summaryrefslogtreecommitdiff
path: root/security
diff options
context:
space:
mode:
Diffstat (limited to '')
-rw-r--r--security/Makefile3
-rw-r--r--security/afl++/Makefile2
-rw-r--r--security/afl++/distinfo6
-rw-r--r--security/aws-lc/Makefile2
-rw-r--r--security/aws-lc/distinfo6
-rw-r--r--security/boringssl/Makefile4
-rw-r--r--security/boringssl/distinfo6
-rw-r--r--security/cosign/Makefile4
-rw-r--r--security/cosign/distinfo10
-rw-r--r--security/kanidm/Makefile2
-rw-r--r--security/kanidm/Makefile.crates2
-rw-r--r--security/kanidm/distinfo10
-rw-r--r--security/nettle/Makefile2
-rw-r--r--security/nettle/distinfo6
-rw-r--r--security/nettle/files/extra-patch-Makefile.in4
-rw-r--r--security/nettle/files/patch-configure4
-rw-r--r--security/nettle/files/patch-examples-nettle-openssl.c8
-rw-r--r--security/nettle/files/patch-powerpc64-p8-aes-decrypt-internal.asm2
-rw-r--r--security/nettle/files/patch-powerpc64-p8-aes-encrypt-internal.asm6
-rw-r--r--security/nettle/pkg-plist4
-rw-r--r--security/nss/Makefile2
-rw-r--r--security/nss/distinfo6
-rw-r--r--security/openssl/Makefile2
-rw-r--r--security/openssl/distinfo6
-rw-r--r--security/openssl31-quictls/Makefile5
-rw-r--r--security/openssl31/Makefile3
-rw-r--r--security/openssl32/Makefile4
-rw-r--r--security/openssl32/distinfo6
-rw-r--r--security/openssl33-quictls/Makefile190
-rw-r--r--security/openssl33-quictls/distinfo3
-rw-r--r--security/openssl33-quictls/files/extra-patch-util_find-doc-nits20
-rw-r--r--security/openssl33-quictls/files/patch-CVE-2024-9143198
-rw-r--r--security/openssl33-quictls/pkg-descr8
-rw-r--r--security/openssl33-quictls/pkg-message20
-rw-r--r--security/openssl33-quictls/pkg-plist281
-rw-r--r--security/openssl33-quictls/version.mk1
-rw-r--r--security/openssl33/Makefile4
-rw-r--r--security/openssl33/distinfo6
-rw-r--r--security/openssl34/Makefile4
-rw-r--r--security/openssl34/distinfo6
-rw-r--r--security/openssl35/Makefile3
-rw-r--r--security/openssl35/distinfo6
-rw-r--r--security/openssl35/files/patch-CVE-2025-457561
-rw-r--r--security/php85-filter/Makefile7
-rw-r--r--security/php85-sodium/Makefile7
-rw-r--r--security/plasma6-kscreenlocker/distinfo6
-rw-r--r--security/plasma6-ksshaskpass/distinfo6
-rw-r--r--security/plasma6-kwallet-pam/distinfo6
-rw-r--r--security/rubygem-gitlab-cloud-connector/Makefile2
-rw-r--r--security/rubygem-gitlab-cloud-connector/distinfo6
-rw-r--r--security/snort3/Makefile3
-rw-r--r--security/snort3/distinfo6
-rw-r--r--security/snort3/pkg-plist1
-rw-r--r--security/snuffleupagus/Makefile2
-rw-r--r--security/sudo/Makefile2
-rw-r--r--security/sudo/distinfo6
-rw-r--r--security/trivy/Makefile3
-rw-r--r--security/trivy/distinfo10
-rw-r--r--security/vuxml/vuln/2025.xml251
59 files changed, 1098 insertions, 164 deletions
diff --git a/security/Makefile b/security/Makefile
index fd6b6dafa7ea..77f3408b22bf 100644
--- a/security/Makefile
+++ b/security/Makefile
@@ -456,6 +456,7 @@
SUBDIR += openssl31-quictls
SUBDIR += openssl32
SUBDIR += openssl33
+ SUBDIR += openssl33-quictls
SUBDIR += openssl34
SUBDIR += openssl35
SUBDIR += openvas
@@ -838,6 +839,8 @@
SUBDIR += php83-sodium
SUBDIR += php84-filter
SUBDIR += php84-sodium
+ SUBDIR += php85-filter
+ SUBDIR += php85-sodium
SUBDIR += picocrypt
SUBDIR += picosha2
SUBDIR += pidgin-encryption
diff --git a/security/afl++/Makefile b/security/afl++/Makefile
index 41e79b781385..6e45c1ed62e0 100644
--- a/security/afl++/Makefile
+++ b/security/afl++/Makefile
@@ -1,6 +1,6 @@
PORTNAME= afl
DISTVERSIONPREFIX= v
-DISTVERSION= 4.32c
+DISTVERSION= 4.33c
CATEGORIES= security
PKGNAMESUFFIX= ++-${FLAVOR}
diff --git a/security/afl++/distinfo b/security/afl++/distinfo
index 21befac35cea..871fd6e76ebe 100644
--- a/security/afl++/distinfo
+++ b/security/afl++/distinfo
@@ -1,3 +1,3 @@
-TIMESTAMP = 1746197618
-SHA256 (AFLplusplus-AFLplusplus-v4.32c_GH0.tar.gz) = dc7f59a11ce8cf67a3ed09a5ac78028c6f793b239b21fd83e5b2370cea166926
-SIZE (AFLplusplus-AFLplusplus-v4.32c_GH0.tar.gz) = 3045679
+TIMESTAMP = 1751370940
+SHA256 (AFLplusplus-AFLplusplus-v4.33c_GH0.tar.gz) = 98903c8036282c8908b1d8cc0d60caf3ea259db4339503a76449b47acce58d1d
+SIZE (AFLplusplus-AFLplusplus-v4.33c_GH0.tar.gz) = 3058802
diff --git a/security/aws-lc/Makefile b/security/aws-lc/Makefile
index 803ea2798817..67c1020ba0f6 100644
--- a/security/aws-lc/Makefile
