Date: Tue, 1 Oct 2013 23:47:14 +0000 (UTC) From: Jase Thew <jase@FreeBSD.org> To: ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org Subject: svn commit: r329009 - in head/security: polarssl vuxml Message-ID: <201310012347.r91NlEdY007756@svn.freebsd.org>
next in thread | raw e-mail | index | archive | help
Author: jase Date: Tue Oct 1 23:47:13 2013 New Revision: 329009 URL: http://svnweb.freebsd.org/changeset/ports/329009 Log: - Update to 1.2.9 - Add vuxml entry - Prevent install target from copying patch backup files Changes: https://raw.github.com/polarssl/polarssl/60ad84f43f46b0d3673eaca8b9847d7e01b83c5e/ChangeLog Security: ccefac3e-2aed-11e3-af10-000c29789cb5 Security: CVE-2013-5915 Modified: head/security/polarssl/Makefile head/security/polarssl/distinfo head/security/vuxml/vuln.xml Modified: head/security/polarssl/Makefile ============================================================================== --- head/security/polarssl/Makefile Tue Oct 1 23:24:09 2013 (r329008) +++ head/security/polarssl/Makefile Tue Oct 1 23:47:13 2013 (r329009) @@ -1,9 +1,8 @@ # $FreeBSD$ PORTNAME= polarssl -PORTVERSION= 1.2.8 +PORTVERSION= 1.2.9 DISTVERSIONSUFFIX= -gpl -PORTREVISION= 1 CATEGORIES= security devel MASTER_SITES= http://polarssl.org/download/ EXTRACT_SUFX= .tgz @@ -32,7 +31,7 @@ BINFILES= aescrypt2 benchmark dh_client # cmake install is broken, so we do it by hand do-install: - @${TAR} -C ${WRKSRC}/include -cf - polarssl | ${TAR} -C ${STAGEDIR}${PREFIX}/include -xf - + @cd ${WRKSRC}/include && ${COPYTREE_SHARE} ${PORTNAME} ${STAGEDIR}${PREFIX}/include "! -name *.orig" ${INSTALL_DATA} ${WRKSRC}/library/libpolarssl.a ${STAGEDIR}${PREFIX}/lib/ ${INSTALL_DATA} ${WRKSRC}/library/libpolarssl.so ${STAGEDIR}${PREFIX}/lib/libpolarssl.so.0 cd ${STAGEDIR}${PREFIX}/lib/ && ${LN} -sf libpolarssl.so.0 libpolarssl.so Modified: head/security/polarssl/distinfo ============================================================================== --- head/security/polarssl/distinfo Tue Oct 1 23:24:09 2013 (r329008) +++ head/security/polarssl/distinfo Tue Oct 1 23:47:13 2013 (r329009) @@ -1,2 +1,2 @@ -SHA256 (polarssl-1.2.8-gpl.tgz) = 23cf931e322ab397d26c89b7e805cf2229df46c5196f4f67ebfc0e285848637b -SIZE (polarssl-1.2.8-gpl.tgz) = 998609 +SHA256 (polarssl-1.2.9-gpl.tgz) = d125a6e7eb6eb3e5110035df1469099c5463837b1ef734e60771095dafc0ef56 +SIZE (polarssl-1.2.9-gpl.tgz) = 999668 Modified: head/security/vuxml/vuln.xml ============================================================================== --- head/security/vuxml/vuln.xml Tue Oct 1 23:24:09 2013 (r329008) +++ head/security/vuxml/vuln.xml Tue Oct 1 23:47:13 2013 (r329009) @@ -51,6 +51,46 @@ Note: Please add new entries to the beg --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="ccefac3e-2aed-11e3-af10-000c29789cb5"> + <topic>polarssl -- Timing attack against protected RSA-CRT implementation</topic> + <affects> + <package> + <name>polarssl</name> + <range><lt>1.2.9</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>PolarSSL Project reports:</p> + <blockquote cite="https://polarssl.org/tech-updates/security-advisories/polarssl-security-advisory-2013-05"> + <p>The researchers Cyril Arnaud and Pierre-Alain Fouque + investigated the PolarSSL RSA implementation and discovered + a bias in the implementation of the Montgomery multiplication + that we used. For which they then show that it can be used to + mount an attack on the RSA key. Although their test attack is + done on a local system, there seems to be enough indication + that this can properly be performed from a remote system as + well.</p> + <p>All versions prior to PolarSSL 1.2.9 and 1.3.0 are affected + if a third party can send arbitrary handshake messages to your + server.</p> + <p>If correctly executed, this attack reveals the entire private + RSA key after a large number of attack messages (> 600.000 on + a local machine) are sent to show the timing differences.</p> + </blockquote> + </body> + </description> + <references> + <cvename>CVE-2013-5915</cvename> + <url>https://polarssl.org/tech-updates/security-advisories/polarssl-security-advisory-2013-05</url> + <url>https://polarssl.org/tech-updates/releases/polarssl-1.2.9-released</url> + </references> + <dates> + <discovery>2013-10-01</discovery> + <entry>2013-10-02</entry> + </dates> + </vuln> + <vuln vid="e5414d0c-2ade-11e3-821d-00262d5ed8ee"> <topic>chromium -- multiple vulnerabilities</topic> <affects>
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201310012347.r91NlEdY007756>