non port: security/openssl/Makefile |
Number of commits found: 320 (showing only 100 on this page) |
Saturday, 27 Aug 2016
|
09:59 dinoex
- update to 1.1.0
- bump SHLIBVERSION
|
Sunday, 14 Aug 2016
|
20:46 dinoex
- cleanup options
|
Wednesday, 20 Jul 2016
|
15:33 mat
Cleanup $() variables in ports Makefiles.
Mostly replace with ${}, but sometime, replace with $$() because it is
what was intended in the first place. (I think.)
Sponsored by: Absolight
|
Monday, 20 Jun 2016
|
19:16 dinoex
- fix possible integer overflow and application crash
Security: CVE-2016-2177
MFH: 2016Q2
|
Thursday, 16 Jun 2016
|
18:15 dinoex
- update warning message for new macros
|
Sunday, 12 Jun 2016
|
21:29 dinoex
- Fix DSA, preserve BN_FLG_CONSTTIME
Security: CVE-2016-2178
|
Tuesday, 3 May 2016
|
15:19 dinoex
- Security update to 1.0.2h
Security: https://www.openssl.org/news/secadv/20160503.txt
Security: CVE-2016-2105
Security: CVE-2016-2106
Security: CVE-2016-2107
Security: CVE-2016-2108
Security: CVE-2016-2109
Security: CVE-2016-2176
MFH: 2016Q2
|
Monday, 4 Apr 2016
|
19:09 dinoex
- remove NOPRECIOUS*
- make portlint happier
|
Friday, 1 Apr 2016
|
14:25 mat
Remove ${PORTSDIR}/ from dependencies, categories r, s, t, and u.
With hat: portmgr
Sponsored by: Absolight
|
Sunday, 6 Mar 2016
|
20:06 brnrd
security/libressl*: Register conflict with security/openssl-devel
- Add conflict for security/openssl-devel
- Sort conflicts alphabetically
Reviewed by: feld (mentor), koobs (mentor)
Approved by: feld (mentor)
Differential Revision: D5539
|
Thursday, 3 Mar 2016
|
19:00 dinoex
- extend CONFLICTS for openssl-devel
|
13:58 feld
security/openssl: Revert disabling of SSLv2 and MD2
Disabling SSLv2 without a shared library bump has a visible impact to
some applications. It is unclear at this time if disabling MD2 could
cause the same issues, but both are being reverted at the moment to be
safe.
PR: 195796
|
Wednesday, 2 Mar 2016
|
22:31 feld
security/openssl: Disable SSLv2 and MD2
SSLv2 is being disabled due to DROWN.
MD2 is being disabled as it should not have been enabled by default.
This was disabled by upstream back in 2009.
PR: 195796
Approved by: delphij, eadler
Security: CVE-2009-2409
Security: CVE-2016-0800
|
Tuesday, 1 Mar 2016
|
16:40 dinoex
- Security update to 1.0.2g
Security: https://www.openssl.org/news/secadv/20160301.txt
Security: CVE-2016-0800
Security: CVE-2016-0705
Security: CVE-2016-0798
Security: CVE-2016-0797
Security: CVE-2016-0799
Security: CVE-2016-0702
Security: CVE-2016-0703
Security: CVE-2016-0704
|
Saturday, 13 Feb 2016
|
09:48 dinoex
- mark options ASM broken on sparc64
PR: 204527
|
Thursday, 28 Jan 2016
|
17:35 dinoex
- add new manpages
Submitted by: olli hauer
|
15:09 dinoex
- Security update:
- add LICENSE_FILE
MFH: 2016Q1
Security: CVE-2015-3197
Security: CVE-2016-0701
|
Wednesday, 13 Jan 2016
|
17:29 brnrd
security/openssl: Fix No-SSLv3 option
- This change adds `no-ssl3-method` to config args
- Bump portrevision
Testing with security/openssl buillt with SSL3 option disabled [1]
revealed that the openssl binary and the libraries still support SSLv3
connections and methods. With the added no-ssl3-method argument passed
to the config script, the binary no longer supports the -ssl3 option
and ports requiring SSLv3 methods fail on undefined references to
methods.
