1
0
mirror of https://git.FreeBSD.org/ports.git synced 2024-10-20 20:09:11 +00:00
Mirror of the FreeBSD ports git repo https://git.FreeBSD.org/ports.git .
Go to file
Santhosh Raju ce368d3951 security/wolfssl: Updates to v4.5.0
Changes since v4.4.0:

wolfSSL Release 4.5.0 (August 19, 2020)

If you have questions about this release, feel free to contact us on our
info@ address.

Release 4.5.0 of wolfSSL embedded TLS has bug fixes and new features including:

New Feature Additions

* Added Xilinx Vitis 2019.2 example and README updates
* TLS v1.3 is now enabled by default
* Building FIPS 140-2 code and test on Solaris
* Secure renegotiation with DTLS 1.2
* Update RSA calls for hardware acceleration with Xilsecure
* Additional OpenSSL compatibility layer functions added
* Cypress PSoC6 wolfCrypt driver added
* Added STM32CubeIDE support
* Added certificate parsing and inspection to C# wrapper layer
* TLS v1.3 sniffer support added
* TSIP v1.09 for target board GR-ROSE support added
* Added support for the "X72N Envision Kit" evaluation board
* Support for ECC nonblocking using the configure options
  "--enable-ecc=nonblock --enable-sp=yes,nonblock CFLAGS=-DWOLFSSL_PUBLIC_MP"
* Added wc_curve25519_make_pub function to generate a public key given the
  private one

Fixes

* PIC32MZ hardware cache and large hashes fix
* AES-GCM use with EVP layer in compatibility layer code
* Fix for RSA_LOW_MEM with ARM build of SP code
* Sanity check on tag length with AES-CCM to conform with RFC 3610
* Fixes for 32 and 64 bit software implementations of SP code when
  WOLFSSL_SP_CACHE_RESISTANT is defined
* GCC warning fixes for GCC 9 and later
* Sanity check on HKDF expand length to conform with RFC 5869
* Fixes for STM32 CubeMX HAL with AES-GCM
* Fixed point cache look up table (LUT) implementation fixes
* Fix for ARM 32bit SP code when calling div word
* Fix for potential out of bounds read when parsing CRLs
* Fix for potential out of bounds read with RSA unpadding
* AES-CCM optimized counter fix
* Updates to Xcode projects for new files and features
* Fix for adding CRL’s to a WOLFSSL_X509_STORE structure
* FIPSv2 build with opensslall build fixes
* Fixes for CryptoCell use with ECC and signature wrappers
* Fix for mod calculation with SP code dealing with 3072 bit keys
* Fix for handling certificates with multiple OU’s in name
* Fix for SP math implementation of sp_add_d and add a sanity check on
  rshb range
* Fix for sanity check on padding with DES3 conversion of PEM to DER
* Sanity check for potential out of bounds read with fp_read_radix_16
* Additional checking of ECC scalars.
* Fixing the FIPS Ready build w.r.t. ecc.c.
* When processing certificate names with OpenSSL compatibility layer
  enabled, unknown name item types were getting handled as having NID 0,
  and failing. Added a couple more items to what is handled correctly,
  and ignoring anything that is an unknown type.

Improvements/Optimizations

* TLS 1.3 certificate verify update to handle 8192 bit RSA keys
* wpa_supplicant support with reduced code size option
* TLS 1.3 alerts encrypted when possible
* Many minor coverity fixes added
* Error checking when parsing PKCS12 DER
* IAR warning in test.c resolved
* ATECC608A improvements for use with Harmony 3 and PIC32 MZ
* Support for AES-GCM and wc_SignatureVerifyHash with static memory and no
  malloc’s
* Enable SNI by default with JNI/JSSE builds
* NetBSD GCC compiler warnings resolved
* Additional test cases and code coverage added including curve25519 and
  curve448 tests
* Option for user defined mutexes with WOLFSSL_USER_MUTEX
* Sniffer API’s for loading buffer directly
* Fixes and improvements from going through the DO-178 process were added
* Doxygen updates and fixes for auto documentation generation
* Changed the configure option for FIPS Ready builds to be
  `--enable-fips=ready`.

