From owner-svn-ports-all@freebsd.org Thu May 12 23:38:17 2016 Return-Path: Delivered-To: svn-ports-all@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 10911B2CC89; Thu, 12 May 2016 23:38:17 +0000 (UTC) (envelope-from mandree@FreeBSD.org) Received: from repo.freebsd.org (repo.freebsd.org [IPv6:2610:1c1:1:6068::e6a:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id BC9E61DD0; Thu, 12 May 2016 23:38:16 +0000 (UTC) (envelope-from mandree@FreeBSD.org) Received: from repo.freebsd.org ([127.0.1.37]) by repo.freebsd.org (8.15.2/8.15.2) with ESMTP id u4CNcFmQ001766; Thu, 12 May 2016 23:38:15 GMT (envelope-from mandree@FreeBSD.org) Received: (from mandree@localhost) by repo.freebsd.org (8.15.2/8.15.2/Submit) id u4CNcF0u001764; Thu, 12 May 2016 23:38:15 GMT (envelope-from mandree@FreeBSD.org) Message-Id: <201605122338.u4CNcF0u001764@repo.freebsd.org> X-Authentication-Warning: repo.freebsd.org: mandree set sender to mandree@FreeBSD.org using -f From: Matthias Andree Date: Thu, 12 May 2016 23:38:15 +0000 (UTC) To: ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org Subject: svn commit: r415093 - head/security/openvpn X-SVN-Group: ports-head MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-BeenThere: svn-ports-all@freebsd.org X-Mailman-Version: 2.1.22 Precedence: list List-Id: SVN commit messages for the ports tree List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 12 May 2016 23:38:17 -0000 Author: mandree Date: Thu May 12 23:38:15 2016 New Revision: 415093 URL: https://svnweb.freebsd.org/changeset/ports/415093 Log: Security upgrade to OpenVPN 2.3.11, breaking POLARSSL option. Quoting upstream maintainers' release notes: "This release fixes two vulnerabilities: a port-share bug with DoS potential and a buffer overflow by user supplied data when using pam authentication. In addition a number of small fixes and improvements are included." WARNING: this upgrade breaks the PolarSSL-based build due to an oversight in the cipher suite selection hardening, crashing PolarSSL-based builds with a 0-pointer deferences. Marking port BROKEN if POLARSSL is set. Changelog: https://community.openvpn.net/openvpn/wiki/ChangesInOpenvpn23 Modified: head/security/openvpn/Makefile head/security/openvpn/distinfo Modified: head/security/openvpn/Makefile ============================================================================== --- head/security/openvpn/Makefile Thu May 12 23:25:20 2016 (r415092) +++ head/security/openvpn/Makefile Thu May 12 23:38:15 2016 (r415093) @@ -2,8 +2,7 @@ # $FreeBSD$ PORTNAME= openvpn -DISTVERSION= 2.3.10 -PORTREVISION= 2 +DISTVERSION= 2.3.11 CATEGORIES= security net MASTER_SITES= http://swupdate.openvpn.net/community/releases/ \ http://build.openvpn.net/downloads/releases/ @@ -120,4 +119,10 @@ post-install-EXAMPLES-on: (cd ${WRKSRC}/sample && ${COPYTREE_SHARE} \* ${STAGEDIR}${EXAMPLESDIR}/) ${CHMOD} ${BINMODE} ${STAGEDIR}${EXAMPLESDIR}/sample-scripts/* -.include +.include + +.if ${PORT_OPTIONS:MPOLARSSL} +BROKEN=OpenVPN 2.3.11 with PolarSSL crashes on start unless TLS ciphers specified explicitly +.endif + +.include Modified: head/security/openvpn/distinfo ============================================================================== --- head/security/openvpn/distinfo Thu May 12 23:25:20 2016 (r415092) +++ head/security/openvpn/distinfo Thu May 12 23:38:15 2016 (r415093) @@ -1,2 +1,2 @@ -SHA256 (openvpn-2.3.10.tar.xz) = c54dbf91d47b9533fac3b94d2b5719bdbe0d081fe8245184f91ef8a871d22003 -SIZE (openvpn-2.3.10.tar.xz) = 818152 +SHA256 (openvpn-2.3.11.tar.xz) = 0f5f1ca1dc5743fa166d93dd4ec952f014b5f33bafd88f0ea34b455cae1434a7 +SIZE (openvpn-2.3.11.tar.xz) = 833496