svn commit: r329009 - in head/security: polarssl vuxml

Jase Thew jase at FreeBSD.org
Tue Oct 1 23:47:14 UTC 2013


Author: jase
Date: Tue Oct  1 23:47:13 2013
New Revision: 329009
URL: http://svnweb.freebsd.org/changeset/ports/329009

Log:
  - Update to 1.2.9
  - Add vuxml entry
  - Prevent install target from copying patch backup files
  
  Changes:	https://raw.github.com/polarssl/polarssl/60ad84f43f46b0d3673eaca8b9847d7e01b83c5e/ChangeLog
  Security:	ccefac3e-2aed-11e3-af10-000c29789cb5
  Security:	CVE-2013-5915

Modified:
  head/security/polarssl/Makefile
  head/security/polarssl/distinfo
  head/security/vuxml/vuln.xml

Modified: head/security/polarssl/Makefile
==============================================================================
--- head/security/polarssl/Makefile	Tue Oct  1 23:24:09 2013	(r329008)
+++ head/security/polarssl/Makefile	Tue Oct  1 23:47:13 2013	(r329009)
@@ -1,9 +1,8 @@
 # $FreeBSD$
 
 PORTNAME=	polarssl
-PORTVERSION=	1.2.8
+PORTVERSION=	1.2.9
 DISTVERSIONSUFFIX=	-gpl
-PORTREVISION=	1
 CATEGORIES=	security devel
 MASTER_SITES=	http://polarssl.org/download/
 EXTRACT_SUFX=	.tgz
@@ -32,7 +31,7 @@ BINFILES=	aescrypt2 benchmark dh_client 
 
 # cmake install is broken, so we do it by hand
 do-install:
-	@${TAR} -C ${WRKSRC}/include -cf - polarssl | ${TAR} -C ${STAGEDIR}${PREFIX}/include -xf -
+	@cd ${WRKSRC}/include && ${COPYTREE_SHARE} ${PORTNAME} ${STAGEDIR}${PREFIX}/include "! -name *.orig"
 	${INSTALL_DATA} ${WRKSRC}/library/libpolarssl.a ${STAGEDIR}${PREFIX}/lib/
 	${INSTALL_DATA} ${WRKSRC}/library/libpolarssl.so  ${STAGEDIR}${PREFIX}/lib/libpolarssl.so.0
 	cd ${STAGEDIR}${PREFIX}/lib/ && ${LN} -sf libpolarssl.so.0 libpolarssl.so

Modified: head/security/polarssl/distinfo
==============================================================================
--- head/security/polarssl/distinfo	Tue Oct  1 23:24:09 2013	(r329008)
+++ head/security/polarssl/distinfo	Tue Oct  1 23:47:13 2013	(r329009)
@@ -1,2 +1,2 @@
-SHA256 (polarssl-1.2.8-gpl.tgz) = 23cf931e322ab397d26c89b7e805cf2229df46c5196f4f67ebfc0e285848637b
-SIZE (polarssl-1.2.8-gpl.tgz) = 998609
+SHA256 (polarssl-1.2.9-gpl.tgz) = d125a6e7eb6eb3e5110035df1469099c5463837b1ef734e60771095dafc0ef56
+SIZE (polarssl-1.2.9-gpl.tgz) = 999668

Modified: head/security/vuxml/vuln.xml
==============================================================================
--- head/security/vuxml/vuln.xml	Tue Oct  1 23:24:09 2013	(r329008)
+++ head/security/vuxml/vuln.xml	Tue Oct  1 23:47:13 2013	(r329009)
@@ -51,6 +51,46 @@ Note:  Please add new entries to the beg
 
 -->
 <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+  <vuln vid="ccefac3e-2aed-11e3-af10-000c29789cb5">
+    <topic>polarssl -- Timing attack against protected RSA-CRT implementation</topic>
+    <affects>
+      <package>
+	<name>polarssl</name>
+	<range><lt>1.2.9</lt></range>
+      </package>
+    </affects>
+    <description>
+      <body xmlns="http://www.w3.org/1999/xhtml">
+	<p>PolarSSL Project reports:</p>
+	<blockquote cite="https://polarssl.org/tech-updates/security-advisories/polarssl-security-advisory-2013-05">
+	  <p>The researchers Cyril Arnaud and Pierre-Alain Fouque
+	    investigated the PolarSSL RSA implementation and discovered
+	    a bias in the implementation of the Montgomery multiplication
+	    that we used. For which they then show that it can be used to
+	    mount an attack on the RSA key. Although their test attack is
+	    done on a local system, there seems to be enough indication
+	    that this can properly be performed from a remote system as
+	    well.</p>
+	  <p>All versions prior to PolarSSL 1.2.9 and 1.3.0 are affected
+	    if a third party can send arbitrary handshake messages to your
+	    server.</p>
+	  <p>If correctly executed, this attack reveals the entire private
+	    RSA key after a large number of attack messages (> 600.000 on
+	    a local machine) are sent to show the timing differences.</p>
+	</blockquote>
+      </body>
+    </description>
+    <references>
+      <cvename>CVE-2013-5915</cvename>
+      <url>https://polarssl.org/tech-updates/security-advisories/polarssl-security-advisory-2013-05</url>
+      <url>https://polarssl.org/tech-updates/releases/polarssl-1.2.9-released</url>
+    </references>
+    <dates>
+      <discovery>2013-10-01</discovery>
+      <entry>2013-10-02</entry>
+    </dates>
+  </vuln>
+
   <vuln vid="e5414d0c-2ade-11e3-821d-00262d5ed8ee">
     <topic>chromium -- multiple vulnerabilities</topic>
     <affects>


More information about the svn-ports-all mailing list