+++ b/security/aws-lc/Makefile
@@ -1,5 +1,5 @@
PORTNAME= aws-lc
-PORTVERSION= 1.53.1
+PORTVERSION= 1.54.0
DISTVERSIONPREFIX= v
CATEGORIES= security
diff --git a/security/aws-lc/distinfo b/security/aws-lc/distinfo
index 7e178c8c2194..2a7e6ae009f0 100644
--- a/security/aws-lc/distinfo
+++ b/security/aws-lc/distinfo
@@ -1,3 +1,3 @@
-TIMESTAMP = 1750954130
-SHA256 (aws-aws-lc-v1.53.1_GH0.tar.gz) = 74137613ea4e322600400fdc2e21c83f08f4c68d368ebe006eab264e4e685e01
-SIZE (aws-aws-lc-v1.53.1_GH0.tar.gz) = 127004586
+TIMESTAMP = 1751208136
+SHA256 (aws-aws-lc-v1.54.0_GH0.tar.gz) = d491b6d6b233e88314a15170d435e28259f7cf4f950a427acc80a0e977aa683a
+SIZE (aws-aws-lc-v1.54.0_GH0.tar.gz) = 127011221
diff --git a/security/boringssl/Makefile b/security/boringssl/Makefile
index d72689f75660..ca47e59e4c7d 100644
--- a/security/boringssl/Makefile
+++ b/security/boringssl/Makefile
@@ -1,5 +1,5 @@
PORTNAME= boringssl
-PORTVERSION= 0.0.0.0.2025.06.25.01
+PORTVERSION= 0.0.0.0.2025.07.01.01
CATEGORIES= security
EXTRACT_ONLY= ${GH_ACCOUNT}-${PORTNAME}-${PORTVERSION}-${GH_TAGNAME}_GH0.tar.gz
@@ -19,7 +19,7 @@ CPE_VENDOR= google
USE_GITHUB= yes
GH_ACCOUNT= google
-GH_TAGNAME= 78b48c1
+GH_TAGNAME= f3dcc46
CMAKE_ARGS+= -DBUILD_SHARED_LIBS=1
CFLAGS_i386= -msse2
diff --git a/security/boringssl/distinfo b/security/boringssl/distinfo
index 64e40c2a4f5f..2e858a1aa0eb 100644
--- a/security/boringssl/distinfo
+++ b/security/boringssl/distinfo
@@ -1,4 +1,4 @@
-TIMESTAMP = 1750950234
+TIMESTAMP = 1751480474
SHA256 (filippo.io/edwards25519/@v/v1.1.0.zip) = 9ac43a686d06fdebd719f7af3866c87eb069302272dfb131007adf471c308b65
SIZE (filippo.io/edwards25519/@v/v1.1.0.zip) = 55809
SHA256 (filippo.io/edwards25519/@v/v1.1.0.mod) = 099556fc4d7e6f5cb135efdd8b6bb4c0932e38ea058c53fc5fa5ce285572fb61
@@ -11,5 +11,5 @@ SHA256 (golang.org/x/sys/@v/v0.32.0.zip) = 85d47075d21fd7ef35d9a47fc73f2356fb3cd
SIZE (golang.org/x/sys/@v/v0.32.0.zip) = 1991164
SHA256 (golang.org/x/sys/@v/v0.32.0.mod) = f67e3e18f4c08e60a7e80726ab36b691fdcea5b81ae1c696ff64caf518bcfe3d
SIZE (golang.org/x/sys/@v/v0.32.0.mod) = 35
-SHA256 (google-boringssl-0.0.0.0.2025.06.25.01-78b48c1_GH0.tar.gz) = 2cfaa5f01ecedb7d662d7b01cac6f2f5f873a52f694a44af69de9b8efcdb6e90
-SIZE (google-boringssl-0.0.0.0.2025.06.25.01-78b48c1_GH0.tar.gz) = 46168678
+SHA256 (google-boringssl-0.0.0.0.2025.07.01.01-f3dcc46_GH0.tar.gz) = b81478b62838ddaa32f4b304a39659ee4c858289263f73d52a3684364774f94e
+SIZE (google-boringssl-0.0.0.0.2025.07.01.01-f3dcc46_GH0.tar.gz) = 46169690
diff --git a/security/cosign/Makefile b/security/cosign/Makefile
index 50bc7042755e..25aa6f4e1082 100644
--- a/security/cosign/Makefile
+++ b/security/cosign/Makefile
@@ -1,6 +1,6 @@
PORTNAME= cosign
DISTVERSIONPREFIX= v
-DISTVERSION= 2.5.1
+DISTVERSION= 2.5.2
CATEGORIES= security
MAINTAINER= bofh@FreeBSD.org
@@ -23,7 +23,7 @@ GO_BUILDFLAGS= -ldflags="-buildid= \
PLIST_FILES= bin/${PORTNAME}
-GIT_HASH= a7345fb2ce17b52b5bc687970fa31ff85bc2f7ca
+GIT_HASH= af5a988bb15a03919ccaac7a2ddcad7a9d006f38
.include <bsd.port.pre.mk>
diff --git a/security/cosign/distinfo b/security/cosign/distinfo
index 6094ea46b910..621a1398dec8 100644
--- a/security/cosign/distinfo
+++ b/security/cosign/distinfo
@@ -1,5 +1,5 @@
-TIMESTAMP = 1751272854
-SHA256 (go/security_cosign/cosign-v2.5.1/v2.5.1.mod) = 73cd50764e440cee0dc08dd15dbe489d880980170cef56164f3f351a3c861bac
-SIZE (go/security_cosign/cosign-v2.5.1/v2.5.1.mod) = 15329
-SHA256 (go/security_cosign/cosign-v2.5.1/v2.5.1.zip) = d2a7631cb2b26181682af19fc7d067da852b9edee54e3124fddcf1b82c7663d4
-SIZE (go/security_cosign/cosign-v2.5.1/v2.5.1.zip) = 1274453
+TIMESTAMP = 1751444102
+SHA256 (go/security_cosign/cosign-v2.5.2/v2.5.2.mod) = 5bc5ad2f641929f53eeb4fcec33fba55b78a51cf707f53f74feae8a0e7ad0bae
+SIZE (go/security_cosign/cosign-v2.5.2/v2.5.2.mod) = 15326
+SHA256 (go/security_cosign/cosign-v2.5.2/v2.5.2.zip) = 91f0aebf97ae40581273a4e44fad958ce7ff02dd232663f9fffd074596efa82e
+SIZE (go/security_cosign/cosign-v2.5.2/v2.5.2.zip) = 1274354
diff --git a/security/kanidm/Makefile b/security/kanidm/Makefile
index aed265502929..e79f46fee92e 100644
--- a/security/kanidm/Makefile
+++ b/security/kanidm/Makefile
@@ -1,6 +1,6 @@
PORTNAME= kanidm
DISTVERSIONPREFIX= v
-DISTVERSION= 1.6.1
+DISTVERSION= 1.6.2
CATEGORIES= security net
MAINTAINER= bofh@FreeBSD.org
