svn commit: r415187 - in branches/2016Q2/security/openvpn: . files
Matthias Andree
mandree at FreeBSD.org
Sat May 14 13:33:15 UTC 2016
Author: mandree
Date: Sat May 14 13:33:13 2016
New Revision: 415187
URL: https://svnweb.freebsd.org/changeset/ports/415187
Log:
MFH: r412540 r412541 r415093 r415116
Work around 10.3-RELEASE's service(8) shortcomings (r412540)
and to fix /usr/sbin/service -R (r412541).
PR: 208534
Reported by: allan at saddi.com
r415093 (2.3.11 upgrade) and r415116 (the polarssl fix-up) together:
Security upgrade to OpenVPN 2.3.11.
Quoting upstream maintainers' release notes:
"This release fixes two vulnerabilities: a port-share bug with DoS
potential and a buffer overflow by user supplied data when using pam
authentication. In addition a number of small fixes and improvements are
included."
Changelog: https://community.openvpn.net/openvpn/wiki/ChangesInOpenvpn23
he upstream backported a change from the master branch that fixes the
PolarSSL-based builds to go with the PolarSSL 1.3.X built-in defaults.
Approved by: ports-secteam (junovich)
PR: 209498
Security: 0dc8be9e-19af-11e6-8de0-080027ef73ec
Added:
branches/2016Q2/security/openvpn/files/patch-629baad8
- copied unchanged from r415116, head/security/openvpn/files/patch-629baad8
Modified:
branches/2016Q2/security/openvpn/Makefile
branches/2016Q2/security/openvpn/distinfo
branches/2016Q2/security/openvpn/files/openvpn.in
Directory Properties:
branches/2016Q2/ (props changed)
Modified: branches/2016Q2/security/openvpn/Makefile
==============================================================================
--- branches/2016Q2/security/openvpn/Makefile Sat May 14 13:09:45 2016 (r415186)
+++ branches/2016Q2/security/openvpn/Makefile Sat May 14 13:33:13 2016 (r415187)
@@ -2,7 +2,7 @@
# $FreeBSD$
PORTNAME= openvpn
-DISTVERSION= 2.3.10
+DISTVERSION= 2.3.11
CATEGORIES= security net
MASTER_SITES= http://swupdate.openvpn.net/community/releases/ \
http://build.openvpn.net/downloads/releases/
Modified: branches/2016Q2/security/openvpn/distinfo
==============================================================================
--- branches/2016Q2/security/openvpn/distinfo Sat May 14 13:09:45 2016 (r415186)
+++ branches/2016Q2/security/openvpn/distinfo Sat May 14 13:33:13 2016 (r415187)
@@ -1,2 +1,2 @@
-SHA256 (openvpn-2.3.10.tar.xz) = c54dbf91d47b9533fac3b94d2b5719bdbe0d081fe8245184f91ef8a871d22003
-SIZE (openvpn-2.3.10.tar.xz) = 818152
+SHA256 (openvpn-2.3.11.tar.xz) = 0f5f1ca1dc5743fa166d93dd4ec952f014b5f33bafd88f0ea34b455cae1434a7
+SIZE (openvpn-2.3.11.tar.xz) = 833496
Modified: branches/2016Q2/security/openvpn/files/openvpn.in
==============================================================================
--- branches/2016Q2/security/openvpn/files/openvpn.in Sat May 14 13:09:45 2016 (r415186)
+++ branches/2016Q2/security/openvpn/files/openvpn.in Sat May 14 13:33:13 2016 (r415187)
@@ -64,17 +64,29 @@
. /etc/rc.subr
+# service(8) does not create an authentic environment, try to guess,
+# and as of 10.3-RELEASE-p0, it will not find the indented name=
+# assignments below. So give it a default.
+# Trailing semicolon also for service(8)'s benefit:
+name="$file" ;
+
case "$0" in
/etc/rc*)
# during boot (shutdown) $0 is /etc/rc (/etc/rc.shutdown),
# so get the name of the script from $_file
name="$_file"
;;
+*/service)
+ # do not use this as $0
+ ;;
*)
name="$0"
;;
esac
+# default name to "openvpn" if guessing failed
+# Trailing semicolon also for service(8)'s benefit:
+name="${name:-openvpn}" ;
name="${name##*/}"
rcvar=${name}_enable
Copied: branches/2016Q2/security/openvpn/files/patch-629baad8 (from r415116, head/security/openvpn/files/patch-629baad8)
==============================================================================
--- /dev/null 00:00:00 1970 (empty, because file is newly added)
+++ branches/2016Q2/security/openvpn/files/patch-629baad8 Sat May 14 13:33:13 2016 (r415187, copy of r415116, head/security/openvpn/files/patch-629baad8)
@@ -0,0 +1,37 @@
+commit 629baad8f89af261445a2ace03694601f8e476f9
+Author: Steffan Karger <steffan at karger.me>
+Date: Fri May 13 08:54:52 2016 +0200
+
+ Fix polarssl / mbedtls builds
+
+ Commit 8a399cd3 hardened the OpenSSL default cipher list,
+ but also introduced a change in shared code that causes
+ polarssl / mbedtls builds to break when no --tls-cipher is
+ specified.
+
+ This fix is backported code from the master branch.
+
+ Signed-off-by: Steffan Karger <steffan at karger.me>
+ Acked-by: Gert Doering <gert at greenie.muc.de>
+ Message-Id: <1463122492-701-1-git-send-email-steffan at karger.me>
+ URL: http://article.gmane.org/gmane.network.openvpn.devel/11647
+ Signed-off-by: Gert Doering <gert at greenie.muc.de>
+
+diff --git a/src/openvpn/ssl_polarssl.c b/src/openvpn/ssl_polarssl.c
+index 1f58369..9263698 100644
+--- ./src/openvpn/ssl_polarssl.c
++++ ./src/openvpn/ssl_polarssl.c
+@@ -176,7 +176,12 @@ tls_ctx_restrict_ciphers(struct tls_root_ctx *ctx, const char *ciphers)
+ {
+ char *tmp_ciphers, *tmp_ciphers_orig, *token;
+ int i, cipher_count;
+- int ciphers_len = strlen (ciphers);
++ int ciphers_len;
++
++ if (NULL == ciphers)
++ return; /* Nothing to do */
++
++ ciphers_len = strlen (ciphers);
+
+ ASSERT (NULL != ctx);
+ ASSERT (0 != ciphers_len);
More information about the svn-ports-branches
mailing list