1.14.0

Changed

certbot-auto no longer checks for updates on any operating system.
The module acme.magic_typing is deprecated and will be removed in a future release.
Please use the built-in module typing instead.
The DigitalOcean plugin now creates TXT records for the DNS-01 challenge with a lower 30s TTL.

Fixed

Don't output an empty line for a hidden certificate when certbot certificates is being used
in combination with --cert-name or -d.
2021-04-15 05:16:35 +00:00
wiz
ae12fea0c1 *: bump for vala 0.52 2021-04-14 07:28:16 +00:00
dholland
c40b549999 PR pkg/56100: security/libgcrypt fails on NetBSD/m68k
Extend the m68k assembler syntax probe to recognize NetBSD targets.
2021-04-13 17:38:12 +00:00
nia
ac81f93ac2 honeyd: update to 1.5c, fix build with "new" libevent
i would post a changelog, but loading the honeyd forum fails with this:

SQL ERROR [ mysql4 ]

Table './phpbb2/phpbb3_sessions' is marked as crashed and should be repaired [145]

An sql error occurred while fetching this page. Please contact an administrator if this problem persists.

This release is from 2007.
2021-04-13 15:42:27 +00:00
nia
95837a61bd remove security/sfs
upstream has disappeared, this doesn't build with modern C++ compilers,
and i can't find any other packages from which to steal packages to fix
it in any other packaging systems.
2021-04-13 15:19:55 +00:00
nia
5cff77dd41 remove security/srp_client
development appears stalled upstream and this does not support current
openssl or SSP.
2021-04-13 15:15:45 +00:00
nia
6b34740005 security: expand COMMENT 2021-04-12 14:29:46 +00:00
nia
efc6bdfb67 libsecret: vala is build-time dependency 2021-04-12 13:21:00 +00:00
kim
8d0965f8b9 security/priv: Document why we would want to avoid "autoreconf -fi" 2021-04-11 07:10:06 +00:00
kim
0ae04c850a security/priv: Avoid calling "autoreconf -fi" during pre-configure. 2021-04-11 06:52:54 +00:00
taca
55e4deeefd security/ruby-rex-exploitation: remove dependency to ruby-rexml
Dro dependency to ruby-rexml since all ruby*-base contains ruby-rexml
package.
2021-04-11 00:10:55 +00:00
nia
92fdc2daed pam_ssh_agent_auth: update to 0.10.4
- fixed build with openssl 1.1.
- grabbed some fixes from FreeBSD.
- now uses the new GITHUB_SUBMODULES - thx ryoon!
2021-04-10 09:10:11 +00:00
nia
36d051e224 remove security/rainbowcrack
appears to be closed source now, patches for modern openssl support
are not available.
2021-04-10 08:48:25 +00:00
nia
28e50b3233 remove security/qore-asn1-module
development of this module appears to have been inactive upstream for
years so there's no support for modern openssl available.

the other packaging systems with a package for this are macports and
opensuse, neither of which have patches.
2021-04-10 08:44:49 +00:00
nia
6921e0ed3b pkcs11-helper: update to 1.27
- fixes build with openssl 1.1
- add support for mbedtls as an option
- avoids regenerating autoconf bits

2020-11-17 - Version 1.27

* core: handle PIN expiration after C_Login as C_Login may take a while
* core: return explict success when plugin&play and no threading and no
  safefork, thanks to Tunnelblick

2020-01-21 - Version 1.26

* openssl: build with openssl ec disabled
* openssl: support RSA_NO_PADDING padding, thanks to Selva Nair
* core: reduce mutex lock scope of add/remove provider, thanks to Frank Morgner
* core: improve the fork fixup sequence

2018-08-16 - Version 1.25.1

 * core: build with threading disabled

2018-08-04 - Version 1.25

 * core: do not attempt to initialize provider with fork mode is not safe. Too
   many providers do not follow the PKCS#11 spec.

2018-06-15 - Version 1.24

 * build: support libressl-2.7

2018-06-02 - Version 1.23

 * build: cleanups.
 * openssl: rework support 1.1.

2017-02-12 - Version 1.22

 * spec: minor cleanups.