This release of wolfSSL includes fixes for 6 security vulnerabilities.

wolfSSL version 4.5.0 contains 6 vulnerability fixes: 2 fixes for TLS 1.3,
2 side channel attack mitigations, 1 fix for a potential private key leak
in a specific use case, 1 fix for DTLS.

* In earlier versions of wolfSSL there exists a potential man in the middle
  attack on TLS 1.3 clients. Malicious attackers with a privileged network
  position can impersonate TLS 1.3 servers and bypass authentication. Users
  that have applications with client side code and have TLS 1.3 turned on,
  should update to the latest version of wolfSSL. Users that do not have
  TLS 1.3 turned on, or that are server side only, are NOT affected by this
  report. Thanks to Gerald Doussot from NCC group for the report.
* Denial of service attack on TLS 1.3 servers from repetitively sending
  ChangeCipherSpecs messages. This denial of service results from the
  relatively low effort of sending a ChangeCipherSpecs message versus the
  effort of the server to process that message. Users with TLS 1.3 servers are
  recommended to update to the most recent version of wolfSSL which limits the
  number of TLS 1.3 ChangeCipherSpecs that can be received in order to avoid
  this DoS attack. CVE-2020-12457 was reserved for the report. Thanks to
  Lenny Wang of Tencent Security Xuanwu LAB.
* Potential cache timing attacks on public key operations in builds that are
  not using SP (single precision). Users that have a system where malicious
  agents could execute code on the system, are not using the SP build with
  wolfSSL, and are doing private key operations on the system (such as signing
  with a private key) are recommended to regenerate private keys and update to
  the most recent version of wolfSSL. CVE-2020-15309 is reserved for this
  issue. Thanks to Ida Bruhns from Universität zu Lübeck for the report.
* When using SGX with EC scalar multiplication the possibility of side-channel
  attacks are present. To mitigate the risk of side channel attacks wolfSSL’s
  single precision EC operations should be used instead. Release 4.5.0 turns
  this on be default now with SGX builds and in previous versions of wolfSSL
  this can be turned on by using the WOLFSSL_SP macros. Thank you to
  Alejandro Cabrera Aldaya, Cesar Pereida García and Billy Bob Brumley from
  the Network and Information Security Group (NISEC) at Tampere University for
  the report.
* Leak of private key in the case that PEM format private keys are bundled in
  with PEM certificates into a single file. This is due to the
  misclassification of certificate type versus private key type when parsing
  through the PEM file. To be affected, wolfSSL would need to have been built
  with OPENSSL_EXTRA (--enable-opensslextra). Some build variants such as
  --enable-all and --enable-opensslall also turn on this code path, checking
  wolfssl/options.h for OPENSSL_EXTRA will show if the macro was used with the
  build. If having built with the opensslextra enable option and having placed
  PEM certificates with PEM private keys in the same file when loading up the
  certificate file, then we recommend updating wolfSSL for this use case and
  also recommend regenerating any private keys in the file.
* During the handshake, clear application_data messages in epoch 0 are
  processed and returned to the application. Fixed by dropping received
  application_data messages in epoch 0. Thank you to Paul Fiterau of Uppsala
  University and Robert Merget of Ruhr-University Bochum for the report.

For additional vulnerability information visit the vulnerability page at
https://www.wolfssl.com/docs/security-vulnerabilities/