PR: 203693 [1]
Reviewed by: koobs (mentor), feld (mentor, ports-secteam), dinoex (maintainer)
Approved by: koobs (mentor), feld (mentor, ports-secteam
MFH: 2016Q1
Differential Revision: D4924
|
Saturday, 5 Dec 2015
|
09:41 delphij
Update to 1.0.2e.
Security: CVE-2015-3193
Security: CVE-2015-3194
Security: CVE-2015-3195
Security: CVE-2015-3196
Security: CVE-2015-1794
MFH: 2015Q4
Approved by: so
|
Saturday, 21 Nov 2015
|
18:36 dinoex
- use post-install-DOCS-on
- cleanup text in IGNORE
|
Saturday, 5 Sep 2015
|
13:17 dinoex
- new OPTION MAN3
PR: 201459
|
Thursday, 9 Jul 2015
|
20:54 dinoex
- Security update to 1.0.2d
Security: http://openssl.org/news/secadv_20150709.txt
|
Friday, 12 Jun 2015
|
16:47 dinoex
- update to 1.0.2c
|
Thursday, 11 Jun 2015
|
21:37 zi
- Update to 1.0.2b
- Partially pacify portlint
With hat: ports-secteam
Security: 8305e215-1080-11e5-8ba2-000c2980a9f3
|
Thursday, 14 May 2015
|
10:15 mat
MASTER_SITES cleanup.
- Replace ${MASTER_SITE_FOO} with FOO.
- Merge MASTER_SITE_SUBDIR into MASTER_SITES when possible. (This means 99.9%
of the time.)
- Remove occurrences of MASTER_SITE_LOCAL when no subdirectory was present and
no hint of what it should be was present.
- Fix some logic.
- And generally, make things more simple and easy to understand.
While there, add magic values to the FESTIVAL, GENTOO, GIMP, GNUPG, QT and
SAMBA macros.
Also, replace some EXTRACT_SUFX occurences with USES=tar:*.
Checked by: make fetch-urlall-list
With hat: portmgr
Sponsored by: Absolight
|
Saturday, 25 Apr 2015
|
09:36 dinoex
- patchfiles for option PADLOCK renamed again
PR: 199444
|
Sunday, 12 Apr 2015
|
17:28 dinoex
- disable option ASM by default
- bump PORTREVISION
PR: 196756
|
Wednesday, 25 Mar 2015
|
08:30 marino
security category: Remove $PTHREAD_LIBS
approved by: PTHREAD blanket
|
Saturday, 21 Mar 2015
|
10:53 dinoex
- Security update to 1.0.2a
- termios.h now default
- fix patches
- fix manpage generation
- option ZLIB removed from default
- restore padlock support
- restore RFC-5705
- restore patch history
- restore build on older FreeBSD
- restore soname
Security: https://www.openssl.org/news/secadv_20150319.txt
Security: CVE-2015-0291
Security: CVE-2015-0204
Security: CVE-2015-0290
Security: CVE-2015-0207
Security: CVE-2015-0286
Security: CVE-2015-0208
Security: CVE-2015-0287
Security: CVE-2015-0289
Security: CVE-2015-0292
Security: CVE-2015-0293
Security: CVE-2015-1787
Security: CVE-2015-0285
Security: CVE-2015-0209
Security: CVE-2015-0288
|
Thursday, 19 Mar 2015
|
21:55 dinoex
- mark BROKEN options
|
20:23 delphij
Update to 1.0.1m to fix multiple vulnerabilities.
With hat: so
|
Friday, 16 Jan 2015
|
09:17 dinoex
- update to 1.0.1l
- fix option PADLOCK
|
Friday, 9 Jan 2015
|
00:02 delphij
Update to 1.01k.
With hat: ports-secteam
Security: vuxml 4e536c14-9791-11e4-977d-d050992ecde8
Security: CVE-2014-3569
Security: CVE-2014-3570
Security: CVE-2014-3571
Security: CVE-2014-3572
Security: CVE-2014-8275
Security: CVE-2015-0204
Security: CVE-2015-0205
Security: CVE-2015-0206
|
Sunday, 23 Nov 2014
|
10:34 dinoex
- new option TLSEXPCIPHERS
PR: 195270
Submitted by: yuri@rawbw.com
- options ordered by function
- extends descriptions
|
Wednesday, 15 Oct 2014
|
18:34 delphij
Update to 1.01j.
