non port: security/openssl/Makefile |
SVNWeb
|
Number of commits found: 305 (showing only 100 on this page) |
Wed, 31 May 2023
|
[ 11:41 Bernard Spil (brnrd) ] 11c58a2
security/openssl: Security update to 1.1.1u
Security: eb9a3c57-ff9e-11ed-a0d1-84a93843eb75
MFH: 2023Q2
|
Wed, 29 Mar 2023
|
[ 18:53 Bernard Spil (brnrd) ] 543bd99
security/openssl: Security update for CVE-2023-0465 & 0466
Security: 425b9538-ce5f-11ed-ade3-d4c9ef517024
|
Fri, 24 Mar 2023
|
[ 11:43 Bernard Spil (brnrd) ] 036b6ca
security/openssl: Security update for CVE-2023-0464
Security: 1ba034fb-ca38-11ed-b242-d4c9ef517024
|
Wed, 15 Mar 2023
|
[ 09:14 Bernard Spil (brnrd) ] 70a4cc5
security/openssl30: Chase rename in ports CONFLICTS*
Reported by: cperciva, junchoon
|
Tue, 7 Feb 2023
|
[ 19:54 Bernard Spil (brnrd) ] bf0a2e5
security/openssl: Security update to 1.1.1t
Security: 648a432c-a71f-11ed-86e9-d4c9ef517024
MFH: 2023Q1
|
Tue, 1 Nov 2022
|
[ 17:47 Bernard Spil (brnrd) ] 323086c
security/openssl: Update to 1.1.1s
|
Wed, 7 Sep 2022
|
[ 21:10 Stefan Eßer (se) ] b7f0544 (Only the first 10 of 27931 ports in this commit are shown above. )
Add WWW entries to port Makefiles
It has been common practice to have one or more URLs at the end of the
ports' pkg-descr files, one per line and prefixed with "WWW:". These
URLs should point at a project website or other relevant resources.
Access to these URLs required processing of the pkg-descr files, and
they have often become stale over time. If more than one such URL was
present in a pkg-descr file, only the first one was tarnsfered into
the port INDEX, but for many ports only the last line did contain the
port specific URL to further information.
There have been several proposals to make a project URL available as
a macro in the ports' Makefiles, over time.
(Only the first 15 lines of the commit message are shown above )
|
Wed, 20 Jul 2022
|
[ 14:22 Tobias C. Berner (tcberner) ] 857c05f (Only the first 10 of 840 ports in this commit are shown above. )
security: remove 'Created by' lines
A big Thank You to the original contributors of these ports:
* <ports@c0decafe.net>
* Aaron Dalton <aaron@FreeBSD.org>
* Adam Weinberger <adamw@FreeBSD.org>
* Ade Lovett <ade@FreeBSD.org>
* Aldis Berjoza <aldis@bsdroot.lv>
* Alex Dupre <ale@FreeBSD.org>
* Alex Kapranoff <kappa@rambler-co.ru>
* Alex Samorukov <samm@freebsd.org>
* Alexander Botero-Lowry <alex@foxybanana.com>
* Alexander Kriventsov <avk@vl.ru>
* Alexander Leidinger <netchild@FreeBSD.org> (Only the first 15 lines of the commit message are shown above )
|
Tue, 5 Jul 2022
|
[ 14:53 Bernard Spil (brnrd) ] df0eb4e
security/openssl: Security update to 1.1.1q
* Fixes vuln in AES OCB
Security: a28e8b7e-fc70-11ec-856e-d4c9ef517024
MFH: 2022Q3
|
Wed, 22 Jun 2022
|
[ 08:56 Bernard Spil (brnrd) ] f894292
security/openssl: Security update to 1.1.1p
Security: 4eeb93bf-f204-11ec-8fbd-d4c9ef517024
|
Sat, 14 May 2022
|
[ 19:59 Bernard Spil (brnrd) ] 9de8dbb
security/openssl: Update KTLS patches
* Add support for TLS 1.3 receive
Reported by: jhb
Differential Revision: https://reviews.freebsd.org/D35189
|
Wed, 4 May 2022
|
[ 07:33 Bernard Spil (brnrd) ] 1c667cc
security/openssl: Update to 1.1.1o
Security: fceb2b08-cb76-11ec-a06f-d4c9ef517024
MFH: 2022Q2
|
Wed, 16 Mar 2022
|
[ 19:18 Bernard Spil (brnrd) ] 4374137
security/openssl: Security update to 1.1.1n
Security: ea05c456-a4fd-11ec-90de-1c697aa5a594
MFH: 2022Q1
|
Sat, 19 Feb 2022
|
[ 15:12 Bernard Spil (brnrd) ] b4beeee
security/openssl: Update KTLS patch
Reported by: jhb
Differential Revision: https://reviews.freebsd.org/D34136
|
Mon, 10 Jan 2022
|
[ 23:19 Stefan Eßer (se) ] 5600b79
security/openssl: add boringssl to CONFLICTS_INSTALL
Approved by: portmgr (implicit)
|
[ 15:15 Stefan Eßer (se) ] bcaf25a (Only the first 10 of 491 ports in this commit are shown above. )
Fix CONFLICTS entries of multiple ports
There have been lots of missing CONFLICTS_INSTALL entries, either
because conflicting ports were added without updating existing ports,
due to name changes of generated packages, due to mis-understanding
the format and semantics of the conflicts entries, or just due to
typoes in package names.
