pkgsrc-Changes-HG archive

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]

[pkgsrc/trunk]: pkgsrc/security/gnutls Update to 2.8.3. Changes:



details:   https://anonhg.NetBSD.org/pkgsrc/rev/a8ecbb0526ec
branches:  trunk
changeset: 397475:a8ecbb0526ec
user:      snj <snj%pkgsrc.org@localhost>
date:      Thu Aug 13 18:56:32 2009 +0000

description:
Update to 2.8.3.  Changes:

* Version 2.8.3 (released 2009-08-13)

** libgnutls: Fix patch for NUL in CN/SAN in last release.
Code intended to be removed would lead to an read-out-bound error in
some situations.  Reported by Tomas Hoger <thoger%redhat.com@localhost>.  A CVE
code have been allocated for the vulnerability: [CVE-2009-2730].

** libgnutls: Fix rare failure in gnutls_x509_crt_import.
The function may fail incorrectly when an earlier certificate was
imported to the same gnutls_x509_crt_t structure.

** libgnutls-extra, libgnutls-openssl: Fix MinGW cross-compiling build
error.

** tests: Made self-test mini-eagain take less time.

** doc: Typo fixes.

** API and ABI modifications:
No changes since last version.

* Version 2.8.2 (released 2009-08-10)

** libgnutls: Fix problem with NUL bytes in X.509 CN and SAN fields.
By using a NUL byte in CN/SAN fields, it was possible to fool GnuTLS
into 1) not printing the entire CN/SAN field value when printing a
certificate and 2) cause incorrect positive matches when matching a
hostname against a certificate.  Some CAs apparently have poor
checking of CN/SAN values and issue these (arguable invalid)
certificates.  Combined, this can be used by attackers to become a
MITM on server-authenticated TLS sessions.  The problem is mitigated
since attackers needs to get one certificate per site they want to
attack, and the attacker reveals his tracks by applying for a
certificate at the CA.  It does not apply to client authenticated TLS
sessions.  Research presented independently by Dan Kaminsky and Moxie
Marlinspike at BlackHat09.  Thanks to Tomas Hoger <thoger%redhat.com@localhost>
for providing one part of the patch.  [GNUTLS-SA-2009-4].

** libgnutls: Fix return value of gnutls_certificate_client_get_request_status.
Before it always returned false.  Reported by Peter Hendrickson
<pdh%wiredyne.com@localhost> in
<http://thread.gmane.org/gmane.comp.encryption.gpg.gnutls.devel/3668>.

** libgnutls: Fix off-by-one size computation error in unknown DN printing.
The error resulted in truncated strings when printing unknown OIDs in
X.509 certificate DNs.  Reported by Tim Kosse
<tim.kosse%filezilla-project.org@localhost> in
<http://thread.gmane.org/gmane.comp.encryption.gpg.gnutls.devel/3651>.

** libgnutls: Return correct bit lengths of some MPIs.
gnutls_dh_get_prime_bits, gnutls_rsa_export_get_modulus_bits, and
gnutls_dh_get_peers_public_bits.  Before the reported value was
overestimated.  Reported by Peter Hendrickson <pdh%wiredyne.com@localhost> in
<http://thread.gmane.org/gmane.comp.encryption.gpg.gnutls.devel/3607>.

** libgnutls: Avoid internal error when invoked after GNUTLS_E_AGAIN.
Report and patch by Tim Kosse <tim.kosse%filezilla-project.org@localhost> in
<http://permalink.gmane.org/gmane.comp.encryption.gpg.gnutls.devel/3671>
and
<http://permalink.gmane.org/gmane.comp.encryption.gpg.gnutls.devel/3670>.

** libgnutls: Relax checking of required libtasn1/libgcrypt versions.
Before we required that the runtime library used the same (or more
recent) libgcrypt/libtasn1 as it was compiled with.  Now we just check
that the runtime usage is above the minimum required.  Reported by
Marco d'Itri <md%linux.it@localhost> via Andreas Metzler
<ametzler%downhill.at.eu.org@localhost> in <http://bugs.debian.org/540449>.

** minitasn1: Internal copy updated to libtasn1 v2.3.

** tests: Fix failure in "chainverify" because a certificate have expired.

** API and ABI modifications:
No changes since last version.

diffstat:

 security/gnutls/Makefile         |   5 ++---
 security/gnutls/distinfo         |  12 ++++++------
 security/gnutls/patches/patch-ak |  10 +++++-----
 security/gnutls/patches/patch-al |  10 +++++-----
 4 files changed, 18 insertions(+), 19 deletions(-)

diffs (75 lines):

diff -r cd3809fd365c -r a8ecbb0526ec security/gnutls/Makefile
--- a/security/gnutls/Makefile  Thu Aug 13 18:18:56 2009 +0000
+++ b/security/gnutls/Makefile  Thu Aug 13 18:56:32 2009 +0000
@@ -1,7 +1,6 @@
-# $NetBSD: Makefile,v 1.85 2009/07/22 16:50:07 drochner Exp $
+# $NetBSD: Makefile,v 1.86 2009/08/13 18:56:32 snj Exp $
 
