non port: security/libressl/Makefile |
SVNWeb
|
Number of commits found: 87 |
Sun, 28 May 2023
|
[ 18:50 Bernard Spil (brnrd) ] a1e4371
security/libressl: Update to 3.7.3
|
Sat, 25 Mar 2023
|
[ 12:52 Bernard Spil (brnrd) ] 7a79690
security/libressl: Fix libtls flavor build
|
Sat, 18 Mar 2023
|
[ 10:17 Bernard Spil (brnrd) ] d5862e3
security/libressl: Update to 3.6.2
* Major SHLIBVER update
|
Wed, 15 Mar 2023
|
[ 09:14 Bernard Spil (brnrd) ] 70a4cc5
security/openssl30: Chase rename in ports CONFLICTS*
Reported by: cperciva, junchoon
|
Wed, 8 Feb 2023
|
[ 18:05 Bernard Spil (brnrd) ] 31070d1
security/libressl: Security update to 3.5.4
Security: 1dd84344-a7da-11ed-86e9-d4c9ef517024
MFH: 2023Q1
|
Sun, 25 Sep 2022
|
[ 11:15 Bernard Spil (brnrd) ] 2de6938
security/libressl: Update to 3.5.3
* Make sure you check https://wiki.freebsd.org/LibreSSL/3.5
and UPDATING
|
Wed, 7 Sep 2022
|
[ 21:10 Stefan Eßer (se) ] b7f0544 (Only the first 10 of 27931 ports in this commit are shown above. )
Add WWW entries to port Makefiles
It has been common practice to have one or more URLs at the end of the
ports' pkg-descr files, one per line and prefixed with "WWW:". These
URLs should point at a project website or other relevant resources.
Access to these URLs required processing of the pkg-descr files, and
they have often become stale over time. If more than one such URL was
present in a pkg-descr file, only the first one was tarnsfered into
the port INDEX, but for many ports only the last line did contain the
port specific URL to further information.
There have been several proposals to make a project URL available as
a macro in the ports' Makefiles, over time.
(Only the first 15 lines of the commit message are shown above )
|
Wed, 20 Jul 2022
|
[ 14:22 Tobias C. Berner (tcberner) ] 857c05f (Only the first 10 of 840 ports in this commit are shown above. )
security: remove 'Created by' lines
A big Thank You to the original contributors of these ports:
* <ports@c0decafe.net>
* Aaron Dalton <aaron@FreeBSD.org>
* Adam Weinberger <adamw@FreeBSD.org>
* Ade Lovett <ade@FreeBSD.org>
* Aldis Berjoza <aldis@bsdroot.lv>
* Alex Dupre <ale@FreeBSD.org>
* Alex Kapranoff <kappa@rambler-co.ru>
* Alex Samorukov <samm@freebsd.org>
* Alexander Botero-Lowry <alex@foxybanana.com>
* Alexander Kriventsov <avk@vl.ru>
* Alexander Leidinger <netchild@FreeBSD.org> (Only the first 15 lines of the commit message are shown above )
|
Wed, 16 Mar 2022
|
[ 19:19 Bernard Spil (brnrd) ] 82f89b8
security/libressl: Security update to 3.4.3
Security: ea05c456-a4fd-11ec-90de-1c697aa5a594
MFH: 2022Q1
|
Sun, 28 Nov 2021
|
[ 11:30 Bernard Spil (brnrd) ] d225577
security/libressl: Fix merge conflict
|
Tue, 23 Nov 2021
|
[ 22:11 Stefan Eßer (se) ] 5933ac0 (Only the first 10 of 157 ports in this commit are shown above. )
*/*: Remove redundant '-[0-9]*' from CONFLICTS_INSTALL
The conflict checks compare the patterns first against the package
names without version (as reported by "pkg query "%n"), then - if
there was no match - agsinst the full package names including the
version (as reported by "pkg query "%n-%v").