This patch is the result of a comparison of all files contained in
the official packages with each other. This comparison was based on
packages built with default options and may therefore have missed
further conflicts with optionally installed files.
Where possible, version numbers in conflicts entries have been
generalized, some times taking advantage of the fact that a port (Only the first 15 lines of the commit message are shown above )
|
Mon, 20 Dec 2021
|
[ 18:03 Bernard Spil (brnrd) ] f64391d
security/openssl: Fix build on aarch64
* Upstream only partly merged changes
PR: 259937, 260572
Reported by: allanjude, "Naram Qashat" <cyberbotx cyberbotx com>
|
Tue, 14 Dec 2021
|
[ 19:13 Bernard Spil (brnrd) ] 00935ff
security/openssl: Update to 1.1.1m
|
Tue, 23 Nov 2021
|
[ 22:11 Stefan Eßer (se) ] 5933ac0 (Only the first 10 of 157 ports in this commit are shown above. )
*/*: Remove redundant '-[0-9]*' from CONFLICTS_INSTALL
The conflict checks compare the patterns first against the package
names without version (as reported by "pkg query "%n"), then - if
there was no match - agsinst the full package names including the
version (as reported by "pkg query "%n-%v").
Approved by: portmgr (blanket)
|
[ 18:44 Bernard Spil (brnrd) ] e2d67be
www/openssl: Fix detection of ARM CPU features
Upstream:
* https://github.com/openssl/openssl/pull/17082
* https://github.com/openssl/openssl/pull/17085
PR: 259937
Submitted by: allanjude
Differential Revision: https://reviews.freebsd.org/D33061
|
Sun, 29 Aug 2021
|
[ 12:40 Bernard Spil (brnrd) ] dcc0bde
security/openssl: Auto-generate MAN3 plist
|
Tue, 24 Aug 2021
|
[ 17:54 Bernard Spil (brnrd) ] d3011e2
security/openssl: Security update to 1.1.1l
Security: 96811d4a-04ec-11ec-9b84-d4c9ef517024
MFH: 2021Q3
|
Thu, 19 Aug 2021
|
[ 14:01 Bernard Spil (brnrd) ] 214d585
security/openssl: Update KTLS patches for Chacha20-Poly1305
This pulls in several upstream KTLS patches from OpenSSL master:
* A fix to the return values of BIO_get_ktls_*().
* Support for Chacha20-Poly1305.
* Replacing the SSL_MODE_NO_KTLS_* modes which opted-out of KTLS with
an opt-in SSL_OP_ENABLE_KTLS. Note that this means that KTLS is not
enabled by default. Users can enable KTLS via a custom OpenSSL config
file that enables the KTLS option.
Reported by: jhb
Sponsored by: Netflix
Differential Revision: https://reviews.freebsd.org/D31430
|
Tue, 6 Apr 2021
|
[ 14:31 Mathieu Arnold (mat) ] 305f148 (Only the first 10 of 29333 ports in this commit are shown above. )
Remove # $FreeBSD$ from Makefiles.
