--- - branch: MAIN date: Sun Jul 3 13:46:06 UTC 2016 files: - new: '1.7' old: '1.6' path: pkgsrc/security/libressl/Makefile pathrev: pkgsrc/security/libressl/Makefile@1.7 type: modified - new: '1.5' old: '1.4' path: pkgsrc/security/libressl/PLIST pathrev: pkgsrc/security/libressl/PLIST@1.5 type: modified - new: '1.4' old: '1.3' path: pkgsrc/security/libressl/distinfo pathrev: pkgsrc/security/libressl/distinfo@1.4 type: modified id: 20160703T134606Z.7cd05949bf5feec3a54b933044572503c878d640 log: "Updated libressl to 2.3.6 (latest stable version, 2.4.x is development).\n\n2.3.6 - Security fix\n\n\t* Correct a problem that prevents the DSA signing algorithm from\n\t running in constant time even if the flag BN_FLG_CONSTTIME is set.\n\t \ This issue was reported by Cesar Pereida (Aalto University), Billy\n\t Brumley (Tampere University of Technology), and Yuval Yarom (The\n\t University of Adelaide and NICTA). The fix was developed by Cesar\n\t Pereida. See OpenBSD 5.9 errata 11, June 6, 2016\n\n2.3.5 - Reliability fix\n\n\t* Fixed an error in libcrypto when parsing some ASN.1 elements > 16k.\n\n2.3.4 - Security Update\n\n\t* Fix multiple vulnerabilities in libcrypto relating to ASN.1 and encoding.\n\tFrom OpenSSL.\n\n\t* Minor build fixes\n\n2.3.3 - OpenBSD 5.9 release branch tagged\n\n\t* Reworked build scripts to better sync with OpenNTPD-portable\n\n\t* Fixed broken manpage links\n\n\t* Fixed an nginx compatibility issue by adding an 'install_sw' make alias\n\n\t* Fixed HP-UX builds\n\n\t* Changed the default configuration directory to c:\\LibreSSL\\ssl on Windows\n\t binary builds\n\n\t* cert.pem has been reorganized and synced with Mozilla's certificate store\n\n2.3.2 - Compatibility and Reliability fixes\n\n\t* Changed format of LIBRESSL_VERSION_NUMBER to match that of\n\t OPENSSL_VERSION_NUMBER, see:\n\t https://wiki.openssl.org/index.php/Manual:OPENSSL_VERSION_NUMBER(3)\n\n\t* Added EVP_aead_chacha20_poly1305_ietf() which matches the AEAD\n\t construction introduced in RFC 7539, which is different than that\n\t already used in TLS with EVP_aead_chacha20_poly1305()\n\n\t* Avoid a potential undefined C99+ behavior due to shift overflow in\n\t AES_decrypt, reported by Pascal Cuoq \n\n\t* More man pages converted from pod to mdoc format\n\n\t* Added COMODO RSA Certification Authority and QuoVadis\n\t root certificates to cert.pem\n\n\t* Removed Remove \"C=US, O=VeriSign, Inc., OU=Class 3 Public Primary Certification\n\t Authority\" (serial 3c:91:31:cb:1f:f6:d0:1b:0e:9a:b8:d0:44:bf:12:be) root\n\t certificate from cert.pem\n\n\t* Added support for building nc(1) on Solaris\n\n\t* Fixed GCC 5.x+ preprocessor checks, reported by Ruslan Babayev\n\n\t* Improved console handling with openssl(1) on Windows\n\n\t* Ensure the network stack is enabled on Windows when running\n\t tls_init()\n\n\t* Fixed incorrect TLS certificate loading by nc(1)\n\n\t* Added support for Solaris 11.3's getentropy(2) system call\n\n\t* Enabled support for using NetBSD 7.0's arc4random(3) implementation\n\n\t* Deprecated the SSL_OP_SINGLE_DH_USE flag by disabling its effect\n\n\t* Fixes from OpenSSL 1.0.1q\n\t - CVE-2015-3194 - NULL pointer dereference in client side certificate\n\t validation.\n\t - CVE-2015-3195 - Memory leak in PKCS7 - not reachable from TLS/SSL\n\n\t* The following OpenSSL CVEs did not apply to LibreSSL\n\t - CVE-2015-3193 - Carry propagating bug in the x86_64 Montgomery\n\t \ squaring procedure.\n\t - CVE-2015-3196 - Double free race condition of the identify hint\n\t data.