With hat: ports-secteam
Security: vuxml 03175e62-5494-11e4-9cc1-bc5ff4fb5e7b
Security: CVE-2014-3513
Security: CVE-2014-3566
Security: CVE-2014-3567
Security: CVE-2014-3568
|
Thursday, 14 Aug 2014
|
16:25 dinoex
- remove workaround for amd64
|
Monday, 11 Aug 2014
|
04:27 dinoex
- new options SSL2 SSL3
Suggested by: Velcro Leaf
|
Wednesday, 6 Aug 2014
|
23:37 delphij
Update to 1.01i.
With hat: ports-secteam
Security: vuxml 8aff07eb-1dbd-11e4-b6ba-3c970e169bc2
Security: CVE-2014-3505
Security: CVE-2014-3506
Security: CVE-2014-3507
Security: CVE-2014-3508
Security: CVE-2014-3509
Security: CVE-2014-3510
Security: CVE-2014-3511
Security: CVE-2014-3512
Security: CVE-2014-5139
|
Tuesday, 15 Jul 2014
|
16:57 adamw
Add DOCS to OPTIONS_DEFINE to ports that check for PORT_OPTIONS:MDOCS.
|
Sunday, 13 Jul 2014
|
20:47 dinoex
- add CONFLICTS because of libressl
|
Thursday, 10 Jul 2014
|
10:27 des
Include the final letter in the CPE version field.
|
Thursday, 3 Jul 2014
|
16:49 dinoex
- allow OPENSSLDIR be changed in /etc/make.conf or Makefile.local
|
Thursday, 5 Jun 2014
|
12:54 delphij
Update to 1.0.1h.
Approved by: so (ports-security@ blanket)
Security: 5ac53801-ec2e-11e3-9cf3-3c970e169bc2
|
Wednesday, 4 Jun 2014
|
16:54 des
Add CPE information.
With hat: ports-secteam
|
Saturday, 3 May 2014
|
16:36 dinoex
- Security patch
Security: CVE-2014-0198
Security: http://seclists.org/oss-sec/2014/q2/232
Security:
https://rt.openssl.org/Ticket/Display.html?user=guest&pass=guest&id=3321
Obtained from: OpenBSD
|
Sunday, 13 Apr 2014
|
08:40 dinoex
- fix a 4 year old "use-after-free" problem
https://rt.openssl.org/Ticket/Display.html?id=2167&user=guest&pass=guest
http://www.tedunangst.com/flak/post/analysis-of-openssl-freelist-reuse
http://ftp.openbsd.org/pub/OpenBSD/patches/5.4/common/008_openssl.patch
Obtained from: OpenBSD
|
Monday, 7 Apr 2014
|
21:46 bdrewery
- Update to 1.0.1g
Changes:
- Fix for CVE-2014-0160
- Add TLS padding extension workaround for broken servers.