|
[ 10:45 Bernard Spil (brnrd) ] 64d9416
security/openssl: Fix /dev/crypto issue with 1.1.1k
PR: 254643
Reported by: <cryx-freebsd h3q com>
Reviewed by: wollman
|
Fri, 26 Mar 2021
|
[ 08:13 brnrd ]
security/openssl: Security update to 1.1.1k
PR: 254551
Submitted by: Pascal Christen <pascal christen hostpoint ch>
MFH: 2021Q1
Security: 5a668ab3-8d86-11eb-b8d6-d4c9ef517024
|
Sun, 7 Mar 2021
|
[ 16:45 tobik ] (Only the first 10 of 34 ports in this commit are shown above. )
Remove redundant option descriptions that match the default ones
(ignoring case)
Reported by: danfe (for net/mosquitto), portscan
|
Thu, 18 Feb 2021
|
[ 09:22 brnrd ]
security/openssl: Update KTLS patch
PR: 251969
Submitted by: gonzo, jhb
Obtained
from: https://github.com/openssl/openssl/commit/dfcfd17f2818cf520ce6381aed9ec3d2fc12170d
Differential Revision: https://reviews.freebsd.org/D28763
|
Wed, 17 Feb 2021
|
[ 13:57 brnrd ]
security/openssl: Security update to 1.1.1j
PR: 253561
Reported by: Michael Glaus <michael glaus hostpoint ch>
MFH: 2021Q1
Security: 96a21236-707b-11eb-96d8-d4c9ef517024
|
Sun, 31 Jan 2021
|
[ 17:35 brnrd ]
security/openssl: Update KTLS patch
Differential Revision: https://reviews.freebsd.org/D27423
|
Tue, 8 Dec 2020
|
[ 16:26 brnrd ]
security/vuxml: Security update to 1.1.1i
MFH: 2020Q4
Security: 1d56cfc5-3970-11eb-929d-d4c9ef517024
|
Mon, 5 Oct 2020
|
[ 20:07 jhb ]
Expand support for TLS protocols supported by KTLS.
Backport additional patches merged into OpenSSL's master
branch to support KTLS RX for TLS 1.1 and 1.2 as well as
support for KTLS TX for TLS 1.3.
Reviewed by: brnrd (maintainer)
Sponsored by: Chelsio Communications, Netflix
Differential Revision: https://reviews.freebsd.org/D26261
|
Wed, 23 Sep 2020
|
[ 19:55 brnrd ]
security/openssl: Update to 1.1.1g
|
Sat, 23 May 2020
|
[ 19:35 brnrd ]
security/openssl: Add kernel TLS option
Submitted by: jhb@freebsd.org
Differential Revision: https://reviews.freebsd.org/D24274
|
Mon, 27 Apr 2020
|
[ 13:10 brnrd ] (Only the first 10 of 15 ports in this commit are shown above. )
security/openssl-devel: Resurrect OpenSSL devel port
|
Wed, 22 Apr 2020
|
[ 09:35 brnrd ]
security/openssl: Security update to 1.1.1g
PR: 245795
Reported by: Dani <i dani at outlook com>
MFH: 2020Q2
Security: 012809ce-83f3-11ea-92ab-00163e433440
|
Tue, 31 Mar 2020
|
[ 14:37 brnrd ]
security/openssl: Bug-fix update to 1.1.1f
PR: 245154
MFH: 2020Q1
|
Sun, 29 Mar 2020
|
[ 16:00 brnrd ]
security/openssl: Fix EOF bug
See https://github.com/openssl/openssl/pull/11400
PR: 245154
Reported by: koobs
MFH: 2020Q1
|
Fri, 20 Mar 2020
|
[ 20:05 brnrd ]
security/openssl: Add missing description
Reported by: adamw
|
Tue, 17 Mar 2020
|
[ 20:02 brnrd ]
security/openssl: Update to 1.1.1e
- SM2/SM3 not a cipher [1]
- Add weak-ciphers option [2]
PR: 237056 [1]
Reported by: dewayne heuristicsystems com.au> [1], mat [2]
|
Fri, 3 Jan 2020
|
[ 12:19 brnrd ]
security/openssl: Remove self-conflict
PR: 243049
Submitted by: Franco Fichtner
MFH: 2020Q1
|
Wed, 1 Jan 2020
|
[ 16:42 brnrd ]
security/openssl111: Rename to openssl
- Honoring promise from DEPRECATED message
- Unbreak people's builds
PR: 243014
MFH: 2020Q1
|
Fri, 20 Dec 2019
|
[ 15:06 brnrd ]
security/openssl: Security update to 1.0.2u
MFH: 2019Q4
Security: d778ddb0-2338-11ea-a1c7-b499baebfeaf
|
Sun, 27 Oct 2019
|
[ 11:19 brnrd ]
security/openssl: Notify users of upcoming 1.1.1
|
Wed, 11 Sep 2019
|
[ 20:04 brnrd ]
security/openssl: Security update to 1.0.2t
MFH: 2019Q3
Security: 9e0c6f7a-d46d-11e9-a1c7-b499baebfeaf