2017-01-06 - Version 1.21

 * mbedtls: fix missing logic if issur certificate, thanks to Steffan Karger

2016-12-08 - Version 1.20

 * polarssl: support polarssl-1.3, thanks to Steffan Karger.
 * certificate: ignore certificate object without CKA_ID.
 * openssl: fix memory leak, thanks to ASPj.
 * openssl: support 1.1 and libressl, thanks to Daiki Ueno.

2013-10-11 - Version 1.11

 * openssl: support generic pkey.
 * openssl: add dsa support.
 * openssl: add ecdsa support, thanks for Sanaullah for testing.
2021-04-10 08:39:23 +00:00
nia
8826abafab remove security/engine-pkcs11
this was merged into security/libp11
2021-04-10 08:26:42 +00:00
nia
4e64aba61a libp11: update to 0.4.11
- fixed installation location of openssl engine
- avoid regenerating autoconf bits

New in 0.4.11; 2020-10-11; Michał Trojnara
* Fixed "EVP_PKEY_derive:buffer too small" EC errors (Luka Logar)
* Fixed various memory leaks (Mateusz Kwiatkowski)
* Fixed Windows VERSIONINFO (Pavol Misik)
* Fixed builds with OpenSSL older than 1.0.2 (Michał Trojnara)
* Fixed a double free in EVP_PKEY_meth_free() (Mikhail Durnev)
* Added CKA_VALUE_LEN to EC key derivation template (Michał Trojnara)
* Fixed handling keys without label attribute (efternavn)
* Updated the tests (Anderson Toshiyuki Sasaki)
* Made ECDH-derived keys extractable (Bent Bisballe Nyeng)
* Added support for pin-source within PKCS#11 URI (Stanislav Levin)
* Improved LibreSSL compatibility (patchMonkey156)
* Fixed handling RSA private keys in BIND (Stanislav Levin)
* Added macOS testing support (Stanislav Levin)
* Fixed engine object search algorithm (Anderson Toshiyuki Sasaki)
2021-04-10 08:25:08 +00:00
nia
e27d345973 remove security/credns
unmaintained upstream, no support for current openssl
only other package is freebsd ports, where it's marked BROKEN
2021-04-10 08:17:36 +00:00
nia
933faacb3c validns: fix building with openssl 1.1 2021-04-10 08:16:09 +00:00
wiz
14c07cf0ce *: bump PKGREVISION for nss linking fix 2021-04-09 06:54:56 +00:00
markd
9f17ade459 kde applications release: update to 20.12.3
10 months worth of updates.
2021-04-07 12:28:14 +00:00
adam
ea29598953 py-google-auth-oauthlib: updated to 0.4.4
0.4.4

Bug Fixes

add redirect_uri_trailing slash param to run_local_server
2021-04-05 19:53:03 +00:00
adam
b40180ab92 libassuan2: updated to 2.5.5
Noteworthy changes in version 2.5.5 (2021-03-22)
------------------------------------------------
* Allows starting servers with Unicode names on Windows.
* Fix a crash in the logging code.
* Upgrade autoconf stuff.
2021-04-05 08:57:39 +00:00
tnn
c841298dcf ccid: binaries should be installed with ${INSTALL_PROGRAM}. Bump. 2021-04-03 17:12:14 +00:00
adam
b638560754 libgpg-error: updated to 1.42
Noteworthy changes in version 1.42 (2021-03-22)
* Allow Unicode file names under Windows for the gettext domain.
* Improve cross-compiling support.
* Improve $libdir determination by gpgrt-config.
* Support --disable-thread by gen-lock-obj.sh.
2021-04-01 13:18:34 +00:00
wiz
7851f5b89a tor-browser-noscript: update to 11.2.4.
v 11.2.4
============================================================
x CSS resources prefetching as a mitigation against CSS PP0
  (https://github.com/Yossioren/pp0)
x [L10n] Updated br, de, el, es, fr, he, is, nl, pl, pt_BR,
  ru, sq, tr, zh_CN
x [nscl] Inteception of webgl context creation in
  OffscreenCanvas too
x Fixed configuration upgrades not applied on manual updates
  (thanks Nan for reporting)
x Mitigation for misbehaving pages repeating failed requests
  in a tight loop
x [UI] More understandable label for the cascading
  restrictions option
x [nscl] More refactoring out in NoScript Commons Library
x [nscl] patchWindow improvements