diff --git a/security/kanidm/Makefile.crates b/security/kanidm/Makefile.crates
index ec2cd21bf07f..142b4ad552a5 100644
--- a/security/kanidm/Makefile.crates
+++ b/security/kanidm/Makefile.crates
@@ -651,4 +651,4 @@ CARGO_CRATES= addr2line-0.24.2 \
zxcvbn-3.1.0 \
sshkeys@git+https://github.com/Firstyear/rust-sshkeys.git?rev=3a081cbf7480628223bcb96fc8aaa8c19109d007\#3a081cbf7480628223bcb96fc8aaa8c19109d007 \
libnss@git+https://github.com/Firstyear/libnss-rs.git?branch=20250207-freebsd\#763da4beaadc1e475b89ed876de31a5e393f6d30 \
- compact_jwt@git+https://github.com/Firstyear/compact-jwt.git?rev=b3d2b5700cfe567d384c81df35d25537fbf7f110\#b3d2b5700cfe567d384c81df35d25537fbf7f110
+ compact_jwt@git+https://github.com/Firstyear/compact-jwt.git?rev=043976842773dd035fe394261347edeb644e3091\#043976842773dd035fe394261347edeb644e3091
diff --git a/security/kanidm/distinfo b/security/kanidm/distinfo
index 81d7c632cbe6..762a6b5cc73a 100644
--- a/security/kanidm/distinfo
+++ b/security/kanidm/distinfo
@@ -1,4 +1,4 @@
-TIMESTAMP = 1751273631
+TIMESTAMP = 1751446844
SHA256 (rust/crates/addr2line-0.24.2.crate) = dfbe277e56a376000877090da837660b4427aad530e3028d44e0bffe4f89a1c1
SIZE (rust/crates/addr2line-0.24.2.crate) = 39015
SHA256 (rust/crates/adler2-2.0.0.crate) = 512761e0bb2578dd7380c6baaa0f4ce03e84f95e960231d1dec8bf4d7d6e2627
@@ -1305,7 +1305,7 @@ SHA256 (Firstyear-rust-sshkeys-3a081cbf7480628223bcb96fc8aaa8c19109d007_GH0.tar.
SIZE (Firstyear-rust-sshkeys-3a081cbf7480628223bcb96fc8aaa8c19109d007_GH0.tar.gz) = 31393
SHA256 (Firstyear-libnss-rs-763da4beaadc1e475b89ed876de31a5e393f6d30_GH0.tar.gz) = 0ac9d8c22288fc2d236ae447c867cfca07de5a44182631a68a96fb8587f23870
SIZE (Firstyear-libnss-rs-763da4beaadc1e475b89ed876de31a5e393f6d30_GH0.tar.gz) = 12094
-SHA256 (Firstyear-compact-jwt-b3d2b5700cfe567d384c81df35d25537fbf7f110_GH0.tar.gz) = f9308a607e2ad1755c67452f52acd1d7c0f3d30d40f15551d3e7ad3bacc4a3da
-SIZE (Firstyear-compact-jwt-b3d2b5700cfe567d384c81df35d25537fbf7f110_GH0.tar.gz) = 62309
-SHA256 (kanidm-kanidm-v1.6.1_GH0.tar.gz) = 89e993c3b81720122385b82f47f04fff2acbfd5540af25b507a8cab713a70e86
-SIZE (kanidm-kanidm-v1.6.1_GH0.tar.gz) = 8649026
+SHA256 (Firstyear-compact-jwt-043976842773dd035fe394261347edeb644e3091_GH0.tar.gz) = 8ef6d8217b5cde04f624cac7eb27dd922b08aa3d815d38a11920a032115c5584
+SIZE (Firstyear-compact-jwt-043976842773dd035fe394261347edeb644e3091_GH0.tar.gz) = 62413
+SHA256 (kanidm-kanidm-v1.6.2_GH0.tar.gz) = 3283758b7c03da55d2dfc470be76d25a3fa845ed842d7196214f3f07c48ac917
+SIZE (kanidm-kanidm-v1.6.2_GH0.tar.gz) = 8649404
diff --git a/security/nettle/Makefile b/security/nettle/Makefile
index 79573ea82af5..ddea868f1be1 100644
--- a/security/nettle/Makefile
+++ b/security/nettle/Makefile
@@ -1,5 +1,5 @@
PORTNAME= nettle
-PORTVERSION= 3.10.1
+PORTVERSION= 3.10.2
CATEGORIES= security
MASTER_SITES= GNU \
https://www.lysator.liu.se/~nisse/archive/
diff --git a/security/nettle/distinfo b/security/nettle/distinfo
index 97625f47b80f..ceeab63d0f14 100644
--- a/security/nettle/distinfo
+++ b/security/nettle/distinfo
@@ -1,3 +1,3 @@
-TIMESTAMP = 1735705131
-SHA256 (nettle-3.10.1.tar.gz) = b0fcdd7fc0cdea6e80dcf1dd85ba794af0d5b4a57e26397eee3bc193272d9132
-SIZE (nettle-3.10.1.tar.gz) = 2643267
+TIMESTAMP = 1751208138
+SHA256 (nettle-3.10.2.tar.gz) = fe9ff51cb1f2abb5e65a6b8c10a92da0ab5ab6eaf26e7fc2b675c45f1fb519b5
+SIZE (nettle-3.10.2.tar.gz) = 2644644
diff --git a/security/nettle/files/extra-patch-Makefile.in b/security/nettle/files/extra-patch-Makefile.in
index 2974b822043a..2c1480398adf 100644
--- a/security/nettle/files/extra-patch-Makefile.in
+++ b/security/nettle/files/extra-patch-Makefile.in
@@ -1,6 +1,6 @@
---- Makefile.in.orig 2023-06-01 18:40:35 UTC
+--- Makefile.in.orig 2025-06-26 18:29:02 UTC
+++ Makefile.in
-@@ -19,7 +19,7 @@ OPT_NETTLE_SOURCES = @OPT_NETTLE_SOURCES@
+@@ -19,7 +19,7 @@ FAT_TEST_LIST = @FAT_TEST_LIST@
FAT_TEST_LIST = @FAT_TEST_LIST@
diff --git a/security/nettle/files/patch-configure b/security/nettle/files/patch-configure
index 1b8f460d9501..d210a2e1be01 100644
--- a/security/nettle/files/patch-configure
+++ b/security/nettle/files/patch-configure
@@ -1,6 +1,6 @@
---- configure.orig 2023-06-01 18:40:35 UTC
+--- configure.orig 2025-06-26 18:29:02 UTC
+++ configure
-@@ -6638,7 +6638,7 @@ $as_echo "$as_me: WARNING: Cross compiling for linux.
