pkgsrc-Changes-HG archive

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]

[pkgsrc/pkgsrc-2009Q4]: pkgsrc/security/openssl Pullup ticket #2967 - request...



details:   https://anonhg.NetBSD.org/pkgsrc/rev/27f98ba072a8
branches:  pkgsrc-2009Q4
changeset: 569206:27f98ba072a8
user:      tron <tron%pkgsrc.org@localhost>
date:      Sun Jan 24 10:56:27 2010 +0000

description:
Pullup ticket #2967 - requested by taca
openssl: security patch

Revisions pulled up:
- security/openssl/Makefile                     1.143
- security/openssl/distinfo                     1.71
- security/openssl/patches/patch-bb             1.1
---
Module Name:    pkgsrc
Committed By:   taca
Date:           Fri Jan 22 03:35:10 UTC 2010

Modified Files:
        pkgsrc/security/openssl: Makefile distinfo
Added Files:
        pkgsrc/security/openssl/patches: patch-bb

Log Message:
Add a patch from OpenSSL's repositroy to deal with CVE-2009-4355.

Bump PKGREVISION.

diffstat:

 security/openssl/Makefile         |   3 +-
 security/openssl/distinfo         |   3 +-
 security/openssl/patches/patch-bb |  44 +++++++++++++++++++++++++++++++++++++++
 3 files changed, 48 insertions(+), 2 deletions(-)

diffs (76 lines):

diff -r 9fc7951b9081 -r 27f98ba072a8 security/openssl/Makefile
--- a/security/openssl/Makefile Thu Jan 21 21:21:13 2010 +0000
+++ b/security/openssl/Makefile Sun Jan 24 10:56:27 2010 +0000
@@ -1,8 +1,9 @@
-# $NetBSD: Makefile,v 1.142 2010/01/15 04:55:30 taca Exp $
+# $NetBSD: Makefile,v 1.142.2.1 2010/01/24 10:56:27 tron Exp $
 
 OPENSSL_SNAPSHOT?=     # empty
 OPENSSL_STABLE?=       # empty
 OPENSSL_VERS?=         0.9.8l
+PKGREVISION=           1
 
 .if empty(OPENSSL_SNAPSHOT)
 DISTNAME=      openssl-${OPENSSL_VERS}
diff -r 9fc7951b9081 -r 27f98ba072a8 security/openssl/distinfo
--- a/security/openssl/distinfo Thu Jan 21 21:21:13 2010 +0000
+++ b/security/openssl/distinfo Sun Jan 24 10:56:27 2010 +0000
@@ -1,4 +1,4 @@
-$NetBSD: distinfo,v 1.70 2010/01/15 04:55:30 taca Exp $
+$NetBSD: distinfo,v 1.70.2.1 2010/01/24 10:56:27 tron Exp $
 
 SHA1 (openssl-0.9.8l.tar.gz) = d3fb6ec89532ab40646b65af179bb1770f7ca28f
 RMD160 (openssl-0.9.8l.tar.gz) = 9de81ec2583edcba729e62d50fd22c0a98a52903
@@ -15,3 +15,4 @@
 SHA1 (patch-ay) = 6d5de155e5508cd2237387626c8e1ff7ee603f8e
 SHA1 (patch-az) = aa7ef7192d56979ba09aa1dab8a2cdf9868f9c4a
 SHA1 (patch-ba) = b8ab55c0c6ab4b995cae18517609720f0803e11f
+SHA1 (patch-bb) = a4092a65f52d3c9c85c9015901b2a5eeb11d0955
diff -r 9fc7951b9081 -r 27f98ba072a8 security/openssl/patches/patch-bb
--- /dev/null   Thu Jan 01 00:00:00 1970 +0000
+++ b/security/openssl/patches/patch-bb Sun Jan 24 10:56:27 2010 +0000
@@ -0,0 +1,44 @@
+$NetBSD: patch-bb,v 1.1.2.2 2010/01/24 10:56:27 tron Exp $
+
+deal with CVE-2009-4355, revsion 1.15.2.8 from OpenSSL's CVS repository.
+
+--- crypto/comp/c_zlib.c.orig  2008-12-13 17:00:53.000000000 +0000
++++ crypto/comp/c_zlib.c
+@@ -136,15 +136,6 @@ struct zlib_state
+ 
+ static int zlib_stateful_ex_idx = -1;
+ 
+-static void zlib_stateful_free_ex_data(void *obj, void *item,
+-      CRYPTO_EX_DATA *ad, int ind,long argl, void *argp)
+-      {
+-      struct zlib_state *state = (struct zlib_state *)item;
+-      inflateEnd(&state->istream);
+-      deflateEnd(&state->ostream);
+-      OPENSSL_free(state);
+-      }
+-
+ static int zlib_stateful_init(COMP_CTX *ctx)
+       {
+       int err;
+@@ -188,6 +179,12 @@ static int zlib_stateful_init(COMP_CTX *
+ 
+ static void zlib_stateful_finish(COMP_CTX *ctx)
+       {
++      struct zlib_state *state =
++              (struct zlib_state *)CRYPTO_get_ex_data(&ctx->ex_data,
++                      zlib_stateful_ex_idx);
++      inflateEnd(&state->istream);
++      deflateEnd(&state->ostream);
++      OPENSSL_free(state);
+       CRYPTO_free_ex_data(CRYPTO_EX_INDEX_COMP,ctx,&ctx->ex_data);
+       }
+ 
+@@ -402,7 +399,7 @@ COMP_METHOD *COMP_zlib(void)
+                       if (zlib_stateful_ex_idx == -1)
+                               zlib_stateful_ex_idx =
+                                       CRYPTO_get_ex_new_index(CRYPTO_EX_INDEX_COMP,
+-                                              0,NULL,NULL,NULL,zlib_stateful_free_ex_data);
++                                              0,NULL,NULL,NULL,NULL);
+                       CRYPTO_w_unlock(CRYPTO_LOCK_COMP);
+                       if (zlib_stateful_ex_idx == -1)
+                               goto err;



Home | Main Index | Thread Index | Old Index