v 11.2.4rc5
============================================================
x [nscl] Inteception of webgl context creation in
  OffscreenCanvas too
x Fixed regression: Site Info broken by NSCL refactoring

v 11.2.4rc4
============================================================
x [nscl] Fixed unmerged NetCSP "extra" headers always
  undefined
x HTML event atoms reorder in Mozilla sources

v 11.2.4rc3
============================================================
x Avoid stack trace generation for debugging purposes on
  release builds
x More selective CSS PP0 protection, excluded on the Tor
  Browser where it's unneeded and easier to test/debug on
  dev builds
x Make isTorBrowser information available in child policy
x Prevent console noise on startup with privileged tabs
x [nscl] More refactoring out in NoScript Commons Library

v 11.2.4rc2
============================================================
x [nscl] Switch to NSCL for messaging
x [nscl] Rollback unneded window.opener patching (thanks
  skriptimaahinen for insight)
x CSS PP0 mitigation: cross-site stylesheets on scriptless
  pages, one resource per host
x Limit CSS PP0 mitigation to scriptless pages and prefetch
  only cross-site resources

v 11.2.4rc1
============================================================
x CSS resources prefetching as a mitigation against CSS PP0
  (https://github.com/Yossioren/pp0)
x [L10n] Updated br, de, el, es, fr, he, is, nl, pl, pt_BR,
  ru, sq, tr, zh_CN
x Fixed configuration upgrades not applied on manual updates
  (thanks Nan for reporting)
x Mitigation for misbehaving pages repeating failed requests
  in a tight loop
x [UI] More understandable label for the cascading
  restrictions option
x [nscl] patchWindow improvements
x [nscl] Switch to NSCL's generic inclusion shell script

v 11.2.3
============================================================
x [L10n] Purged non-inclusive terms from obsolete messages
x Added red halo feedback in CUSTOM preset for noscript
  element capability
x Fixed missing red halo feedback in CUSTOM preset for
  inline scripts and other capabilities sometimes
x Fixed race condition causing noscript elements not to be
  rendered sometimes

v 11.2.2
  ============================================================
x Fixed typo in version checked on noscript capability update.
x [L10n] Updated bn, br, ca, da, de, el, es, fr, he, is, it,
  ja, lt, mk, ms, nb, nl, pt_BR, ru, sq, sv_SE, tr, zh_CN,
  zh_TW.

v 11.2.1
============================================================
x Configurable capability to show noscript elements on
  script-disabled pages
x [UI] Minor CSS Chromium compatibility fix
x [nscl] Refactoring to use Policy and its dependencies from
  the NoScript Commons Library
x Switch to faster and easier to maintain tld.js from nscl
x [UI] Fix punycode inconsistencies
x [UI] Improve preset and site controls alignment
x Provide feedback in the CUSTOM tab for WebGL usage
  attempts even if the canvas element is not attached to the
  DOM
x [L10n] Updated de, ja
x Updated HTML events
x Prevent double script on trusted file:// pages in some
  edge cases
x Prevent detection of wrapped functions (e.g. in WebGL
  interception) on Chromium

v 11.2.1rc4
============================================================
x [UI] Minor CSS Chromium compatibility fix
x Configurable capability to show noscript elements on
  script-disabled pages
x [L10n] Updated de

v 11.2.1rc3
============================================================
x [nscl] Improved integration of the NoScript Commons
  Library
x Moved nscl submodule into src
x [nscl] Update (restructured tree)
x Removed nscl cache directory from src
x [nscl] Refactoring to use Policy and its dependencies from
  the NoScript Commons Library

v 11.2.1rc2
============================================================
x Remove ||= operator which makes AMO's validator explode
x Switch to faster and easier to maintain tld.js from nscl
x [nscl] Updated with TLD_CACHE removal after usage
x [nscl] Updated NoScript Common Library inclusions
x Added the NoScript Commons Library (nscl) as a submodule
x [UI] Fix punycode inconsistencies
x [UI] improve preset and site controls alignment
x Updated TLDs
x Provide feedback in the CUSTOM tab for WebGL usage
  attempts even if the canvas element is not attached to the
  DOM
x [L10n] Updated de, ja
x Updated HTML events