+@@ -7532,7 +7532,7 @@ printf "%s\n" "$as_me: WARNING: Cross compiling for li
# and 64-bit in lib. Don't know about "kfreebsd", does
# it follow the Linux fhs conventions?
*:freebsd*:32)
diff --git a/security/nettle/files/patch-examples-nettle-openssl.c b/security/nettle/files/patch-examples-nettle-openssl.c
index d7cf037c61c3..006e654aa899 100644
--- a/security/nettle/files/patch-examples-nettle-openssl.c
+++ b/security/nettle/files/patch-examples-nettle-openssl.c
@@ -1,6 +1,6 @@
---- examples/nettle-openssl.c.orig 2021-03-21 08:32:25 UTC
+--- examples/nettle-openssl.c.orig 2025-06-26 18:29:03 UTC
+++ examples/nettle-openssl.c
-@@ -374,6 +374,7 @@ openssl_hash_update(void *p,
+@@ -291,6 +291,7 @@ openssl_hash_update(void *p,
EVP_DigestUpdate(ctx->evp, src, length);
}
@@ -8,7 +8,7 @@
#define OPENSSL_HASH(NAME, name) \
static void \
openssl_##name##_init(void *p) \
-@@ -404,6 +405,38 @@ nettle_openssl_##name = { \
+@@ -321,6 +322,38 @@ nettle_openssl_##name = { \
openssl_hash_update, \
openssl_##name##_digest \
};
@@ -46,4 +46,4 @@
+#endif
OPENSSL_HASH(MD5, md5)
- OPENSSL_HASH(SHA, sha1)
+ OPENSSL_HASH(SHA1, sha1)
diff --git a/security/nettle/files/patch-powerpc64-p8-aes-decrypt-internal.asm b/security/nettle/files/patch-powerpc64-p8-aes-decrypt-internal.asm
index 67ceabec79c5..e23c8a8f6463 100644
--- a/security/nettle/files/patch-powerpc64-p8-aes-decrypt-internal.asm
+++ b/security/nettle/files/patch-powerpc64-p8-aes-decrypt-internal.asm
@@ -1,4 +1,4 @@
---- powerpc64/p8/aes-decrypt-internal.asm.orig 2024-06-16 15:27:54 UTC
+--- powerpc64/p8/aes-decrypt-internal.asm.orig 2025-06-26 18:29:03 UTC
+++ powerpc64/p8/aes-decrypt-internal.asm
@@ -64,7 +64,7 @@ PROLOGUE(_nettle_aes_decrypt)
diff --git a/security/nettle/files/patch-powerpc64-p8-aes-encrypt-internal.asm b/security/nettle/files/patch-powerpc64-p8-aes-encrypt-internal.asm
index 313ba61a4f6b..67218e1caaf4 100644
--- a/security/nettle/files/patch-powerpc64-p8-aes-encrypt-internal.asm
+++ b/security/nettle/files/patch-powerpc64-p8-aes-encrypt-internal.asm
@@ -1,6 +1,6 @@
---- powerpc64/p8/aes-encrypt-internal.asm.orig 2022-06-02 17:57:16 UTC
+--- powerpc64/p8/aes-encrypt-internal.asm.orig 2025-06-26 18:29:03 UTC
+++ powerpc64/p8/aes-encrypt-internal.asm
-@@ -63,7 +63,7 @@ define(`S7', `v9')
+@@ -64,7 +64,7 @@ PROLOGUE(_nettle_aes_encrypt)
define(`FUNC_ALIGN', `5')
PROLOGUE(_nettle_aes_encrypt)
@@ -9,7 +9,7 @@
subi ROUNDS,ROUNDS,1
srdi LENGTH,LENGTH,4
-@@ -328,6 +328,6 @@ EPILOGUE(_nettle_aes_encrypt)
+@@ -269,6 +269,6 @@ EPILOGUE(_nettle_aes_encrypt)
.data
.align 4
diff --git a/security/nettle/pkg-plist b/security/nettle/pkg-plist
index 25ba25f62658..48c756c49b45 100644
--- a/security/nettle/pkg-plist
+++ b/security/nettle/pkg-plist
@@ -79,11 +79,11 @@ include/nettle/yarrow.h
lib/libhogweed.a
lib/libhogweed.so
lib/libhogweed.so.6
-lib/libhogweed.so.6.10
+lib/libhogweed.so.6.11
lib/libnettle.a
lib/libnettle.so
lib/libnettle.so.8
-lib/libnettle.so.8.10
+lib/libnettle.so.8.11
libdata/pkgconfig/hogweed.pc