\n\n\t See https://marc.info/?l=openbsd-announce&m=144925068504102\n\n2.3.1 - ASN.1 and time handling cleanups\n\n\t* ASN.1 cleanups and RFC5280 compliance fixes.\n\n\t* Time representations switched from 'unsigned long' to 'time_t'. LibreSSL\n\t now checks if the host OS supports 64-bit time_t.\n\n\t* Fixed a leak in SSL_new in the error path.\n\n\t* Support always extracting the peer cipher and version with libtls.\n\n\t* Added ability to check certificate validity times with libtls,\n\t tls_peer_cert_notbefore and tls_peer_cert_notafter.\n\n\t* Changed tls_connect_servername to use the first address that resolves with\n\t getaddrinfo().\n\n\t* Remove broken conditional EVP_CHECK_DES_KEY code (non-functional since\n\t initial commit in 2004).\n\n\t* Fixed a memory leak and out-of-bounds access in OBJ_obj2txt, reported\n\t by Qualys Security.\n\n\t* Fixed an up-to 7 byte overflow in RC4 when len is not a multiple of\n\t sizeof(RC4_CHUNK), reported by Pascal Cuoq .\n\n\t* Reject too small bits value in BN_generate_prime_ex(), so that it does\n\t not risk becoming negative in probable_prime_dh_safe(), reported by\n\t\tFranck Denis.\n\n\t* Enable nc(1) builds on more platforms.\n\n2.3.0 - SSLv3 removed, libtls API changes, portability improvements\n\n\t* SSLv3 is now permanently removed from the tree.\n\n\t* The libtls API is changed from the 2.2.x series.\n\n\t The read/write functions work correctly with external event\n\t \ libraries. See the tls_init man page for examples of using libtls\n\t correctly in asynchronous mode.\n\n\t Client-side verification is now supported, with the client supplying\n\t the certificate to the server.\n\n\t Also, when using tls_connect_fds, tls_connect_socket or\n\t tls_accept_fds, libtls no longer implicitly closes the passed in\n\t sockets. The caller is responsible for closing them in this case.\n\n\t* When loading a DSA key from an raw (without DH parameters) ASN.1\n\t \ serialization, perform some consistency checks on its `p' and `q'\n\t values, and return an error if the checks failed.\n\n\t Thanks for Georgi Guninski (guninski at guninski dot com) for\n\t mentioning the possibility of a weak (non prime) q value and\n\t providing a test case.\n\n\t See\n\t https://cpunks.org/pipermail/cypherpunks/2015-September/009007.html\n\t \ for a longer discussion.\n\n\t* Fixed a bug in ECDH_compute_key that can lead to silent truncation\n\t of the result key without error. A coding error could cause software\n\t to use much shorter keys than intended.\n\n\t* Removed support for DTLS_BAD_VER. Pre-DTLSv1 implementations are no\n\t longer supported.\n\n\t* The engine command and parameters are removed from the openssl(1).\n\t Previous releases removed dynamic and builtin engine support\n\t already.\n\n\t* SHA-0 is removed, which was withdrawn shortly after publication 20\n\t years ago.\n\n\t* Added Certplus CA root certificate to the default cert.pem file.\n\n\t* New interface OPENSSL_cpu_caps is provided that does not allow\n\t software to inadvertently modify cpu capability flags.\n\t OPENSSL_ia32cap and OPENSSL_ia32cap_loc are removed.\n\n\t* The out_len argument of AEAD changed from ssize_t to size_t.\n\n\t* Deduplicated DTLS code, sharing bugfixes and improvements with\n\t TLS.\n\n\t* Converted 'nc' to use libtls for client and server operations; it is\n\t included in the libressl-portable distribution as an example of how\n\t to use the library.\n" module: pkgsrc subject: 'CVS commit: pkgsrc/security/libressl' unixtime: '1467553566' user: wiz