Approved by: portmgr (blanket)
|
Tue, 9 Nov 2021
|
[ 08:19 Bernard Spil (brnrd) ] 5c5878b
security/libressl: Upgrade to 3.4.1
* Includes TLS 1.3 capability
|
Sun, 3 Oct 2021
|
[ 11:54 Bernard Spil (brnrd) ] 13cf9e2
security/libressl: Update to 3.3.5
* Fixes issues with LetsEncrypt DST Root X3 expiry
MFH: 2021Q4
|
Sun, 29 Aug 2021
|
[ 12:05 Bernard Spil (brnrd) ] 78349b9
security/libressl: Update to 3.3.4
* Auto-generate MAN3 plist
|
Tue, 4 May 2021
|
[ 14:31 Bernard Spil (brnrd) ] 06920f4
security/libressl: Upgrade to 3.3.3
* Add libtls flavor
|
Tue, 6 Apr 2021
|
[ 14:31 Mathieu Arnold (mat) ] 305f148 (Only the first 10 of 29333 ports in this commit are shown above. )
Remove # $FreeBSD$ from Makefiles.
|
Sat, 20 Mar 2021
|
[ 18:35 brnrd ]
security/libressl: Security update to 3.2.5
Security: eeca52dc-866c-11eb-b8d6-d4c9ef517024
|
Tue, 16 Mar 2021
|
[ 15:43 brnrd ]
security/libressl: Security fix for potential use-after-free
MFH: 2021Q1
Security: eeca52dc-866c-11eb-b8d6-d4c9ef517024
|
Sat, 13 Feb 2021
|
[ 10:12 brnrd ]
security/libressl: Bugfix update to 3.2.4
* See errata 013 from OpenBSD 6.8
* Various interoperability issues and memory leaks were discovered in
libcrypto and libssl
|
Fri, 11 Dec 2020
|
[ 10:40 brnrd ]
security/libressl: Security update to 3.2.3
MFH: 2020Q4
Security: 88dfd92f-3b9c-11eb-929d-d4c9ef517024
|
Mon, 19 Oct 2020
|
[ 18:02 brnrd ]
security/libressl: Update to 3.2.2
|
Wed, 19 Aug 2020
|
[ 07:03 brnrd ]
security/libressl: Update to 3.1.4
* Interoperability and bug fixes (incl hang)
MFH: 2020Q3
|
Tue, 16 Jun 2020
|
[ 07:00 brnrd ]
security/libressl: Chain-validation update to 3.1.3
|
Thu, 21 May 2020
|
[ 11:12 brnrd ]
security/libressl: Bugfix update to 3.1.2
* Fixes client crash
MFH: 2020Q2
|
Fri, 8 May 2020
|
[ 20:17 brnrd ]
security/libressl: Update to 3.1.1
* 3.1 branch now stable (OpenBSD 6.7)
|
Mon, 27 Apr 2020
|
[ 13:10 brnrd ] (Only the first 10 of 15 ports in this commit are shown above. )
security/openssl-devel: Resurrect OpenSSL devel port
|
Wed, 1 Jan 2020
|
[ 17:30 brnrd ] (Only the first 10 of 18 ports in this commit are shown above. )
Chase rename of security/openssl111
- Categories n-z
MFH: 2020Q1
|
Sat, 19 Oct 2019
|
[ 14:23 brnrd ]
security/libressl: Update to 3.0.2
* no SHLIBVER bump
|
Wed, 22 May 2019
|
[ 18:24 brnrd ]
security/libressl: Update to 2.9.2
|
Mon, 22 Apr 2019
|
[ 19:44 brnrd ]
security/libressl: Update to 2.9.1
- Requires a rebuild of all dependent ports
|
Sun, 16 Dec 2018
|
[ 11:08 brnrd ]
security/libressl: Security update to 2.8.3
Security: 6f170cf2-e6b7-11e8-a9a8-b499baebfeaf
|
Sat, 20 Oct 2018
|
[ 10:30 brnrd ]
security/libressl: Update to 2.8.2
- Requires rebuild of all dependent ports
|
Wed, 12 Sep 2018
|
[ 11:36 brnrd ]
Chase CONFLICTS after addition of security/openssl111
- While here mark OpenSSL 1.1.0 deprecated
see: https://www.openssl.org/policies/releasestrat.html