libdata/pkgconfig/nettle.pc
%%PORTDOCS%%%%DOCSDIR%%/NEWS
diff --git a/security/nss/Makefile b/security/nss/Makefile
index 9078124dc1b9..b99ebcb77547 100644
--- a/security/nss/Makefile
+++ b/security/nss/Makefile
@@ -1,5 +1,5 @@
PORTNAME= nss
-PORTVERSION= 3.113
+PORTVERSION= 3.113.1
CATEGORIES= security
MASTER_SITES= MOZILLA/security/${PORTNAME}/releases/${DISTNAME:tu:C/[-.]/_/g}_RTM/src
diff --git a/security/nss/distinfo b/security/nss/distinfo
index 1b9b86ef2940..fe38e674c30a 100644
--- a/security/nss/distinfo
+++ b/security/nss/distinfo
@@ -1,3 +1,3 @@
-TIMESTAMP = 1750348960
-SHA256 (nss-3.113.tar.gz) = acef06b512d3bd81c87a63b3c8653d258bb689d2191fc0e64decf5a1efa01c0f
-SIZE (nss-3.113.tar.gz) = 76625834
+TIMESTAMP = 1751391207
+SHA256 (nss-3.113.1.tar.gz) = b8c586cc0ac60b76477f62483f664f119c26000a8189dd9ef417df7dbd33a2cc
+SIZE (nss-3.113.1.tar.gz) = 76626220
diff --git a/security/openssl/Makefile b/security/openssl/Makefile
index 863590936744..0c43cf9a6808 100644
--- a/security/openssl/Makefile
+++ b/security/openssl/Makefile
@@ -1,5 +1,5 @@
PORTNAME= openssl
-PORTVERSION= 3.0.16
+PORTVERSION= 3.0.17
PORTEPOCH= 1
CATEGORIES= security devel
MASTER_SITES= https://github.com/openssl/openssl/releases/download/${DISTNAME}/
diff --git a/security/openssl/distinfo b/security/openssl/distinfo
index a995eee15899..110c105d736f 100644
--- a/security/openssl/distinfo
+++ b/security/openssl/distinfo
@@ -1,3 +1,3 @@
-TIMESTAMP = 1739293708
-SHA256 (openssl-3.0.16.tar.gz) = 57e03c50feab5d31b152af2b764f10379aecd8ee92f16c985983ce4a99f7ef86
-SIZE (openssl-3.0.16.tar.gz) = 15334967
+TIMESTAMP = 1751448128
+SHA256 (openssl-3.0.17.tar.gz) = dfdd77e4ea1b57ff3a6dbde6b0bdc3f31db5ac99e7fdd4eaf9e1fbb6ec2db8ce
+SIZE (openssl-3.0.17.tar.gz) = 15344831
diff --git a/security/openssl31-quictls/Makefile b/security/openssl31-quictls/Makefile
index 68804cb00ff3..f6b137be1d18 100644
--- a/security/openssl31-quictls/Makefile
+++ b/security/openssl31-quictls/Makefile
@@ -10,10 +10,13 @@ MAINTAINER= brnrd@FreeBSD.org
COMMENT= QUIC capable fork of OpenSSL
WWW= https://www.github.com/quictls/openssl
+DEPRECATED= End-of-Life, please switch to security/quictls or OpenSSL 3.5
+EXPIRATION_DATE= 2025-03-14
+
LICENSE= APACHE20
LICENSE_FILE= ${WRKSRC}/LICENSE.txt
-CONFLICTS_INSTALL= boringssl libressl libressl-devel openssl openssl111 openssl3* openssl-quictls
+CONFLICTS_INSTALL= boringssl libressl libressl-devel openssl openssl111 openssl3* openssl-quictls openssl33-quictls
BROKEN_i386= ld: error: undefined symbol: __atomic_is_lock_free
diff --git a/security/openssl31/Makefile b/security/openssl31/Makefile
index 3f98568e46a7..4ef745ce5e89 100644
--- a/security/openssl31/Makefile
+++ b/security/openssl31/Makefile
@@ -11,7 +11,8 @@ WWW= https://www.openssl.org/
LICENSE= APACHE20
LICENSE_FILE= ${WRKSRC}/LICENSE.txt
-#EXPIRATION_DATE= 2025-03-14
+DEPRECECATED= End-of-Life, will be removed when new vulnerabilities are reported or at end of quarter. Upgrade to security/openssl35 latest LTS.