|
Tue, 28 May 2019
|
[ 20:22 brnrd ]
security/openssl: Security hardening update to 1.0.2s
MFH: 2019Q2
|
Wed, 27 Feb 2019
|
[ 08:06 brnrd ]
security/openssl: Security update to 1.0.2r
MFH: 2019Q1
Security: 7700061f-34f7-11e9-b95c-b499baebfeaf
|
Sun, 17 Feb 2019
|
[ 19:09 brnrd ]
security/openssl: Fix build with lld on i386
PR: 231459
Submitted by: Nathan <ndowens@yahoo.com>
Reported by: emaste
|
Tue, 20 Nov 2018
|
[ 17:53 brnrd ]
security/openssl: Update to 1.0.2q
|
Mon, 12 Nov 2018
|
[ 20:19 brnrd ]
security/openssl: Security update for CVE-2018-5407
MFH: 2018Q4
Security: 6f170cf2-e6b7-11e8-a9a8-b499baebfeaf
|
Wed, 12 Sep 2018
|
[ 11:36 brnrd ]
Chase CONFLICTS after addition of security/openssl111
- While here mark OpenSSL 1.1.0 deprecated
see: https://www.openssl.org/policies/releasestrat.html
|
Wed, 29 Aug 2018
|
[ 16:03 brnrd ]
security/openssl: Fix padlock patches url prefix
|
Tue, 14 Aug 2018
|
[ 15:12 joneum ]
Fix PORTREVISION
|
[ 15:04 brnrd ]
security/openssl: Add engines patches to distinfo
- Undo clobbering distinfo
Reported by: mat
|
[ 14:12 brnrd ]
security/openssl: Update to 1.0.2p
- Includes vulnerability fixes that were already
added to the port as patches
|
Wed, 1 Aug 2018
|
[ 16:33 adamw ] (Only the first 10 of 35 ports in this commit are shown above. )
Fix a common grammar error: "can not" means the opposite of "cannot."
"Can not" means "it is possible not to," and "cannot" means "it is impossible
to."
|
Wed, 11 Jul 2018
|
[ 08:37 amdmi3 ]
- Switch to new test framework
Approved by: portmgr blanket
|
Tue, 12 Jun 2018
|
[ 13:43 brnrd ]
security/openssl: Actually add patch file
MFH: 2018Q2
Security: c82ecac5-6e3f-11e8-8777-b499baebfeaf
|
[ 13:17 brnrd ]
security/openssl: Security update
- Upstream update for CVE-2018-0732
MFH: 2018Q2
Security: c82ecac5-6e3f-11e8-8777-b499baebfeaf
|
Mon, 16 Apr 2018
|
[ 17:47 brnrd ]
security/openssl: Add CVE-2018-0737 patch
- Bump portrev too
MFH: 2018Q2
Security: 8f353420-4197-11e8-8777-b499baebfeaf
|
[ 17:24 brnrd ]
security/openssl: Security update
MFH: 2018Q2
Security: 8f353420-4197-11e8-8777-b499baebfeaf
|
Tue, 27 Mar 2018
|
[ 14:53 brnrd ]
securit/openssl: Security update to 1.0.2o
MFH: 2018Q1
Security: b7cff5a9-31cc-11e8-8f07-b499baebfeaf
|
Sat, 10 Mar 2018
|
[ 10:53 brnrd ]
security/openssl: Cleanup
- Remove EXPCIPHERS option (use security/openssl-unsafe) [1]
- Move port variables not dependent on bsd.port.pre.mk up
- Deleting man3 .pod files is redundant
- bss_dgram.c modification is a no-op
- Let openssl's Makefile install libs
- Simplify stripping
PR: 195270 [1]
|
Thu, 7 Dec 2017
|
[ 15:48 brnrd ]
security/openssl: Update to 1.0.2m
- Remove patch now included upstream
- Include post-release patch for clang build error
MFH: 2017Q4
Security: 3bb451fc-db64-11e7-ac58-b499baebfeaf
|
Thu, 2 Nov 2017
|
[ 21:32 brnrd ]
security/openssl: Security update to 1.0.2m
- Adds additional manpages too
MFH: 2017Q4
Security: f40f07aa-c00f-11e7-ac58-b499baebfeaf
|
Sat, 19 Aug 2017
|
[ 15:11 brnrd ]
security/openssl: Fix build on MIPS
- gcc 4.2.1 on MIPS fails on -Werror
PR: 221620
Submitted by: Fukang Chen <loader@FreeBSD.org>
MFH: 2017Q3
|
Mon, 24 Jul 2017
|
[ 17:51 brnrd ]
security/openssl: Fix MASTER_SITE_SUBDIR
- DISTVERSIONFULL is not expanded before assignment
PR: 219929
Submitted by: Fukang Chen <loader@FreeBSD.org>
|
Sun, 25 Jun 2017
|
[ 00:29 linimon ] (Only the first 10 of 81 ports in this commit are shown above. )
Begin deorbit burn of ia64. We have not attempted to build packages for
it for many years.