|
Thu, 14 Jun 2018
|
[ 17:28 brnrd ]
security/libressl: Security update to 2.7.4
MFH: 2018Q2
Security: c82ecac5-6e3f-11e8-8777-b499baebfeaf
|
Sun, 6 May 2018
|
[ 19:08 brnrd ]
security/libressl: Don't stage man3 manpages if MAN3 off
|
[ 12:16 brnrd ]
security/libressl: Update to 2.7.3
|
Mon, 30 Apr 2018
|
[ 08:08 brnrd ]
security/libressl: Use -pthread
Reported by: jbeich, eadler
|
Sun, 29 Apr 2018
|
[ 12:37 brnrd ]
security/libressl: Force linking libthr
- Fixes problems with loading private ssh keys
|
Sat, 28 Apr 2018
|
[ 19:46 brnrd ]
security/libressl: Update to 2.7.2
- Most important ports are compatible, see
https://wiki.freebsd.org/LibreSSL/2.7 for more info
|
Fri, 27 Apr 2018
|
[ 10:16 brnrd ]
security/libressl: Bump portrevision
- Everybody deserves AES-NI off-load
Reported by: adamw
|
Tue, 24 Apr 2018
|
[ 19:50 brnrd ]
security/libressl: Fix AES-NI assembly detection
- While here, fix broken man3 option
Reported by: Franco Fichtner <franco opnsense org>
|
Thu, 21 Dec 2017
|
[ 07:07 brnrd ]
security/libressl: Bugfix update to 2.6.4
- Fixes (No-)TLS with broken smtp clients
MFH: 2017Q4
|
Tue, 7 Nov 2017
|
[ 15:30 brnrd ]
security/libressl: Update to 2.6.3
- Align with security/libressl-devel
- Switch to using new install-man5 target for MAN3 option
- Add UPDATING entry
|
Thu, 13 Jul 2017
|
[ 10:49 brnrd ]
security/libressl: Update to 2.5.5
- Bugfix update to 2.5.5
- nc manpage install fixed upstream
|
Wed, 3 May 2017
|
[ 08:44 brnrd ]
security/libressl: Update to 2.5.4
- Security update to 2.5.4
- Remove CVE-2017-8301 patch (included in 2.5.4)
Security: 24673ed7-2bf3-11e7-b291-b499baebfeaf
|
Sat, 29 Apr 2017
|
[ 17:10 brnrd ]
security/libressl: Fix vulnerability
Obtained from: OpenBSD
MFH: 2017Q2
Security: 24673ed7-2bf3-11e7-b291-b499baebfeaf
Security: CVE-2017-8301
|
Tue, 11 Apr 2017
|
[ 19:01 brnrd ]
security/libressl: Update to 2.5.3
- Update to 2.5.3
- Bump shlib versions
- Add UPDATING entry for shlib version bumps
- Use --enable-nc configure arg
- Align with CFLAGS from -devel
- Remove commented EXPLICIT_BZERO blurb
- Update pkg-plist
- Add x25519, drop krb5_asn header
- Add ocspcheck binary
- Added/removed man-pages
|
Wed, 1 Feb 2017
|
[ 09:59 brnrd ]
security/libressl: Update to 2.4.5
- Update version to 2.4.5
- Remove patch now included
|
Wed, 11 Jan 2017
|
[ 11:42 brnrd ]
security/libressl: Fix ECDSA P-256 timing attack vuln
- Add patch from OpenBSD
MFH: 2017Q1
Security: 7caebe30-d7f1-11e6-a9a5-b499baebfeaf
Security: CVE-2016-7056
|
Fri, 2 Dec 2016
|
[ 11:58 mat ] (Only the first 10 of 119 ports in this commit are shown above. )
Do not use post-stage. Use post-install instead.
The only reason to use post-stage is because the port needs to do
"things" at a later time, like some plist manipulation.
While there, fold post-install in do-install targets when they are
defined.