+EXPIRATION_DATE= 2025-03-14
CONFLICTS_INSTALL= boringssl libressl libressl-devel openssl openssl111 openssl3[2345] openssl*-quictls
diff --git a/security/openssl32/Makefile b/security/openssl32/Makefile
index ae59b26936e6..597dd245415c 100644
--- a/security/openssl32/Makefile
+++ b/security/openssl32/Makefile
@@ -1,5 +1,5 @@
PORTNAME= openssl
-PORTVERSION= 3.2.4
+PORTVERSION= 3.2.5
CATEGORIES= security devel
PKGNAMESUFFIX= 32
MASTER_SITES= https://github.com/openssl/openssl/releases/download/${DISTNAME}/
@@ -11,6 +11,8 @@ WWW= https://www.openssl.org/
LICENSE= APACHE20
LICENSE_FILE= ${WRKSRC}/LICENSE.txt
+EXPIRATION_DATE= 2025-11-23
+
CONFLICTS_INSTALL= boringssl libressl libressl-devel openssl openssl111 openssl3[1345] openssl*-quictls
HAS_CONFIGURE= yes
diff --git a/security/openssl32/distinfo b/security/openssl32/distinfo
index 24e08af5bfb9..a79020e9f3da 100644
--- a/security/openssl32/distinfo
+++ b/security/openssl32/distinfo
@@ -1,3 +1,3 @@
-TIMESTAMP = 1739293970
-SHA256 (openssl-3.2.4.tar.gz) = b23ad7fd9f73e43ad1767e636040e88ba7c9e5775bfa5618436a0dd2c17c3716
-SIZE (openssl-3.2.4.tar.gz) = 17782746
+TIMESTAMP = 1751448354
+SHA256 (openssl-3.2.5.tar.gz) = b36347d024a0f5bd09fefcd6af7a58bb30946080eb8ce8f7be78562190d09879
+SIZE (openssl-3.2.5.tar.gz) = 17800797
diff --git a/security/openssl33-quictls/Makefile b/security/openssl33-quictls/Makefile
new file mode 100644
index 000000000000..4d53a2b5a87d
--- /dev/null
+++ b/security/openssl33-quictls/Makefile
@@ -0,0 +1,190 @@
+PORTNAME= openssl
+DISTVERSIONPREFIX= ${PORTNAME}-
+PORTVERSION= 3.3.0
+CATEGORIES= security devel
+PKGNAMESUFFIX= 33-quictls
+
+MAINTAINER= brnrd@FreeBSD.org
+COMMENT= QUIC capable fork of OpenSSL
+WWW= https://www.github.com/quictls/quictls
+
+LICENSE= APACHE20
+LICENSE_FILE= ${WRKSRC}/LICENSE.txt
+
+CONFLICTS_INSTALL= boringssl libressl libressl-devel openssl openssl111 openssl3* openssl*-quictls
+
+BROKEN_i386= ld: error: undefined symbol: __atomic_is_lock_free
+
+HAS_CONFIGURE= yes
+CONFIGURE_SCRIPT= config
+CONFIGURE_ENV= PERL="${PERL}"
+CONFIGURE_ARGS= --openssldir=${OPENSSLDIR} \
+ --prefix=${PREFIX}
+
+USES= cpe perl5
+USE_PERL5= build
+USE_GITHUB= yes
+GH_ACCOUNT= quictls
+GH_PROJECT= quictls
+
+TEST_TARGET= test
+
+LDFLAGS_i386= -Wl,-znotext
+
+MAKE_ARGS+= WHOLE_ARCHIVE_FLAG=--whole-archive CNF_LDFLAGS="${LDFLAGS}"
+MAKE_ENV+= LIBRPATH="${PREFIX}/lib" GREP_OPTIONS=
+
+EXTRA_PATCHES+= ${.CURDIR}/../openssl/files/patch-crypto_async_arch_async__posix.h
+
+OPTIONS_GROUP= CIPHERS HASHES MODULES OPTIMIZE PROTOCOLS
+OPTIONS_GROUP_CIPHERS= ARIA DES GOST IDEA SM4 RC2 RC4 RC5 WEAK-SSL-CIPHERS
+OPTIONS_GROUP_HASHES= MD2 MD4 MDC2 RMD160 SM2 SM3
+OPTIONS_GROUP_OPTIMIZE= ASM SSE2 THREADS
+OPTIONS_GROUP_MODULES= FIPS LEGACY
+OPTIONS_DEFINE_i386= I386
+OPTIONS_GROUP_PROTOCOLS=NEXTPROTONEG SCTP SSL3 TLS1 TLS1_1 TLS1_2
+
+OPTIONS_DEFINE= ASYNC CT MAN3 RFC3779 SHARED ZLIB
+
+OPTIONS_DEFAULT=ASM ASYNC CT DES EC FIPS GOST MAN3 MD4 NEXTPROTONEG \
+ RC2 RC4 RMD160 SCTP SHARED SSE2 THREADS TLS1 TLS1_1 TLS1_2
+
+OPTIONS_EXCLUDE_i386= FIPS
+
+OPTIONS_GROUP_OPTIMIZE_amd64= EC
+
+.if ${MACHINE_ARCH} == "amd64"
+OPTIONS_GROUP_OPTIMIZE+= EC
+.elif ${MACHINE_ARCH} == "mips64el"
+OPTIONS_GROUP_OPTIMIZE+= EC
+.endif
+
+OPTIONS_SUB= yes
+
+ARIA_DESC= ARIA (South Korean standard)
+ASM_DESC= Assembler code
+ASYNC_DESC= Asynchronous mode
+CIPHERS_DESC= Block Cipher Support
+CT_DESC= Certificate Transparency Support
+DES_DESC= (Triple) Data Encryption Standard
+EC_DESC= Optimize NIST elliptic curves
+FIPS_DESC= Build FIPS provider (Note: NOT yet FIPS validated)
+GOST_DESC= GOST (Russian standard)
+HASHES_DESC= Hash Function Support
+I386_DESC= i386 (instead of i486+)
+IDEA_DESC= International Data Encryption Algorithm
+LEGACY_DESC= Older algorithms
+MAN3_DESC= Install API manpages (section 3, 7)
+MD2_DESC= MD2 (obsolete) (requires LEGACY)
+MD4_DESC= MD4 (unsafe)
+MDC2_DESC= MDC-2 (patented, requires DES)
+MODULES_DESC= Provider modules
+NEXTPROTONEG_DESC= Next Protocol Negotiation (SPDY)
+OPTIMIZE_DESC= Optimizations
+PROTOCOLS_DESC= Protocol Support
+RC2_DESC= RC2 (unsafe)
+RC4_DESC= RC4 (unsafe)
+RC5_DESC= RC5 (patented)
+RMD160_DESC= RIPEMD-160
+RFC3779_DESC= RFC3779 support (BGP)
+SCTP_DESC= SCTP (Stream Control Transmission)
+SHARED_DESC= Build shared libraries
+SM2_DESC= SM2 Elliptic Curve DH (Chinese standard)
+SM3_DESC= SM3 256bit (Chinese standard)
+SM4_DESC= SM4 128bit (Chinese standard)
+SSE2_DESC= Runtime SSE2 detection