See INSTALL file for build instructions.
More info can be found on-line at https://wolfssl.com/wolfSSL/Docs.html
2020-08-22 01:23:36 +00:00
accessibility KDE's August 2020 Apps Update 2020-08-13 17:10:30 +00:00
arabic LibreOffice suite: update to 7.0.0 release 2020-08-16 12:41:23 +00:00
archivers Fix build. 2020-08-20 04:43:54 +00:00
astro - Fix LICENSE 2020-08-19 09:36:36 +00:00
audio audio/gsequencer: Update 3.4.9 -> 3.5.8 2020-08-20 06:11:03 +00:00
base Don't disable LTO for aarch64-gcc[69]. 2020-07-23 19:25:07 +00:00
benchmarks Upgrade to 3.22 2020-08-18 08:00:55 +00:00
biology biology/paml: fix the build with LLVM 11 2020-08-20 17:07:03 +00:00
cad cad/netgen-lvs: Update 1.5.154 -> 1.5.155 2020-08-20 03:39:16 +00:00
chinese LibreOffice suite: update to 7.0.0 release 2020-08-16 12:41:23 +00:00
comms comms/qico: fix build with -fno-common (clang 11 and gcc 10) 2020-08-20 10:20:36 +00:00
converters Update to 4.21 2020-08-19 16:18:54 +00:00
databases Update to 1.3.19 2020-08-21 21:23:38 +00:00
deskutils Update claibre to 4.23.0 2020-08-21 21:22:41 +00:00
devel Update to 4.3.0 2020-08-21 21:28:29 +00:00
dns Update to 1.0.11 2020-08-21 21:28:33 +00:00
editors security/botan2: update to 2.15.0 2020-08-19 05:53:29 +00:00
emulators emulators/yuzu: update to s20200820 2020-08-22 00:58:03 +00:00
finance - Update to 0.24.0 2020-08-15 00:47:32 +00:00
french LibreOffice suite: update to 7.0.0 release 2020-08-16 12:41:23 +00:00
ftp Fix build with LibreSSL 2020-08-21 05:42:16 +00:00
games games/veloren: unbreak on FreeBSD < 12 2020-08-22 00:59:56 +00:00
german Update to 2020.08.16 2020-08-19 16:25:45 +00:00
graphics graphics/mesa-devel: update to 20.2.b.591 2020-08-22 00:58:11 +00:00
hebrew LibreOffice suite: update to 7.0.0 release 2020-08-16 12:41:23 +00:00
hungarian LibreOffice suite: update to 7.0.0 release 2020-08-16 12:41:23 +00:00
irc The EPIC maintainer was nice enough to roll a new release to handle the fix needed 2020-08-21 18:18:06 +00:00
japanese japanese/ebnetd: Fix build with '-fno-common' 2020-08-21 10:50:33 +00:00
java Add a port to create JRE-only package for java/openjdk11. 2020-08-20 02:23:07 +00:00
Keywords Avoid spamming about a file that does not exist. 2020-05-14 11:29:18 +00:00
korean LibreOffice suite: update to 7.0.0 release 2020-08-16 12:41:23 +00:00
lang Update to 1.73.25 2020-08-21 21:21:45 +00:00
mail mail/hashcash: fix build on powerpc(64) with clang 2020-08-21 21:47:09 +00:00
math Add LICENSE_FILE 2020-08-21 21:24:17 +00:00
misc New port: misc/hs-hascard: Minimal command line utility for reviewing notes 2020-08-21 05:48:28 +00:00
Mk gecko: add native OSS support, replacing ALSA as fallback 2020-08-21 16:32:05 +00:00
multimedia multimedia/ffmpeg: fix runtime on powerpc64 elfv2 with LTO 2020-08-22 00:46:58 +00:00
net Update to 0.3.19 2020-08-21 21:28:38 +00:00
net-im net-im/py-matrix-synapse: Update to 1.19.0 2020-08-19 08:50:57 +00:00
net-mgmt net-mgmt/unifi5: Update to 5.14.22 2020-08-21 15:03:45 +00:00
net-p2p devel/cmake: update to 3.18.1 2020-08-16 09:27:18 +00:00
news news/sabnzbdplus: Update to 3.0.1 2020-08-19 10:21:52 +00:00
polish Update to 20200809 2020-08-19 16:25:50 +00:00
ports-mgmt ports-mgmt/pkg-devel: Update to 1.14.99.6 2020-08-18 12:18:39 +00:00
portuguese LibreOffice suite: update to 7.0.0 release 2020-08-16 12:41:23 +00:00
print Update to 4.14.0 2020-08-21 21:24:26 +00:00
russian LibreOffice suite: update to 7.0.0 release 2020-08-16 12:41:23 +00:00