- Fix for CVE-2014-0076
Security: CVE-2014-0160
Security: CVE-2014-0076
Security: https://www.openssl.org/news/secadv_20140407.txt
With hat: portmgr
MFH: 2014Q2
|
Sunday, 30 Mar 2014
|
19:37 dinoex
- add missing LIB_DEPENDS for forbidden option GMP
|
Friday, 28 Mar 2014
|
18:23 dinoex
- reset GREP_OPTIONS
PR: 188030
|
Tuesday, 4 Mar 2014
|
06:51 dinoex
- remove broken MANPREFIX
|
Sunday, 2 Mar 2014
|
13:13 dinoex
- error out early if users trying to break their base system
PR: 187076
|
Friday, 14 Feb 2014
|
14:34 dinoex
- use STAGEDIR
PR: 186753
Submitted by: Takefu
|
Wednesday, 8 Jan 2014
|
20:52 dinoex
- fix option PADLOCK
Submitted by: Renato Botelho
|
07:12 dinoex
- better fix for perl5.18
Submitted by: Jung-uk Kim
- clean up
|
Tuesday, 7 Jan 2014
|
20:40 dinoex
- Security update to openssl-1.0.1f
- remove broken patches
- new fix for perl5.18
- fix option GMP
Security: http://www.openssl.org/news/vulnerabilities.html
Security: CVE-2013-4353
Security: CVE-2013-6449
Security: CVE-2013-6450
Security: 5aaa257e-772d-11e3-a65a-3c970e169bc2
|
Saturday, 21 Sep 2013
|
09:45 dinoex
- fix build with perl 5.16
Submitted by: Takefu
|
Friday, 20 Sep 2013
|
22:55 bapt
Add NO_STAGE all over the place in preparation for the staging support (cat:
security)
|
Monday, 16 Sep 2013
|
16:45 bapt
Convert to new perl framework
Convert USE_GMAKE to USES
|
Monday, 9 Sep 2013
|
18:22 dinoex
- drop depedency to makedepend
Submitted by: Darren Pilgrim
|
Monday, 18 Mar 2013
|
06:20 dinoex
- fix wording of option
Submitted by: Warren Block
|
Tuesday, 5 Mar 2013
|
20:47 dinoex
- updated patches for options PADLOCK
|
Sunday, 3 Mar 2013
|
22:37 dinoex
- fix build with manpages
|
Monday, 25 Feb 2013
|
06:07 dinoex
- fix broken symlink in manpage
Submitted by: Warren Block
|
Wednesday, 13 Feb 2013
|
20:23 dinoex
- update to 1.0.1e
|
Sunday, 10 Feb 2013
|
16:20 dinoex
- fix paddding in TLS1.1 and DTLS on amd64
|
Wednesday, 6 Feb 2013
|
20:13 dinoex
- Security update to 1.0.1d
Security: CVE-2012-2686
Security: CVE-2013-0166
Security: CVE-2013-0169
Security: http://www.openssl.org/news/secadv_20120510.txt
|
Sunday, 3 Feb 2013
|
06:36 dinoex
- fix option PADLOCK
PR: 175622
Submitted by: Mathieu Simon
|
Tuesday, 29 Jan 2013
|
18:46 dinoex
- enable optimized NIST ECC on 64-bit little-endian machines
PR: 175663
Submitted by: bf
|
05:34 dinoex
- make the pkg-message respect PREFIX
PR: 175663
Submitted by: bf
|
Monday, 28 Jan 2013
|
18:07 dinoex
- mark option PADLOCK as BROKEN
PR: 175622
|
Saturday, 26 Jan 2013
|
16:34 dinoex
- cleanup header
|
Sunday, 29 Jul 2012
|
08:36 dinoex
- pass no-thread if threads are disabled
|
08:10 dinoex
- fix option THREADS
- bump PORTREVISION
PR: 170231
Submitted by: Kubilay Kocak
|
Saturday, 30 Jun 2012
|
11:33 dinoex
- update descripitions
PR: 169464
Submitted by: CyberRax
- shorter desc for options
|
Tuesday, 26 Jun 2012
|
03:41 dinoex
- fix options ZLIP and ASM
Reported by: jkim
|
Friday, 15 Jun 2012
|
21:07 dinoex
- use OPTIONS_DEFINE
- add VIA padlock support
PR: 164795
Submitted by: Stefan Krüger
|
Sunday, 13 May 2012
|
07:35 dinoex
- Security update to 1.0.1c
Security: http://openssl.org/news/secadv_20120510.txt
|
Friday, 20 Apr 2012
|
11:13 dinoex
- Security Update to 1.0.0a
Security: http://www.openssl.org/news/secadv_20120419.txt
Security:
http://lists.grok.org.uk/pipermail/full-disclosure/2012-April/086585.html
Security: CVE-2012-2110
|
Wednesday, 11 Apr 2012
|