-DISTNAME=      gnutls-2.8.1
-PKGREVISION=   1
+DISTNAME=      gnutls-2.8.3
 CATEGORIES=    security devel
 MASTER_SITES=  ftp://ftp.gnutls.org/pub/gnutls/ \
                ftp://ftp.gnupg.org/gcrypt/gnutls/ \
diff -r cd3809fd365c -r a8ecbb0526ec security/gnutls/distinfo
--- a/security/gnutls/distinfo  Thu Aug 13 18:18:56 2009 +0000
+++ b/security/gnutls/distinfo  Thu Aug 13 18:56:32 2009 +0000
@@ -1,12 +1,12 @@
-$NetBSD: distinfo,v 1.59 2009/07/22 16:50:07 drochner Exp $
+$NetBSD: distinfo,v 1.60 2009/08/13 18:56:32 snj Exp $
 
-SHA1 (gnutls-2.8.1.tar.bz2) = b5fd364848709393d05def7e926caddd27169525
-RMD160 (gnutls-2.8.1.tar.bz2) = 3b0d7a80a60dfc3222357d2c83a7ec32bd2c8e33
-Size (gnutls-2.8.1.tar.bz2) = 6178662 bytes
+SHA1 (gnutls-2.8.3.tar.bz2) = c25fb354258777f9ee34b79b08eb87c024cada75
+RMD160 (gnutls-2.8.3.tar.bz2) = 01763fad93e4b76e18dcfb1881c5f09011804dca
+Size (gnutls-2.8.3.tar.bz2) = 6198273 bytes
 SHA1 (patch-ab) = 4b6801f6c8f00b8da8e78f7277450c6f53366fb4
 SHA1 (patch-ae) = f505476ce0477dc547e8698d205d6ba26fe85f48
 SHA1 (patch-af) = bd4701640dfef5bfdce87d620befd93098b0dff3
 SHA1 (patch-ai) = 2c5c181ec6de9622cac66c2d5fe2cc8f3f89fbe8
 SHA1 (patch-aj) = 55187c2a07d67f789678b1a404c6b119b311fc82
-SHA1 (patch-ak) = ba01d607e6fad2108aed0ba2ef4a7c1168b42048
-SHA1 (patch-al) = 5b2e6bab1bc91b6e508915b984dcfa4e6030a8a6
+SHA1 (patch-ak) = f2f4e6f1c6f937eca67235cb01aff1b32cbe4fd8
+SHA1 (patch-al) = f1c9def7d8150d93e14678b1acdbbc1534099452
diff -r cd3809fd365c -r a8ecbb0526ec security/gnutls/patches/patch-ak
--- a/security/gnutls/patches/patch-ak  Thu Aug 13 18:18:56 2009 +0000
+++ b/security/gnutls/patches/patch-ak  Thu Aug 13 18:56:32 2009 +0000
@@ -1,11 +1,11 @@
-$NetBSD: patch-ak,v 1.1 2009/07/22 16:50:07 drochner Exp $
+$NetBSD: patch-ak,v 1.2 2009/08/13 18:56:32 snj Exp $
 
---- configure.orig     2009-06-17 20:42:30.000000000 +0200
-+++ configure
-@@ -8587,7 +8587,7 @@ $as_echo "#define GNUTLS_POINTER_TO_INT_
+--- configure.orig     2009-08-13 02:54:16.000000000 -0700
++++ configure  2009-08-13 10:50:08.000000000 -0700
+@@ -8651,7 +8651,7 @@ done
  $as_echo_n "checking whether to disable OpenSSL compatibility layer... " >&6; }
    # Check whether --enable-openssl-compatibility was given.
- if test "${enable_openssl_compatibility+set}" = set; then
+ if test "${enable_openssl_compatibility+set}" = set; then :
 -  enableval=$enable_openssl_compatibility; enable_openssl=$withval
 +  enableval=$enable_openssl_compatibility; enable_openssl=$enableval
  else
diff -r cd3809fd365c -r a8ecbb0526ec security/gnutls/patches/patch-al
--- a/security/gnutls/patches/patch-al  Thu Aug 13 18:18:56 2009 +0000
+++ b/security/gnutls/patches/patch-al  Thu Aug 13 18:56:32 2009 +0000
@@ -1,11 +1,11 @@
-$NetBSD: patch-al,v 1.1 2009/07/22 16:50:07 drochner Exp $
+$NetBSD: patch-al,v 1.2 2009/08/13 18:56:32 snj Exp $
 
---- libextra/configure.orig    2009-06-17 20:47:38.000000000 +0200
-+++ libextra/configure
-@@ -12996,7 +12996,7 @@ $as_echo "#define GNUTLS_POINTER_TO_INT_
+--- libextra/configure.orig    2009-08-13 02:54:00.000000000 -0700
++++ libextra/configure 2009-08-13 10:51:47.000000000 -0700
+@@ -13170,7 +13170,7 @@ done
  $as_echo_n "checking whether to disable OpenSSL compatibility layer... " >&6; }
    # Check whether --enable-openssl-compatibility was given.
- if test "${enable_openssl_compatibility+set}" = set; then
+ if test "${enable_openssl_compatibility+set}" = set; then :
 -  enableval=$enable_openssl_compatibility; enable_openssl=$withval
 +  enableval=$enable_openssl_compatibility; enable_openssl=$enableval
  else



Home | Main Index | Thread Index | Old Index