--- - branch: pkgsrc-2011Q4 date: Wed Mar 14 14:48:33 UTC 2012 files: - new: 1.159.2.3 old: 1.159.2.2 path: pkgsrc/security/openssl/Makefile pathrev: pkgsrc/security/openssl/Makefile@1.159.2.3 type: modified - new: 1.83.2.3 old: 1.83.2.2 path: pkgsrc/security/openssl/distinfo pathrev: pkgsrc/security/openssl/distinfo@1.83.2.3 type: modified - new: '0' old: 1.1.2.2 path: pkgsrc/security/openssl/patches/patch-asn_mime.c pathrev: pkgsrc/security/openssl/patches/patch-asn_mime.c@0 type: deleted id: 20120314T144833Z.24e743caefcf8727245d2fd72b9f7a7b4ced00b4 log: "Pullup ticket #3702 - requested by taca\nsecurity/openssl: security update\n\nRevisions pulled up:\n- security/openssl/Makefile 1.163\n- security/openssl/distinfo 1.86\n- security/openssl/patches/patch-asn_mime.c \ deleted\n\n---\n Module Name:\tpkgsrc\n Committed By:\ttaca\n \ Date:\t\tTue Mar 13 03:11:32 UTC 2012\n\n Modified Files:\n \tpkgsrc/security/openssl: Makefile distinfo\n Removed Files:\n \tpkgsrc/security/openssl/patches: patch-asn_mime.c\n\n \ Log Message:\n Update openssl pacakge to 0.9.8u.\n\n Changes between 0.9.8t and 0.9.8u [12 Mar 2012]\n\n *) Fix MMA (Bleichenbacher's attack on PKCS #1 v1.5 RSA padding) weakness\n in CMS and PKCS7 code. When RSA decryption fails use a random key for\n content decryption and always return the same error. Note: this attack\n needs on average 2^20 messages so it only affects automated senders. The\n old behaviour can be reenabled in the CMS code by setting the\n CMS_DEBUG_DECRYPT flag: this is useful for debugging and testing where\n an MMA defence is not necessary.\n Thanks to Ivan Nestlerode for discovering\n this issue. (CVE-2012-0884)\n \ [Steve Henson]\n\n *) Fix CVE-2011-4619: make sure we really are receiving a\n client hello before rejecting multiple SGC restarts. Thanks to\n Ivan Nestlerode for discovering this bug.\n [Steve Henson]\n" module: pkgsrc subject: 'CVS commit: [pkgsrc-2011Q4] pkgsrc/security/openssl' unixtime: '1331736513' user: tron