+SSL3_DESC= SSLv3 (unsafe)
+TLS1_DESC= TLSv1.0 (requires TLS1_1, TLS1_2)
+TLS1_1_DESC= TLSv1.1 (requires TLS1_2)
+TLS1_2_DESC= TLSv1.2
+WEAK-SSL-CIPHERS_DESC= Weak cipher support (unsafe)
+
+# Upstream default disabled options
+.for _option in fips md2 ktls rc5 sctp ssl3 weak-ssl-ciphers zlib
+${_option:tu}_CONFIGURE_ON= enable-${_option}
+.endfor
+
+# Upstream default enabled options
+.for _option in aria asm async ct des gost idea md4 mdc2 legacy \
+ nextprotoneg rc2 rc4 rfc3779 rmd160 shared sm2 sm3 sm4 sse2 \
+ threads tls1 tls1_1 tls1_2
+${_option:tu}_CONFIGURE_OFF= no-${_option}
+.endfor
+
+MD2_IMPLIES= LEGACY
+MDC2_IMPLIES= DES
+TLS1_IMPLIES= TLS1_1
+TLS1_1_IMPLIES= TLS1_2
+
+EC_CONFIGURE_ON= enable-ec_nistp_64_gcc_128
+FIPS_VARS= shlibs+=lib/ossl-modules/fips.so
+I386_CONFIGURE_ON= 386
+LEGACY_VARS= shlibs+=lib/ossl-modules/legacy.so
+MAN3_EXTRA_PATCHES_OFF= ${FILESDIR}/extra-patch-util_find-doc-nits
+SHARED_MAKE_ENV= SHLIBVER=${OPENSSL_SHLIBVER}
+SHARED_PLIST_SUB= SHLIBVER=${OPENSSL_SHLIBVER}
+SHARED_USE= ldconfig=yes
+SHARED_VARS= shlibs+="lib/libcrypto.so.${OPENSSL_SHLIBVER} \
+ lib/libssl.so.${OPENSSL_SHLIBVER} \
+ lib/engines-${OPENSSL_SHLIBVER}/capi.so \
+ lib/engines-${OPENSSL_SHLIBVER}/devcrypto.so \
+ lib/engines-${OPENSSL_SHLIBVER}/padlock.so"
+SSL3_CONFIGURE_ON+= enable-ssl3-method
+ZLIB_CONFIGURE_ON= zlib-dynamic
+
+SHLIBS= lib/engines-${OPENSSL_SHLIBVER}/loader_attic.so
+
+PORTSCOUT= limit:^${DISTVERSION:R:S/./\./g}\.
+
+.include <bsd.port.options.mk>
+
+.if ${ARCH} == powerpc64
+CONFIGURE_ARGS+= BSD-ppc64
+.elif ${ARCH} == powerpc64le
+CONFIGURE_ARGS+= BSD-ppc64le
+.elif ${ARCH} == riscv64
+CONFIGURE_ARGS+= BSD-riscv64
+.endif
+
+.include <bsd.port.pre.mk>
+.if ${PREFIX} == /usr
+IGNORE= the OpenSSL port can not be installed over the base version
+.endif
+
+OPENSSLDIR?= ${PREFIX}/openssl
+PLIST_SUB+= OPENSSLDIR=${OPENSSLDIR:S=^${PREFIX}/==}
+
+.include "version.mk"
+
+post-patch:
+ ${REINPLACE_CMD} -Ee 's|^MANDIR=.*$$|MANDIR=$$(INSTALLTOP)/share/man|' \
+ -e 's|^(build\|install)_docs: .*|\1_docs: \1_man_docs|' \
+ ${WRKSRC}/Configurations/unix-Makefile.tmpl
+ ${REINPLACE_CMD} 's|SHLIB_VERSION=3|SHLIB_VERSION=${OPENSSL_SHLIBVER}|' \
+ ${WRKSRC}/VERSION.dat
+
+post-configure:
+ ( cd ${WRKSRC} ; ${PERL} configdata.pm --dump )
+
+post-configure-MAN3-off:
+ ${REINPLACE_CMD} \
+ -e 's|^build_man_docs:.*|build_man_docs: $$(MANDOCS1) $$(MANDOCS5)|' \
+ -e 's|dummy $$(MANDOCS[37]); do |dummy; do |' \
+ ${WRKSRC}/Makefile
+
+post-install-SHARED-on:
+.for i in ${SHLIBS}
+ -@${STRIP_CMD} ${STAGEDIR}${PREFIX}/$i
+.endfor
+
+post-install-SHARED-off:
+ ${RMDIR} ${STAGEDIR}${PREFIX}/lib/engines-${OPENSSL_SHLIBVER}
+
+post-install:
+ ${STRIP_CMD} ${STAGEDIR}${PREFIX}/bin/openssl
+
+post-install-MAN3-on:
+ ( cd ${STAGEDIR}/${PREFIX} ; find share/man/man3 -not -type d ; \
+ find share/man/man7 -not -type d ) | sed 's/$$/.gz/' >> ${TMPPLIST}
+
+.include <bsd.port.post.mk>
diff --git a/security/openssl33-quictls/distinfo b/security/openssl33-quictls/distinfo
new file mode 100644
index 000000000000..4003eb7cc283
--- /dev/null
+++ b/security/openssl33-quictls/distinfo
@@ -0,0 +1,3 @@
+TIMESTAMP = 1751486314
+SHA256 (quictls-quictls-openssl-3.3.0_GH0.tar.gz) = ff194511e53c0bead06d316e6891deebb07e3713efc65ef938e22962a43579a4
+SIZE (quictls-quictls-openssl-3.3.0_GH0.tar.gz) = 18220759
diff --git a/security/openssl33-quictls/files/extra-patch-util_find-doc-nits b/security/openssl33-quictls/files/extra-patch-util_find-doc-nits
new file mode 100644
index 000000000000..947f7447a445
--- /dev/null
+++ b/security/openssl33-quictls/files/extra-patch-util_find-doc-nits
@@ -0,0 +1,20 @@
+--- util/find-doc-nits.orig 2023-08-03 13:45:48 UTC
++++ util/find-doc-nits
+@@ -80,7 +80,7 @@ my $temp = '/tmp/docnits.txt';
+ my $OUT;
+ my $status = 0;
+
+-$opt_m = "man1,man3,man5,man7" unless $opt_m;
++$opt_m = "man1,man5" unless $opt_m;
+ die "Argument of -m option may contain only man1, man3, man5, and/or man7"
+ unless $opt_m =~ /^(man[1357][, ]?)*$/;
+ my @sections = ( split /[, ]/, $opt_m );
+@@ -725,7 +725,7 @@ sub check {
+ next if $target eq ''; # Skip if links within page, or
+ next if $target =~ /::/; # links to a Perl module, or
+ next if $target =~ /^https?:/; # is a URL link, or
+- next if $target =~ /\([1357]\)$/; # it has a section
++ next if $target =~ /\([15]\)$/; # it has a section
+ err($id, "Missing man section number (likely, $mansect) in L<$target>")
+ }
+ # Check for proper links to commands.
