summaryrefslogtreecommitdiff
path: root/security
diff options
context:
space:
mode:
authortnn <tnn@pkgsrc.org>2009-04-05 15:50:17 +0000
committertnn <tnn@pkgsrc.org>2009-04-05 15:50:17 +0000
commitce257462cdcd7cadef6ef8de390afa63ede55bc8 (patch)
tree7895c5b5cf629216957a7769ab58c21fffdd22be /security
parentd3551cd683ad25e1356f68eb54eac4f2a6662acc (diff)
downloadpkgsrc-ce257462cdcd7cadef6ef8de390afa63ede55bc8.tar.gz
Update to openssl-0.9.8k.
Changes between 0.9.8j and 0.9.8k [25 Mar 2009] *) Don't set val to NULL when freeing up structures, it is freed up by underlying code. If sizeof(void *) > sizeof(long) this can result in zeroing past the valid field. (CVE-2009-0789) *) Fix bug where return value of CMS_SignerInfo_verify_content() was not checked correctly. This would allow some invalid signed attributes to appear to verify correctly. (CVE-2009-0591) *) Reject UniversalString and BMPString types with invalid lengths. This prevents a crash in ASN1_STRING_print_ex() which assumes the strings have a legal length. (CVE-2009-0590) *) Set S/MIME signing as the default purpose rather than setting it unconditionally. This allows applications to override it at the store level. *) Permit restricted recursion of ASN1 strings. This is needed in practice to handle some structures. *) Improve efficiency of mem_gets: don't search whole buffer each time for a '\n' *) New -hex option for openssl rand. *) Print out UTF8String and NumericString when parsing ASN1. *) Support NumericString type for name components. *) Allow CC in the environment to override the automatically chosen compiler. Note that nothing is done to ensure flags work with the chosen compiler.
Diffstat (limited to 'security')
-rw-r--r--security/openssl/Makefile4
-rw-r--r--security/openssl/distinfo9
-rw-r--r--security/openssl/patches/patch-am13
3 files changed, 6 insertions, 20 deletions
diff --git a/security/openssl/Makefile b/security/openssl/Makefile
index 16e46c0c0f4..99b10305755 100644
--- a/security/openssl/Makefile
+++ b/security/openssl/Makefile
@@ -1,8 +1,8 @@
-# $NetBSD: Makefile,v 1.137 2009/01/08 16:38:22 tnn Exp $
+# $NetBSD: Makefile,v 1.138 2009/04/05 15:50:17 tnn Exp $
OPENSSL_SNAPSHOT?= # empty
OPENSSL_STABLE?= # empty
-OPENSSL_VERS?= 0.9.8j
+OPENSSL_VERS?= 0.9.8k
.if empty(OPENSSL_SNAPSHOT)
DISTNAME= openssl-${OPENSSL_VERS}
diff --git a/security/openssl/distinfo b/security/openssl/distinfo
index e694845d690..20ab976d615 100644
--- a/security/openssl/distinfo
+++ b/security/openssl/distinfo
@@ -1,8 +1,8 @@
-$NetBSD: distinfo,v 1.65 2009/01/08 16:38:22 tnn Exp $
+$NetBSD: distinfo,v 1.66 2009/04/05 15:50:17 tnn Exp $
-SHA1 (openssl-0.9.8j.tar.gz) = f70f7127a26e951e8a0d854c0c9e6b4c24df78e4
-RMD160 (openssl-0.9.8j.tar.gz) = d60417e0fd943fbffc6dae8391a21dcf5d97e967
-Size (openssl-0.9.8j.tar.gz) = 3738359 bytes
+SHA1 (openssl-0.9.8k.tar.gz) = 3ba079f91d3c1ec90a36dcd1d43857165035703f
+RMD160 (openssl-0.9.8k.tar.gz) = 496df7a5d33457b0d8e3b930a8e5cf068923182c
+Size (openssl-0.9.8k.tar.gz) = 3852259 bytes
SHA1 (patch-aa) = b28ec662bf0586e31d59cab45e3a28b91b10dac1
SHA1 (patch-ac) = a766699f2d007b70689bbad538ede07ded7b34ff
SHA1 (patch-ad) = bb86ac463fc4ab8b485df5f1a4fb9c13c1fc41c3
@@ -11,4 +11,3 @@ SHA1 (patch-af) = 1eda5a96835b65d325c77ce5d39f1e524815a3c7
SHA1 (patch-ag) = 5f12c72b85e4b6c6a79dfcf87055e9e029fbd8c8
SHA1 (patch-ak) = 049250b9bd42e6f155145703135dab39a7ec17e0
SHA1 (patch-al) = 076a606352bdeaeea1cc64f16be2ac1325882302
-SHA1 (patch-am) = 72d9d776878fc4908c40aacbe4d79ba3edd0a584
diff --git a/security/openssl/patches/patch-am b/security/openssl/patches/patch-am
deleted file mode 100644
index b1a763cadbb..00000000000
--- a/security/openssl/patches/patch-am
+++ /dev/null
@@ -1,13 +0,0 @@
-$NetBSD: patch-am,v 1.6 2009/01/08 16:38:22 tnn Exp $
-
---- crypto/evp/enc_min.c.orig 2008-12-02 19:14:44.000000000 +0100
-+++ crypto/evp/enc_min.c
-@@ -199,7 +199,7 @@ int EVP_CipherInit_ex(EVP_CIPHER_CTX *ct
- enc = 1;
- ctx->encrypt = enc;
- }
--#ifdef OPENSSL_NO_FIPS
-+#if 0 /* def OPENSSL_NO_FIPS */
- if(FIPS_selftest_failed())
- {
- FIPSerr(FIPS_F_EVP_CIPHERINIT_EX,FIPS_R_FIPS_SELFTEST_FAILED);