While here, alphabetize ARCHs, pet portlint, and modernize usages.
Approved by: portmgr (tier-2 blanket)
|
Thu, 25 May 2017
|
[ 18:53 brnrd ]
security/openssl: Update to 1.0.2l
- Bugfix update to 1.0.2l
- Fix PADLOCK option
- Build failure -Wunused-function
- Properly disable with configure
- Strip patch-version from DIST_SUBDIR, reduce dirs
- Remove unneeded testssl patch, dtls tests are OK
- Add new WITHOUT_SSL3 testssl extra-patch
- Remove md5 patch (inconsistent output)
- Remove openbsd_hw.c patch (not compiled)
- Remove srtp patch (upstream fixed)
- Fix plist
|
Wed, 8 Feb 2017
|
[ 20:16 brnrd ]
security/openssl: Enable ASM by default
- Enable ASM option
* By extension this enables AES-NI [1]
- Order OPTIONS_DEFAULT alphabetically
- Switch to using @sample [2]
- Bump PORTREVISION
PR: 216559 [2]
Reported by: dtestke [1]
Submitted by: Franco Fichtner <franco@opnsense.org> [2]
Approved by: asomers, allanjude
|
Thu, 26 Jan 2017
|
[ 14:26 brnrd ]
security/openssl: Update to 1.0.2k
MFH: 2017Q1
Security: CVE-2016-7055
Security: CVE-2017-3731
Security: CVE-2017-3732
|
Fri, 28 Oct 2016
|
[ 20:05 brnrd ]
security/openssl: Bump PORTREVISION
- Make sure ports get rebuilt
PR: 209582
Reported by: mat
|
Fri, 21 Oct 2016
|
[ 12:51 mat ] (Only the first 10 of 718 ports in this commit are shown above. )
${RM} already has -f.
PR: 213570
Submitted by: mat
Exp-run by: antoine
Sponsored by: Absolight
|
Thu, 6 Oct 2016
|
[ 19:38 brnrd ]
security/openssl: Fix ldconfig issue
- OPT_USE= feature does not behave as expected
Reported by: dinoex
Differential Revision: D8166
|
Tue, 4 Oct 2016
|
[ 18:35 brnrd ]
security/openssl: Mark MAKE_JOBS_UNSAFE
- Revert removal of MAKE_JOBS_UNSAFE in r423112
Reported by: D. Randolph
|
Sun, 2 Oct 2016
|
[ 11:51 brnrd ]
security/openssl: Modernize port
- Group options
- Migrate to <OPT>_CONFIGURE helpers
- Use CONFIGURE_ARGS not EXTRACONFIGURE
- Remove make-jobs unsafe (introduced 2009 / 0.9.8)
- Remove base SHLIBVER_BASE check (introduced 2006)
- Revert to default CPE_VERSION
- Rework MAN3 option
- Fix plist when SHARED disabled
Reviewed by: mat
Differential Revision: D8025
|
Mon, 26 Sep 2016
|
[ 13:47 brnrd ]
security/openssl: Update to 1.0.2j
- Update to 1.0.2j
- Fixes Missing CRL sanity check (CVE-2016-7052)
Security: 337d8-83ed-11e6-bf52-b499baebfeaf
|
Sat, 24 Sep 2016
|
[ 20:23 brnrd ]
security/openssl: Take maintainership
|
[ 13:15 marino ]
devel/openssl: change CONFLICTS to CONFLICTS_INSTALL
THere's no problem building openssl with other ports SSL libraries
installed, the conflict comes when it's time to install it.
|
[ 06:43 dinoex ]
- add option ASM for OPNsense
- drop MAINTAINERSHIP caused of version naming change
|
Fri, 23 Sep 2016
|
[ 12:54 brnrd ]
security/openssl: Update to 1.0.2i
- Update to 1.0.2i
- Move from PORTREVISION to PORTVERSION updates
- Remove patches that are included upstream
Reviewed by: mat, delphij
MFH: 2016Q3
Sponsored by: EuroBSDcon 2016 DevSummit
Differential Revision: D8006
|
Thu, 15 Sep 2016
|
[ 22:05 mat ]
ftp.openssl.org is being taken out.