PR: 214780
Submitted by: mat
Exp-run by: antoine
Sponsored by: Absolight
|
Tue, 15 Nov 2016
|
[ 21:51 brnrd ]
security/libressl: Update to 2.4.4
- Bug-fix update to 2.4.4
- Improve MAN3 option handling
- add extra-patch
|
Sun, 30 Oct 2016
|
[ 14:56 brnrd ]
security/libressl: Switch to CONFLICTS_INSTALL
- There's no conflict at build time
PR: 213691
|
Fri, 21 Oct 2016
|
[ 12:51 mat ] (Only the first 10 of 718 ports in this commit are shown above. )
${RM} already has -f.
PR: 213570
Submitted by: mat
Exp-run by: antoine
Sponsored by: Absolight
|
Tue, 27 Sep 2016
|
[ 20:50 brnrd ]
security/libressl: Update to 2.4.3
- Update to 2.4.3
- Only affected by CVE-2016-6304 (high)
MFH: 2016Q3
Security: CVE-2016-6304
Security: 43eaa656-80bc-11e6-bf52-b499baebfeaf
|
Thu, 11 Aug 2016
|
[ 20:06 brnrd ]
security/libressl: Update to 2.4.2
- Update to latest stable version 2.4.2
- Add UPDATING entry
- Remove OPENSSL_VERSION_NUMBER patch
- Change post-install targets to post-stage where possible
- Bump libcrypto version in version.mk
PR: 211701
|
Wed, 3 Aug 2016
|
[ 19:25 brnrd ]
security/libressl: Update to 2.3.7
- Bugfix update [1]
Release notes:
- http://ftp.openbsd.org/pub/OpenBSD/LibreSSL/libressl-2.3.7-relnotes.txt
|
Thu, 9 Jun 2016
|
[ 20:33 brnrd ]
security/libressl: Update to version 2.3.6
Security: CVE-2016-2178
Sponsored by: BSDCan DevSummit
|
Wed, 1 Jun 2016
|
[ 06:51 brnrd ]
security/libressl: Update to 2.3.5
- Update to bug-fix version 2.3.5
- `signify` verified tarball
- Remove MAKE_JOBS_UNSAFE added in 2.3.4
|
Tue, 3 May 2016
|
[ 21:15 brnrd ]
security/libressl: Update to 2.3.4
- Upstream marked the 2.3 branch as stable
- Bump SHLIB_VERSION in bsd.openssl.mk
- Note SHLIB_VERSION bump and SSLv3 removal in UPDATING
- Add TLS-enabled netcat binary
- Fix linking issues with MySQL 5.7 [1]
- Includes vulnerability fixes [2]
PR: 208759 [1]
Security: 01d729ca-1143-11e6-b55e-b499baebfeaf [2]
Reviewed_by: feld (mentor), koobs (mentor)
Approved by: feld (mentor, ports-secteam)
Differential Revision: D5902
|
Sun, 6 Mar 2016
|
[ 20:06 brnrd ]
security/libressl*: Register conflict with security/openssl-devel
- Add conflict for security/openssl-devel
- Sort conflicts alphabetically
Reviewed by: feld (mentor), koobs (mentor)
Approved by: feld (mentor)
Differential Revision: D5539
|
Sun, 31 Jan 2016
|
[ 11:48 brnrd ]
security/libressl: Update to 2.2.6
- Update to version 2.2.6 [1]
- Remove CA root cert that is installed by default
Changes:
ftp://ftp.openbsd.org/pub/OpenBSD/LibreSSL/libressl-2.2.6-relnotes.txt [1]
Reviewed by: koobs (mentor), feld (mentor)
Approved by: (mentor)
Differential Revision: D5115
|
Tue, 5 Jan 2016
|
[ 19:47 brnrd ]
ecurity/libressl: Take MAINTAINER'ship
- As requested by current maintainer via email
Reviewed by: koobs (mentor), vsevolod (maintainer), feld (mentor)
Approved by: koobs (mentor), vsevolod (maintainer)
Differential Revision: D4782
|
Tue, 8 Dec 2015
|
[ 10:02 brnrd ]
security/libressl: Update to 2.2.5
- Version 2.2.5 addresses CVE-2015-2394
