From nobody Sat Jan 08 09:57:54 2022 X-Original-To: dev-commits-ports-main@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 424F2193AAD6; Sat, 8 Jan 2022 09:57:55 +0000 (UTC) (envelope-from git@FreeBSD.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "R3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4JWFrf70m2z4pRC; Sat, 8 Jan 2022 09:57:54 +0000 (UTC) (envelope-from git@FreeBSD.org) Received: from gitrepo.freebsd.org (gitrepo.freebsd.org [IPv6:2610:1c1:1:6068::e6a:5]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id D03411CA3D; Sat, 8 Jan 2022 09:57:54 +0000 (UTC) (envelope-from git@FreeBSD.org) Received: from gitrepo.freebsd.org ([127.0.1.44]) by gitrepo.freebsd.org (8.16.1/8.16.1) with ESMTP id 2089vs3Y061315; Sat, 8 Jan 2022 09:57:54 GMT (envelope-from git@gitrepo.freebsd.org) Received: (from git@localhost) by gitrepo.freebsd.org (8.16.1/8.16.1/Submit) id 2089vsM2061314; Sat, 8 Jan 2022 09:57:54 GMT (envelope-from git) Date: Sat, 8 Jan 2022 09:57:54 GMT Message-Id: <202201080957.2089vsM2061314@gitrepo.freebsd.org> To: ports-committers@FreeBSD.org, dev-commits-ports-all@FreeBSD.org, dev-commits-ports-main@FreeBSD.org From: Santhosh Raju Subject: git: 91258b1619a5 - main - security/wolfssl: Update to v5.1.1 List-Id: Commits to the main branch of the FreeBSD ports repository List-Archive: https://lists.freebsd.org/archives/dev-commits-ports-main List-Help: List-Post: List-Subscribe: List-Unsubscribe: Sender: owner-dev-commits-ports-main@freebsd.org X-BeenThere: dev-commits-ports-main@freebsd.org MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: 8bit X-Git-Committer: fox X-Git-Repository: ports X-Git-Refname: refs/heads/main X-Git-Reftype: branch X-Git-Commit: 91258b1619a5516664f1c36d5440d73af6696316 Auto-Submitted: auto-generated ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=freebsd.org; s=dkim; t=1641635875; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding; bh=NQpklXwCDiLJ8qtf2+1DwgiNgbg6nmKOsS2uwU+LYpc=; b=uojgTCktp6drDXpWvYiUrq6ZNu+6l85W3Xo8rGXFisllafOx6QgD8KQJGzWnZ6EFOGUIfu G0/dWNWeYROk4B2AVTJNqkRmaTI2l5MPBk2T/OtlxOsBeinoWy8LJl4lJ8bGL9sPJWnpXx rcGyFhvsWc9OHYm5j/MZwO5cfI1Q+XN/jwNThBWbqQa2R47KLXlA1byP8jFbgvTjZno44C 9vYhrWRl5QOcQQElUFOmnrgIMIOc3xbsE3jlown88gla2MhKnN2owhDYmAVKPufmgtj/7/ 9lS0twY81X6pCHQmslZ8p/1WOr+w3+gq2pqCkHKL6kO2VQiGtdCp/9bn3q4hew== ARC-Seal: i=1; s=dkim; d=freebsd.org; t=1641635875; a=rsa-sha256; cv=none; b=Ob1Cxn5pH8dR84Jfb3LjHNG5SHdzocOLiebiA6gvVZG8ZfRVDI2XSkLrSiWXyaqPq/lthz WxbWpg0UYU7QUDrbbBP7SzhllbM8+CNKHEOtvlNtAFUipKUIpSPmZShFkmLUk8Z6CxaGPX iXPyyfarW7u2E0Tg0h9hiz3HpP24Vs43cpZlPzPaAi/lJwDKK4WUs6BnxX8NdLzXFahaAk zDt153BTt7MuvOsE4ZgShQS7udhgCNl6+83dMPhX78uTDLcOOFc4bL4jRnvLxRsdIcKgNl 9TVKOoQkkbBMNpSVx1HBS6mWnnwJiMlHmm/bEjMKuRi6hFpUmeup2cxqj9p15Q== ARC-Authentication-Results: i=1; mx1.freebsd.org; none X-ThisMailContainsUnwantedMimeParts: N The branch main has been updated by fox: URL: https://cgit.FreeBSD.org/ports/commit/?id=91258b1619a5516664f1c36d5440d73af6696316 commit 91258b1619a5516664f1c36d5440d73af6696316 Author: Santhosh Raju AuthorDate: 2022-01-08 09:53:03 +0000 Commit: Santhosh Raju CommitDate: 2022-01-08 09:57:16 +0000 security/wolfssl: Update to v5.1.1 Changes since v5.1.0: wolfSSL Release 5.1.1 (Jan 3rd, 2022) Release 5.1.1 of wolfSSL embedded TLS has a high vulnerability fix: Vulnerabilities * [High] In connections using AES-CBC or DES3 with TLS/DTLS 1.2 or 1.1 the IV being used is not random. Users using wolfSSL version 5.0.0 or 5.1.0 doing TLS/DTLS 1.2 or 1.1 connections, without AEAD only, should update the version of wolfSSL used. --- security/wolfssl/Makefile | 2 +- security/wolfssl/distinfo | 6 +++--- security/wolfssl/pkg-plist | 2 +- 3 files changed, 5 insertions(+), 5 deletions(-) diff --git a/security/wolfssl/Makefile b/security/wolfssl/Makefile index adc6490ed886..66c1ccc1f55d 100644 --- a/security/wolfssl/Makefile +++ b/security/wolfssl/Makefile @@ -1,5 +1,5 @@ PORTNAME= wolfssl -PORTVERSION= 5.1.0 +PORTVERSION= 5.1.1 CATEGORIES= security devel MASTER_SITES= https://www.wolfssl.com/ \ LOCAL/fox diff --git a/security/wolfssl/distinfo b/security/wolfssl/distinfo index a3ba150d4ada..0e87c843557d 100644 --- a/security/wolfssl/distinfo +++ b/security/wolfssl/distinfo @@ -1,3 +1,3 @@ -TIMESTAMP = 1640826369 -SHA256 (wolfssl-5.1.0.zip) = 06763e1910deaa1d5ac9a0ddcc230e01f423eca9275d3041ad844a6a85a7b1ac -SIZE (wolfssl-5.1.0.zip) = 12557753 +TIMESTAMP = 1641634866 +SHA256 (wolfssl-5.1.1.zip) = 11035f97e765802b3c7ffce152069123c76fd501035d65d26c5b06e7e125382e +SIZE (wolfssl-5.1.1.zip) = 12558116 diff --git a/security/wolfssl/pkg-plist b/security/wolfssl/pkg-plist index dbce6ebe9635..5031aee71c7c 100644 --- a/security/wolfssl/pkg-plist +++ b/security/wolfssl/pkg-plist @@ -232,7 +232,7 @@ include/wolfssl/wolfio.h lib/libwolfssl.a lib/libwolfssl.so lib/libwolfssl.so.30 -lib/libwolfssl.so.30.1.0 +lib/libwolfssl.so.30.1.1 libdata/pkgconfig/wolfssl.pc %%PORTDOCS%%%%DOCSDIR%%/README.txt %%PORTDOCS%%%%DOCSDIR%%/example/client.c