science science/lammps: Update 21Jul2020 -> 21Aug2020 2020-08-21 23:15:38 +00:00
security security/wolfssl: Updates to v4.5.0 2020-08-22 01:23:36 +00:00
shells Fix build after llvm 11 import into 13-current. 2020-08-20 18:53:58 +00:00
sysutils Update sysutils/webmin to version 1.954. 2020-08-21 12:12:37 +00:00
Templates Set configure variables to "yes" instead of "1". 2020-08-04 09:03:23 +00:00
textproc Update to 1.4 2020-08-21 21:32:18 +00:00
Tools Make argument parsing a bit more robust 2020-08-05 15:03:01 +00:00
ukrainian LibreOffice suite: update to 7.0.0 release 2020-08-16 12:41:23 +00:00
vietnamese LibreOffice suite: update to 7.0.0 release 2020-08-16 12:41:23 +00:00
www Change RUN_DEPENDS from rubygem-rouge to rubygem-rouge321 2020-08-21 21:32:23 +00:00
x11 x11/waybar: install icons font by default 2020-08-20 04:53:59 +00:00
x11-clocks KDE's August 2020 Apps Update 2020-08-13 17:10:30 +00:00
x11-drivers x11-drivers/xf86-video-intel: Update snapshot 2020-08-18 22:07:48 +00:00
x11-fm KDE's August 2020 Apps Update 2020-08-13 17:10:30 +00:00
x11-fonts Update to 3.4.3 2020-08-17 20:56:13 +00:00
x11-servers x11-servers/xwayland-devel: update to 1.20.0.704 2020-08-08 00:48:56 +00:00
x11-themes x11-themes/qtcurve: Fix patch from r544732 2020-08-13 11:27:30 +00:00
x11-toolkits [NEW PORTS] x11-toolkits/qt5-quick3d and x11-toolkits/qt5-quicktimeline 2020-08-20 12:37:33 +00:00
x11-wm x11-wm/hikari: update to 2.1.2 2020-08-19 09:50:27 +00:00
.arcconfig
.gitattributes
.gitauthors .gitauthors: Add Daniel Ebdrup Jensen (debdrup) 2020-07-26 11:18:25 +00:00
.gitignore
.gitmessage
CHANGES Add support for test-only dependencies in pyqt.mk 2020-05-31 09:00:47 +00:00
CONTRIBUTING.md
COPYRIGHT Happy New Year 2020! 2019-12-31 16:05:08 +00:00
GIDs Add new port: net/rpki-client 2020-07-01 18:38:02 +00:00
LEGAL multimedia/makemkv: update to 1.15.1 and allow package creation 2020-05-11 18:50:18 +00:00
Makefile Retire the palm category (1999-2019) 2019-11-04 11:57:46 +00:00
MOVED games/colobot: fix build with Python 3 and restore port 2020-08-21 19:56:36 +00:00
README
UIDs Add new port: net/rpki-client 2020-07-01 18:38:02 +00:00
UPDATING editors/emacs: Update to version 27.1 2020-08-12 18:30:06 +00:00

This is the FreeBSD Ports Collection.  For an easy to use
WEB-based interface to it, please see:

	https://www.FreeBSD.org/ports

For general information on the Ports Collection, please see the
FreeBSD Handbook ports section which is available from:

	https://www.FreeBSD.org/doc/en_US.ISO8859-1/books/handbook/ports.html
		for the latest official version
	or:
	The ports(7) manual page (man ports).

These will explain how to use ports and packages.

If you would like to search for a port, you can do so easily by
saying (in /usr/ports):

	make search name="<name>"
	or:
	make search key="<keyword>"

which will generate a list of all ports matching <name> or <keyword>.
make search also supports wildcards, such as:

	make search name="gtk*"

For information about contributing to FreeBSD ports, please see the Porter's
Handbook, available at:

	https://www.FreeBSD.org/doc/en_US.ISO8859-1/books/porters-handbook/

NOTE:  This tree will GROW significantly in size during normal usage!
The distribution tar files can and do accumulate in /usr/ports/distfiles,
and the individual ports will also use up lots of space in their work
subdirectories unless you remember to "make clean" after you're done
building a given port.  /usr/ports/distfiles can also be periodically
cleaned without ill-effect.