- Refactor regression-test target to TEST_TARGET
- Add LibreSSL < 2.2.5/2.3.1_1 vuxml entry
Reviewed by: koobs (mentor), feld (ports-secteam), delphij (ports-secteam)
Approved by: koobs (mentor), delphij (ports-secteam)
Security: 215e740e-9c56-11e5-90e7-b499baebfeaf
MFH: 2015Q4
Differential Revision: https://reviews.freebsd.org/D4393
|
Fri, 16 Oct 2015
|
[ 07:13 brnrd ]
security/libressl: Fix memory leak and buffer overflow DoS vulnerability
* Update to 2.2.4 (fixing vulnerabilities)
* Create vuxml entry
Differential Revision: https://reviews.freebsd.org/D3916
Submitted by: Bernard Spil <brnrd@freebsd.org>
Reviewed by: delphij
Approved by: delphij (secteam)
MFC after: 2015Q4
Security: e75a96df-73ca-11e5-9b45-b499baebfeaf
Security: CVE-2015-5333, CVE-2015-5334
|
Tue, 15 Sep 2015
|
[ 19:22 brnrd ]
security/libressl: Fix AESNI support
PR: 200894
Approved by: vsevolod (maintainer, mentor)
|
Mon, 31 Aug 2015
|
[ 12:25 brnrd ]
security/libressl: Update to 2.2.3
- Update to 2.2.3
- Show compiler flags/invokes in build-log
Changes:
ftp://ftp.openbsd.org/pub/OpenBSD/LibreSSL/libressl-2.2.3-relnotes.txt
Reviewed by: koobs (mentor)
Approved by: koobs (mentor)
Differential Revision: https://reviews.freebsd.org/D3537
|
Thu, 6 Aug 2015
|
[ 19:36 brnrd ]
Revert pkg-plist OPENSSL_SHLIBVER addition
Reported by: antoine
|
[ 19:13 brnrd ]
security/libressl: Update to 2.2.2
* Bump SHLIB versions of libssl/crypto/tls
* Bump OPENSSL_SHLIBVER in bsd.openssl.mk
* Add UPDATING entry for SHLIB version bump
* Narrow scope of CONFLICTS (portlint)
Changes:
ftp://ftp.openbsd.org/pub/OpenBSD/LibreSSL/libressl-2.2.2-relnotes.txt
Differential_revision: D3278
Reviewed by: koobs (mentor), vsevolod (maintainer, mentor)
Approved by: koobs (mentor)
|
Wed, 8 Jul 2015
|
[ 19:27 brnrd ]
security/libressl: Update to 2.2.1
* Minor update from OpenBSD LibreSSL-portable
* Bumps all SHLIB versions
* Bumps OPENSSL_SHLIBVER in bsd.openssl.mk
* Adds UPDATING entry for SHLIB version bump
* MFH as 2.2.0 already closes several vulns
Changes:
ftp://ftp.openbsd.org/pub/OpenBSD/LibreSSL/libressl-2.2.1-relnotes.txt
Differential revision: https://reviews.freebsd.org/D2963
Reviewed by: vsevolod (maintainer/mentor), koobs (mentor)
Approved by: vsevolod (maintainer/mentor), koobs (mentor)
MFH: 2015Q3
|
Sun, 14 Jun 2015
|
[ 13:28 brnrd ]
security/libressl: Update to 2.2.0
- Update to 2.2.0
- Remove opensslfeatures.h patch (included upstream)
- Add pkg-plist (mainly documentation)
- Bump libcrypto SHLIB version in Mk/bsd.openssl.mk
Changes:
http://marc.info/?l=openbsd-announce&m=143404058913441
Reviewed_by: vsevolod, koobs
Approved by: vsevolod (maintainer, mentor), koobs (mentor)
Security: 8305e215-1080-11e5-8ba2-000c2980a9f3
Differential revision: D2770
MFH: 2015Q2
|
Fri, 12 Jun 2015
|
[ 02:23 vsevolod ]
- Update to 2.1.7 that fixes the recent openssl vulnerabilities
Submitted by: zi via IRC
|
Thu, 14 May 2015
|
[ 10:15 mat ] (Only the first 10 of 1814 ports in this commit are shown above. )
MASTER_SITES cleanup.
