summaryrefslogtreecommitdiffstats
path: root/n/openssl/openssl0
diff options
context:
space:
mode:
authorAdrien Nader <adrien@notk.org>2014-01-14 07:52:24 +0100
committerAdrien Nader <adrien@notk.org>2014-01-14 07:52:24 +0100
commite8aec63f6a864e2aea04c27c0273b39dce6732b9 (patch)
tree1a3c42e5a5d4255536c93875dd78d5015cd85b11 /n/openssl/openssl0
parent0feb1a884f9fa2d2021b09da866c1578bfab6d13 (diff)
Tue Jan 14 03:54:48 UTC 2014
a/openssl-solibs-1.0.1f-x86_64-1.txz: Upgraded. d/llvm-3.4-x86_64-1.txz: Upgraded. n/openssl-1.0.1f-x86_64-1.txz: Upgraded. This update fixes the following security issues: Fix for TLS record tampering bug CVE-2013-4353 Fix for TLS version checking bug CVE-2013-6449 Fix for DTLS retransmission bug CVE-2013-6450 For more information, see: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4353 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6449 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6450 (* Security fix *) n/php-5.4.24-x86_64-1.txz: Upgraded. The asn1_time_to_time_t function in ext/openssl/openssl.c in PHP before 5.3.28, 5.4.x before 5.4.23, and 5.5.x before 5.5.7 does not properly parse (1) notBefore and (2) notAfter timestamps in X.509 certificates, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted certificate that is not properly handled by the openssl_x509_parse function. For more information, see: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6420 (* Security fix *) n/samba-4.1.4-x86_64-1.txz: Upgraded. This update fixes a heap-based buffer overflow that may allow AD domain controllers to execute arbitrary code via an invalid fragment length in a DCE-RPC packet. For more information, see: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4408 (* Security fix *) x/libXfont-1.4.7-x86_64-1.txz: Upgraded. This update fixes a stack overflow when reading a BDF font file containing a longer than expected string, which could lead to crashes or privilege escalation. For more information, see: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6462 (* Security fix *)
Diffstat (limited to 'n/openssl/openssl0')
-rw-r--r--n/openssl/openssl0/fix-pod-syntax.patch.gzbin0 -> 1661 bytes
-rwxr-xr-xn/openssl/openssl0/openssl0.build3
2 files changed, 3 insertions, 0 deletions
diff --git a/n/openssl/openssl0/fix-pod-syntax.patch.gz b/n/openssl/openssl0/fix-pod-syntax.patch.gz
new file mode 100644
index 0000000..066c8e5
--- /dev/null
+++ b/n/openssl/openssl0/fix-pod-syntax.patch.gz
Binary files differ
diff --git a/n/openssl/openssl0/openssl0.build b/n/openssl/openssl0/openssl0.build
index 262a16a..9b798aa 100755
--- a/n/openssl/openssl0/openssl0.build
+++ b/n/openssl/openssl0/openssl0.build
@@ -56,6 +56,9 @@ rm -rf $PKG1 openssl-$VERSION
tar xvf $CWD/openssl-$VERSION.tar.gz || exit 1
cd openssl-$VERSION
+# Fix pod syntax errors which are fatal wih a newer perl:
+zcat $CWD/fix-pod-syntax.patch.gz | patch -p1 --verbose || exit 1
+
# Use .so.0, not .so.0.9.8:
zcat $CWD/openssl.soname.diff.gz | patch -p1 --backup --verbose --suffix=.orig || exit 1
if [ "$ARCH" = "i486" ]; then