21:06 dinoex
- update to 1.0.1
|
Thursday, 15 Mar 2012
|
06:15 dinoex
- drop DTLS bugfixes, now included upstream
- drop SCTP, will be in 1.0.1
- Security update to 1.0.0h
Security: http://www.openssl.org/news/secadv_20120312.txt
Security: CVE-2012-0884
PR: 166064
Approved by: portmgr (miwi)
Feature safe: yes
|
Wednesday, 22 Feb 2012
|
05:15 dinoex
- tamper SHLIB_VERSION_NUMBER in opensslv.h
This allows some qt apps to dynamicly load openssl
|
Thursday, 19 Jan 2012
|
19:25 dinoex
- Security update to 1.0.0g
Security: http://www.openssl.org/news/secadv_20120118.txt
|
Wednesday, 11 Jan 2012
|
05:44 dinoex
- Build with obsolte MD2 hash by default
- Security Update to 1.0.0f
Security: http://openssl.org/news/secadv_20120104.txt
Security: CVE-2011-4108
Security: CVE-2011-4109
Security: CVE-2011-4576
Security: CVE-2011-4577
Security: CVE-2011-4619
Security: CVE-2012-0027
Submitted by: Tim Zingelman
|
Tuesday, 22 Nov 2011
|
06:50 dinoex
- make portlint happier
- update patches
PR: 161379
Feature safe: yes
|
Wednesday, 7 Sep 2011
|
18:10 dinoex
- Security update to 1.0.0e
Security: http://openssl.org/news/secadv_20110906.txt
- drop option TLS_EXTRACTOR, now in distribution
- add RFC-5705 patch
Obtained from: OpenBSD
|
Thursday, 10 Feb 2011
|
18:30 dinoex
- Security update to 1.0.0d
Security: http://openssl.org/news/secadv_20110208.txt
Security: CVE-2011-0014
Feature safe: yes
|
Friday, 3 Dec 2010
|
15:19 dinoex
- Security update to 1.0.0c
Security: http://openssl.org/news/secadv_20101202.txt
Security: CVE-2010-4180
|
Wednesday, 17 Nov 2010
|
10:35 dinoex
- Security update to 1.0.0b
Security: http://openssl.org/news/secadv_20101116.txt
Security: CVE-2010-3864
PR: 152312
Submitted by: Alexander Wittig
- Fix regression in TLS handling
Obtained from: http://cvs.openssl.org/chngview?cn=19998
|
Friday, 11 Jun 2010
|
20:15 dinoex
- ease fetching
|
Sunday, 6 Jun 2010
|
12:33 dinoex
- update to openssl-1.0.0a
Security: CVE-2010-1633
this problem was already fixed in 1.0.0 with option WITH_DTLS_BUGS
|
Wednesday, 5 May 2010
|
15:21 dinoex
- fix path in c_rehash
Submitted by: Matthias Andree
Obtained from: http://rt.openssl.org/Ticket/Display.html?id=2234
- add more DTLS bugfixes
Obtained from: http://sctp.fh-muenster.de/
|
Tuesday, 6 Apr 2010
|
19:16 dinoex
- add option WITHOUT_ASM
|
17:30 dinoex
- fix build on sparc64
Submitted by: kwm
|
10:46 dinoex
- chase updated patches for sctp-17 and dtls
|
Monday, 5 Apr 2010
|
18:21 dinoex
- add options WITH_MD2
Suggested by: Tatsuki Makino
- add options WITH_RC5 and WITH_RFC3779
|
07:44 dinoex
- strip text for options
Reported by: Richard J. Dawes
|
Friday, 2 Apr 2010
|
18:42 dinoex
- update to 1.0.0
- regression tested on i386, amd64 and ia64
- use DIST_SUBDIR to resolve conflicts with old patchfiles
- new options DTLS_RENEGOTIATION, DTLS_HEARTBEAT, TLS_EXTRACTOR, SCTP
|
Tuesday, 30 Mar 2010
|
19:07 dinoex
- Security update to 0.9.8n
Security: http://www.openssl.org/news/secadv_20100324.txt
|
Friday, 26 Feb 2010
|
18:47 dinoex
- update to 0.9.8m
- support RFC5746
Security: CVE-2008-1678
Security: CVE-2009-1377
Security: CVE-2009-1378
Security: CVE-2009-1379
Approved by: portmgr (pav)
Feature safe: yes
|
Saturday, 23 Jan 2010
|
18:00 dinoex
- allow use of faster CPU
- enable SSE2 optimisations
- fix thread option
- cleanup
- fix spelling
- pass no-zlib option
Submitted by: b.f.
|
Number of commits found: 320 (showing only 100 on this page) |