- Replace ${MASTER_SITE_FOO} with FOO.
- Merge MASTER_SITE_SUBDIR into MASTER_SITES when possible. (This means 99.9%
of the time.)
- Remove occurrences of MASTER_SITE_LOCAL when no subdirectory was present and
no hint of what it should be was present.
- Fix some logic.
- And generally, make things more simple and easy to understand.
While there, add magic values to the FESTIVAL, GENTOO, GIMP, GNUPG, QT and
SAMBA macros.
Also, replace some EXTRACT_SUFX occurences with USES=tar:*.
Checked by: make fetch-urlall-list
With hat: portmgr
Sponsored by: Absolight
|
Thu, 19 Mar 2015
|
[ 23:11 vsevolod ]
- Update to 2.1.6
- Remove incorrectly added patch files
PR: 198718
Submitted by: Bernard Spil <spil.oss at gmail.com>
Security: CVE-2015-0209, CVE-2015-0286, CVE-2015-0287, CVE-2015-0288,
CVE-2015-0289
|
[ 15:30 vsevolod ] (Only the first 10 of 17 ports in this commit are shown above. )
- Backport the following fixes from openssl [1]:
CVE-2015-0207 Segmentation fault in DTLSv1_listen moderate
CVE-2015-0209 Use After Free following d2i_ECPrivatekey error low
CVE-2015-0286 Segmentation fault in ASN1_TYPE_cmp moderate
CVE-2015-0287 ASN.1 structure reuse memory corruption moderate
CVE-2015-0289 PKCS7 NULL pointer dereferences moderate
- Enable libtls component [2]
- Bump portrevision
PR: 198681 [1]
Submitted by: Bernard Spil <spil.oss at gmail.com> [1], naddy [2]
|
Wed, 18 Mar 2015
|
[ 09:55 vsevolod ]
- Update to 2.1.5
PR: 198651
Submitted by: Bernard Spil <spil.oss at gmail.com>
|
Wed, 4 Mar 2015
|
[ 09:34 vsevolod ]
- Update to 2.1.4
PR: 198269
Submitted by: Bernard Spil <spil.oss at gmail.com>
|
Thu, 22 Jan 2015
|
[ 16:48 vsevolod ]
- Update to 2.1.3
PR: 197005
Submitted by: Bernard Spil <spil.oss at gmail.com>
|
Tue, 16 Dec 2014
|
[ 22:06 vsevolod ]
- Update to 2.1.2
|
Fri, 17 Oct 2014
|
[ 10:13 vsevolod ]
- Update to 2.1.1.
|
Mon, 13 Oct 2014
|
[ 08:33 vsevolod ]
- Update to 2.1.0
Submitted by: Johan Schuijt <johan at 300.nl> via private email
|
Sun, 17 Aug 2014
|
[ 14:22 vsevolod ]
- Update to 2.0.5.
Submitted by: Johan Schuijt <johan at 300.nl> via private email
|
Thu, 7 Aug 2014
|
[ 12:56 vsevolod ]
- Update to 2.0.4.
Notice: openssl CVEs are not yet fixed in this version.
|
Tue, 22 Jul 2014
|
[ 14:08 vsevolod ]
Update to 2.0.3.
|
Wed, 16 Jul 2014
|
[ 11:07 vsevolod ]
Update to 2.0.2
|
Sun, 13 Jul 2014
|
[ 14:52 vsevolod ]
- Update to 2.0.1
|
Sat, 12 Jul 2014
|
[ 20:49 vsevolod ]
- Fix OPENSSL_VERSION_NUMBER to identify that libressl supports features of
openssl 1.0.1g only
- Add LIBRESSL_VERSION_NUMBER to distinguish from openssl
- Strip libraries correctly
- Bump PORTREVISION
|
[ 12:03 vsevolod ]
Add libressl port - OpenBSD fork of the popular OpenSSL library.
|
Number of commits found: 87 |