https://mta.openssl.org/pipermail/openssl-announce/2016-September/000075.html
Sponsored by: Absolight
|
Mon, 12 Sep 2016
|
[ 18:10 dinoex ]
- unroll for loop
Submitted by: John Marino
|
Sun, 28 Aug 2016
|
[ 16:19 dinoex ]
- remove options ASM and GMP
|
Sat, 27 Aug 2016
|
[ 11:00 mat ] (Only the first 10 of 16 ports in this commit are shown above. )
Revert the OpenSSL 1.1.0 update, it was not tested.
With hat: portmgr
Sponsored by: Absolight
|
[ 09:59 dinoex ] (Only the first 10 of 16 ports in this commit are shown above. )
- update to 1.1.0
- bump SHLIBVERSION
|
Sun, 14 Aug 2016
|
[ 20:46 dinoex ]
- cleanup options
|
Wed, 20 Jul 2016
|
[ 15:33 mat ] (Only the first 10 of 67 ports in this commit are shown above. )
Cleanup $() variables in ports Makefiles.
Mostly replace with ${}, but sometime, replace with $$() because it is
what was intended in the first place. (I think.)
Sponsored by: Absolight
|
Mon, 20 Jun 2016
|
[ 19:16 dinoex ]
- fix possible integer overflow and application crash
Security: CVE-2016-2177
MFH: 2016Q2
|
Thu, 16 Jun 2016
|
[ 18:15 dinoex ]
- update warning message for new macros
|
Sun, 12 Jun 2016
|
[ 21:29 dinoex ]
- Fix DSA, preserve BN_FLG_CONSTTIME
Security: CVE-2016-2178
|
Tue, 3 May 2016
|
[ 15:19 dinoex ]
- Security update to 1.0.2h
Security: https://www.openssl.org/news/secadv/20160503.txt
Security: CVE-2016-2105
Security: CVE-2016-2106
Security: CVE-2016-2107
Security: CVE-2016-2108
Security: CVE-2016-2109
Security: CVE-2016-2176
MFH: 2016Q2
|
Mon, 4 Apr 2016
|
[ 19:09 dinoex ]
- remove NOPRECIOUS*
- make portlint happier
|
Fri, 1 Apr 2016
|
[ 14:25 mat ] (Only the first 10 of 2099 ports in this commit are shown above. )
Remove ${PORTSDIR}/ from dependencies, categories r, s, t, and u.
With hat: portmgr
Sponsored by: Absolight
|
Sun, 6 Mar 2016
|
[ 20:06 brnrd ]
security/libressl*: Register conflict with security/openssl-devel
- Add conflict for security/openssl-devel
- Sort conflicts alphabetically
Reviewed by: feld (mentor), koobs (mentor)
Approved by: feld (mentor)
Differential Revision: D5539
|
Thu, 3 Mar 2016
|
[ 19:00 dinoex ]
- extend CONFLICTS for openssl-devel
|
[ 13:58 feld ]
security/openssl: Revert disabling of SSLv2 and MD2
Disabling SSLv2 without a shared library bump has a visible impact to
some applications. It is unclear at this time if disabling MD2 could
cause the same issues, but both are being reverted at the moment to be
safe.
PR: 195796
|
Wed, 2 Mar 2016
|
[ 22:31 feld ]
security/openssl: Disable SSLv2 and MD2
SSLv2 is being disabled due to DROWN.
MD2 is being disabled as it should not have been enabled by default.
This was disabled by upstream back in 2009.
PR: 195796
Approved by: delphij, eadler
Security: CVE-2009-2409
Security: CVE-2016-0800
|
Tue, 1 Mar 2016
|
[ 16:40 dinoex ]
- Security update to 1.0.2g
Security: https://www.openssl.org/news/secadv/20160301.txt
Security: CVE-2016-0800
Security: CVE-2016-0705
Security: CVE-2016-0798
Security: CVE-2016-0797
Security: CVE-2016-0799
Security: CVE-2016-0702
Security: CVE-2016-0703
Security: CVE-2016-0704
|
Sat, 13 Feb 2016
|
[ 09:48 dinoex ]
- mark options ASM broken on sparc64
PR: 204527
|
Number of commits found: 305 (showing only 100 on this page) |