v 11.2.1rc1
============================================================
x Prevent double script on trusted file:// pages in some
  edge cases
x Updated events archive
x Prevent detection of wrapped functions (e.g. in WebGL
  interception) on Chromium
x Updated TLDs
x Merge German language update

v 11.2
============================================================
x [XSS] New UI to reveal and selectively remove permanent
  user choices
x [L10n] Updated de
x Webgl hook refactored on nscl/content/patchWindow.js and
  made Chromium-compatibile
x Updated TLDs

v 11.2rc3
============================================================
x [XSS] Fixed choice manager UI bug (thanks barbaz for
  report)

v 11.2rc2
============================================================
x Updated TLDs
x [XSS] New UI to reveal and selectively remove permanent
  user choices

v 11.2rc1
============================================================
x [L10n] Updated de
x Webgl hook refactored on nscl/content/patchWindow.js and
  made Chromium-compatibile
x Updated TLDs

v 11.1.9
============================================================
x Return null when webgl is not allowed (thanks Matthew
  Finkel for patch)
x [XSS] Fixed memoization bug resulting in performance
  degradation on some payloads
x [XSS] Include call stack in debugging log output
x [XSS] Skip naps when InjectionChecker runs in its own
  worker
x Shortcut for easier XSS filter testing
x More lenient filter to add a new entry to per-site
  permissions
x [L10n] Updated de
x Replace script-embedded bitmap with css-embedded SVG as
  the placeholder logo
x Updated TLDs
x Remove source map reference causing console noise
x Fix per-site permissions UI glitches when base domain is
  added to existing subdomain (thanks barbaz for reporting)

v 11.1.9rc5
============================================================
x Return null when webgl is not allowed (thanks Matthew
  Finkel for patch)

v 11.1.9rc4
============================================================
x Updated TLDs
x [XSS] Fixed memoization bug resulting in performance
  degradation on some payloads
x [XSS] Include call stack in debugging log output
x [XSS] Skip naps when InjectionChecker runs in its own
  worker
x Shortcut for easier XSS filter testing

v 11.1.9rc3
============================================================
x More lenient filter to add a new entry to per-site
  permissions

v 11.1.9rc2
============================================================
x [L10n] Updated de
x Better fix for per-site permissions UI glitches (thanks
  barbaz for reporting)

v 11.1.9rc1
============================================================
x Replace script-embedded bitmap with css-embedded SVG as
  the placeholder logo
x Updated TLDs
x Remove source map reference causing console noise
x Fix per-site permissions UI glitches when base domain is
  added to existing subdomain (thanks barbaz for reporting)

v 11.1.8
============================================================
x [XSS] Fix for old pre-screening optimization exploitable
to bypass the filter in recent browsers - thanks Tsubasa
FUJII (@reinforchu) for reporting
x Replace DOM-based entity decoding with the he.js pure JS
library
x Updated copyright statement
x Updated browser-polyfill.js
x Removed obsolete fastclick.js dependency
x [l10n] Updated de (thanks ib and Musonius)
x Updated TLDs
2021-03-31 22:00:06 +00:00
wiz
11bda63d35 tor-browser: update to 10.0.15.
10.0.15:

Bug 40030: Add 'noscript' capability to NoScript

10.0.14:

Update Firefox to 78.9.0esr
Bug 40031: Remove survey banner on TB-stable

10.0.13:

Linux:
Bug 40328: Fix instability after upgrading to glibc 2.33
2021-03-31 21:58:51 +00:00
markd
ba58b08846 kf5: KDE Frameworks update to 5.80.0
10 months of patches/updates.
2021-03-30 10:58:21 +00:00
adam
3ed7a94fa6 volatility: fix PLIST, depend on py-sqlite3 2021-03-29 07:58:53 +00:00
mef
1f0c1dcc35 (security/volatility) regen distinfo, correct ? 2021-03-27 23:07:56 +00:00
jperkin
e362a06526 openssl: Update to 1.1.1k.
Approved by @wiz during freeze.

Changes between 1.1.1j and 1.1.1k [25 Mar 2021]

 *) Fixed a problem with verifying a certificate chain when using the
    X509_V_FLAG_X509_STRICT flag. This flag enables additional security checks
    of the certificates present in a certificate chain. It is not set by
    default.

