pkgsrc-Changes-HG archive
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]
[pkgsrc/trunk]: pkgsrc/devel/nss nss: update to 3.79.
details: https://anonhg.NetBSD.org/pkgsrc/rev/0472440c606a
branches: trunk
changeset: 380216:0472440c606a
user: wiz <wiz%pkgsrc.org@localhost>
date: Tue May 31 20:30:10 2022 +0000
description:
nss: update to 3.79.
This release fixes memory safety violations that can occur when parsing CMS
data. We presume that with enough effort these memory safety violations are
exploitable.
Change:
- Bug 205717 - Use PK11_GetSlotInfo instead of raw C_GetSlotInfo calls.
- Bug 1766907 - Update mercurial in clang-format docker image.
- Bug 1454072 - Use of uninitialized pointer in lg_init after alloc fail.
- Bug 1769295 - selfserv and tstclnt should use PR_GetPrefLoopbackAddrInfo.
- Bug 1753315 - Add SECMOD_LockedModuleHasRemovableSlots.
- Bug 1387919 - Fix secasn1d parsing of indefinite SEQUENCE inside indefinite GROUP.
- Bug 1765753 - Added RFC8422 compliant TLS <= 1.2 undefined/compressed ECPointFormat extension alerts.
- Bug 1765753 - TLS 1.3 Server: Send protocol_version alert on unsupported ClientHello.legacy_version.
- Bug 1764788 - Correct invalid record inner and outer content type alerts.
- Bug 1757075 - NSS does not properly import or export pkcs12 files with large passwords and pkcs5v2 encoding.
- Bug 1766978 - improve error handling after nssCKFWInstance_CreateObjectHandle.
- Bug 1767590 - Initialize pointers passed to NSS_CMSDigestContext_FinishMultiple.
- Bug 1769302 - NSS 3.79 should depend on NSPR 4.34
diffstat:
devel/nss/Makefile | 6 +++---
devel/nss/distinfo | 8 ++++----
2 files changed, 7 insertions(+), 7 deletions(-)
diffs (41 lines):
diff -r 948400833159 -r 0472440c606a devel/nss/Makefile
--- a/devel/nss/Makefile Tue May 31 18:04:14 2022 +0000
+++ b/devel/nss/Makefile Tue May 31 20:30:10 2022 +0000
@@ -1,10 +1,10 @@
-# $NetBSD: Makefile,v 1.228 2022/04/28 11:15:55 wiz Exp $
+# $NetBSD: Makefile,v 1.229 2022/05/31 20:30:10 wiz Exp $
#
# release notes
# https://firefox-source-docs.mozilla.org/security/nss/releases/index.html
DISTNAME= nss-${NSS_RELEASE:S/.0$//}
-NSS_RELEASE= 3.78.0
+NSS_RELEASE= 3.79.0
CATEGORIES= devel security
MASTER_SITES= ${MASTER_SITE_MOZILLA_ALL:=security/nss/releases/NSS_${NSS_DIST_DIR_VERSION:S/_0$//}_RTM/src/}
@@ -140,7 +140,7 @@
MOD_PATCH_VERSION= ${NSS_RELEASE:C/[0-9.]*\.//}
NSS_DIST_DIR_VERSION= ${MOD_MAJOR_VERSION}_${MOD_MINOR_VERSION}_${MOD_PATCH_VERSION}
-NSPR_MINIMUM_VERSION= 4.32
+NSPR_MINIMUM_VERSION= 4.34
PKGCONFIG_OVERRIDE= nss.pc
diff -r 948400833159 -r 0472440c606a devel/nss/distinfo
--- a/devel/nss/distinfo Tue May 31 18:04:14 2022 +0000
+++ b/devel/nss/distinfo Tue May 31 20:30:10 2022 +0000
@@ -1,8 +1,8 @@
-$NetBSD: distinfo,v 1.153 2022/05/13 13:40:36 tnn Exp $
+$NetBSD: distinfo,v 1.154 2022/05/31 20:30:10 wiz Exp $
-BLAKE2s (nss-3.78.tar.gz) = e3b30ce133b04083ff98468d2f4285ce2f740249194e52b86744d4098819f952
-SHA512 (nss-3.78.tar.gz) = ab54d838f41f963fdd4b87477b1e769186ae1f138f7c5d764cd6873be4791146d14dcc85697a2ca92e08f3bfcbeb61d64e26e7b5398095272c18a8196d43ac6c
-Size (nss-3.78.tar.gz) = 84815720 bytes
+BLAKE2s (nss-3.79.tar.gz) = 5fd7a0c74f52a49111f01dd9002227f99d4f0e9ffdf713c2b67e7085ec2561a0
+SHA512 (nss-3.79.tar.gz) = d3311da3bd0e6907760390221c1307a63d84dd8ad9b85dbfdbf59fe4678341c9856b6f93235731999a1236c98dc0ac66d2dc023eb439cb696f73509dae70c41d
+Size (nss-3.79.tar.gz) = 84830113 bytes
SHA1 (patch-md) = 8547c9414332c02221b96719dea1e09cb741f4d1
SHA1 (patch-me) = ffb5f119764c158c0bd789bd18fc77c61f2e9d2b
SHA1 (patch-mf) = 40e58385fb6f944f463bf00b9aad72bc4ea229d0
Home |
Main Index |
Thread Index |
Old Index