    Starting from OpenSSL version 1.1.1h a check to disallow certificates in
    the chain that have explicitly encoded elliptic curve parameters was added
    as an additional strict check.

    An error in the implementation of this check meant that the result of a
    previous check to confirm that certificates in the chain are valid CA
    certificates was overwritten. This effectively bypasses the check
    that non-CA certificates must not be able to issue other certificates.

    If a "purpose" has been configured then there is a subsequent opportunity
    for checks that the certificate is a valid CA.  All of the named "purpose"
    values implemented in libcrypto perform this check.  Therefore, where
    a purpose is set the certificate chain will still be rejected even when the
    strict flag has been used. A purpose is set by default in libssl client and
    server certificate verification routines, but it can be overridden or
    removed by an application.

    In order to be affected, an application must explicitly set the
    X509_V_FLAG_X509_STRICT verification flag and either not set a purpose
    for the certificate verification or, in the case of TLS client or server
    applications, override the default purpose.
    (CVE-2021-3450)
    [Tomáš Mráz]

 *) Fixed an issue where an OpenSSL TLS server may crash if sent a maliciously
    crafted renegotiation ClientHello message from a client. If a TLSv1.2
    renegotiation ClientHello omits the signature_algorithms extension (where
    it was present in the initial ClientHello), but includes a
    signature_algorithms_cert extension then a NULL pointer dereference will
    result, leading to a crash and a denial of service attack.

    A server is only vulnerable if it has TLSv1.2 and renegotiation enabled
    (which is the default configuration). OpenSSL TLS clients are not impacted
    by this issue.
    (CVE-2021-3449)
    [Peter Kästle and Samuel Sapalski]
2021-03-25 16:36:19 +00:00
adam
94d9e5b1d3 nettle: updated to 3.7.2
NEWS for the Nettle 3.7.2 release

This is a bugfix release, fixing a bug in ECDSA signature
verification that could lead to a denial of service attack
(via an assertion failure) or possibly incorrect results. It
also fixes a few related problems where scalars are required
to be canonically reduced modulo the ECC group order, but in
fact may be slightly larger.

Upgrading to the new version is strongly recommended.

Even when no assert is triggered in ecdsa_verify, ECC point
multiplication may get invalid intermediate values as input,
and produce incorrect results. It's trivial to construct
alleged signatures that result in invalid intermediate values.
It appears difficult to construct an alleged signature that
makes the function misbehave in such a way that an invalid
signature is accepted as valid, but such attacks can't be
ruled out without further analysis.

Thanks to Guido Vranken for setting up the fuzzer tests that
uncovered this problem.

The new version is intended to be fully source and binary
compatible with Nettle-3.6. The shared library names are
libnettle.so.8.3 and libhogweed.so.6.3, with sonames
libnettle.so.8 and libhogweed.so.6.

Bug fixes:

* Fixed bug in ecdsa_verify, and added a corresponding test
  case.

* Similar fixes to ecc_gostdsa_verify and gostdsa_vko.

* Similar fixes to eddsa signatures. The problem is less severe
  for these curves, because (i) the potentially out or range
  value is derived from output of a hash function, making it
  harder for the attacker to to hit the narrow range of
  problematic values, and (ii) the ecc operations are
  inherently more robust, and my current understanding is that
  unless the corresponding assert is hit, the verify
  operation should complete with a correct result.

* Fix to ecdsa_sign, which with a very low probability could
  return out of range signature values, which would be
  rejected immediately by a verifier.
2021-03-21 20:03:09 +00:00
taca
f924c927d3 security/ruby-metasploit-payloads: update to 2.0.39
No release note is available.  Please refer commit log
<https://github.com/rapid7/metasploit-payloads/compare/v2.0.38...v2.0.39>
in details.
2021-03-21 13:05:56 +00:00
taca
6cada28bd2 security/pear-Crypt_GPG: update to 1.6.5
1.6.5 (2021-03-16 13:30 UTC)

Changelog:

* Add getCreationDateTime() and getExpirationDateTime() methods to
  Crypt_GPG_SubKey class.
2021-03-21 03:31:25 +00:00
adam
2779afa114 py-google-auth: updated to 1.28.0
1.28.0 (2021-03-16)

Features
allow the AWS_DEFAULT_REGION environment variable
expose library version at google.auth.__version

Bug Fixes
fix unit tests so they can work in g3
2021-03-20 19:08:58 +00:00
bsiegert
f6095694fd Revbump all Go packages after go115 update 2021-03-19 17:36:46 +00:00
adam
c36f9820f9 py-stix: updated to 1.2.0.11
Version 1.2.0.11
- Fix deprecation warning from collections module
2021-03-19 08:16:29 +00:00
adam
743d832ef2 py-crypto: removed 2021-03-19 08:13:06 +00:00
adam
4e5d688a7c sudo: updated to 1.9.6p1
Major changes between version 1.9.6p1 and 1.9.6:

Fixed a regression introduced in sudo 1.9.6 that resulted in an error message instead of a usage message when sudo is run with no arguments.


Major changes between version 1.9.6 and 1.9.5p2:

Fixed a sudo_sendlog compilation problem with the AIX xlC compiler.
Fixed a regression introduced in sudo 1.9.4 where the --disable-root-mailer configure option had no effect.
Added a --disable-leaks configure option that avoids some memory leaks on exit that would otherwise occur. This is intended to be used with development tools that measure memory leaks. It is not safe to use in production at this time.
Plugged some memory leaks identified by oss-fuzz and ASAN.
Fixed the handling of sudoOptions for an LDAP sudoRole that contains multiple sudoCommands. Previously, some of the options would only be applied to the first sudoCommand.
Fixed a potential out of bounds read in the parsing of NOTBEFORE and NOTAFTER sudoers command options (and their LDAP equivalents).
The parser used for reading I/O log JSON files is now more resilient when processing invalid JSON.
Fixed typos that prevented make uninstall from working.
Fixed a regression introduced in sudo 1.9.4 where the last line in a sudoers file might not have a terminating NUL character added if no newline was present.
Integrated oss-fuzz and LLVM's libFuzzer with sudo. The new --enable-fuzzer configure option can be combined with the --enable-sanitizer option to build sudo with fuzzing support. Multiple fuzz targets are available for fuzzing different parts of sudo. Fuzzers are built and tested via make fuzz or as part of make check (even when sudo is not built with fuzzing support). Fuzzing support currently requires the LLVM clang compiler (not gcc).
Fixed the --enable-static-sudoers configure option.
Fixed a potential out of bounds read sudo when is run by a user with more groups than the value of max_groups in sudo.conf.
Added an admin_flag sudoers option to make the use of the ~/.sudo_as_admin_successful file configurable on systems where sudo is build with the --enable-admin-flag configure option. This mostly affects Ubuntu and its derivatives.
The max_groups setting in sudo.conf is now limited to 1024. This setting is obsolete and should no longer be needed.
Fixed a bug in the tilde expansion of CHROOT=dir and CWD=dir sudoers command options. A path ~/foo was expanded to /home/userfoo instead of /home/user/foo. This also affects the runchroot and runcwd Defaults settings.
Fixed a bug on systems without a native getdelim(3) function where very long lines could cause parsing of the sudoers file to end prematurely.
Fixed a potential integer overflow when converting the timestamp_timeout and passwd_timeout sudoers settings to a timespec struct.
The default for the group_source setting in sudo.conf is now dynamic on macOS. Recent versions of macOS do not reliably return all of a user's non-local groups via getgroups(2), even when _DARWIN_UNLIMITED_GETGROUPS is defined.
Fixed a potential use-after-free in the PAM conversation function.
Fixed potential redefinition of sys/stat.h macros in sudo_compat.h.
2021-03-18 08:57:48 +00:00
adam
1dbf0b3175 py-josepy: updated to 1.8.0
1.8.0:
* Removed external mock dependency.
* Removed dependency on six.
* Deprecated the module josepy.magic_typing.
* Fix JWS/JWK generation with EC keys when keys or signatures have leading zeros.
2021-03-18 07:33:31 +00:00
markd
2a39efa410 qgpgme: update to 1.15.1
to match gpgme.
2021-03-18 06:44:45 +00:00