diff --git a/security/openssl33-quictls/files/patch-CVE-2024-9143 b/security/openssl33-quictls/files/patch-CVE-2024-9143
new file mode 100644
index 000000000000..f36b97f194f7
--- /dev/null
+++ b/security/openssl33-quictls/files/patch-CVE-2024-9143
@@ -0,0 +1,198 @@
+From fdf6723362ca51bd883295efe206cb5b1cfa5154 Mon Sep 17 00:00:00 2001
+From: Viktor Dukhovni <viktor@openssl.org>
+Date: Thu, 19 Sep 2024 01:02:40 +1000
+Subject: [PATCH] Harden BN_GF2m_poly2arr against misuse.
+
+The BN_GF2m_poly2arr() function converts characteristic-2 field
+(GF_{2^m}) Galois polynomials from a representation as a BIGNUM bitmask,
+to a compact array with just the exponents of the non-zero terms.
+
+These polynomials are then used in BN_GF2m_mod_arr() to perform modular
+reduction. A precondition of calling BN_GF2m_mod_arr() is that the
+polynomial must have a non-zero constant term (i.e. the array has `0` as
+its final element).
+
+Internally, callers of BN_GF2m_poly2arr() did not verify that
+precondition, and binary EC curve parameters with an invalid polynomial
+could lead to out of bounds memory reads and writes in BN_GF2m_mod_arr().
+
+The precondition is always true for polynomials that arise from the
+standard form of EC parameters for characteristic-two fields (X9.62).
+See the "Finite Field Identification" section of:
+
+ https://www.itu.int/ITU-T/formal-language/itu-t/x/x894/2018-cor1/ANSI-X9-62.html
+
+The OpenSSL GF(2^m) code supports only the trinomial and pentanomial
+basis X9.62 forms.
+
+This commit updates BN_GF2m_poly2arr() to return `0` (failure) when
+the constant term is zero (i.e. the input bitmask BIGNUM is not odd).
+
+Additionally, the return value is made unambiguous when there is not
+enough space to also pad the array with a final `-1` sentinel value.
+The return value is now always the number of elements (including the
+final `-1`) that would be filled when the output array is sufficiently
+large. Previously the same count was returned both when the array has
+just enough room for the final `-1` and when it had only enough space
+for non-sentinel values.
+
+Finally, BN_GF2m_poly2arr() is updated to reject polynomials whose
+degree exceeds `OPENSSL_ECC_MAX_FIELD_BITS`, this guards against
+CPU exhausition attacks via excessively large inputs.
+
+The above issues do not arise in processing X.509 certificates. These
+generally have EC keys from "named curves", and RFC5840 (Section 2.1.1)
+disallows explicit EC parameters. The TLS code in OpenSSL enforces this
+constraint only after the certificate is decoded, but, even if explicit
+parameters are specified, they are in X9.62 form, which cannot represent
+problem values as noted above.
+
+Initially reported as oss-fuzz issue 71623.
+
+A closely related issue was earlier reported in
+<https://github.com/openssl/openssl/issues/19826>.
+
+Severity: Low, CVE-2024-9143
+
+Reviewed-by: Matt Caswell <matt@openssl.org>
+Reviewed-by: Bernd Edlinger <bernd.edlinger@hotmail.de>
+Reviewed-by: Paul Dale <ppzgs1@gmail.com>
+Reviewed-by: Tomas Mraz <tomas@openssl.org>
+(Merged from https://github.com/openssl/openssl/pull/25639)
+
+(cherry picked from commit 8e008cb8b23ec7dc75c45a66eeed09c815b11cd2)
+---
+ crypto/bn/bn_gf2m.c | 28 +++++++++++++++-------
+ test/ec_internal_test.c | 51 +++++++++++++++++++++++++++++++++++++++++
+ 2 files changed, 71 insertions(+), 8 deletions(-)
+
+diff --git a/crypto/bn/bn_gf2m.c b/crypto/bn/bn_gf2m.c
+index c811ae82d6b15..bcc66613cc14d 100644
+--- crypto/bn/bn_gf2m.c.orig
++++ crypto/bn/bn_gf2m.c
+@@ -15,6 +15,7 @@
+ #include "bn_local.h"
+
+ #ifndef OPENSSL_NO_EC2M
++# include <openssl/ec.h>
+
+ /*
+ * Maximum number of iterations before BN_GF2m_mod_solve_quad_arr should
+@@ -1140,16 +1141,26 @@ int BN_GF2m_mod_solve_quad(BIGNUM *r, const BIGNUM *a, const BIGNUM *p,
+ /*
+ * Convert the bit-string representation of a polynomial ( \sum_{i=0}^n a_i *
+ * x^i) into an array of integers corresponding to the bits with non-zero
+- * coefficient. Array is terminated with -1. Up to max elements of the array
+- * will be filled. Return value is total number of array elements that would
+- * be filled if array was large enough.
++ * coefficient. The array is intended to be suitable for use with
++ * `BN_GF2m_mod_arr()`, and so the constant term of the polynomial must not be
++ * zero. This translates to a requirement that the input BIGNUM `a` is odd.
++ *
++ * Given sufficient room, the array is terminated with -1. Up to max elements
++ * of the array will be filled.
++ *
++ * The return value is total number of array elements that would be filled if
++ * array was large enough, including the terminating `-1`. It is `0` when `a`
++ * is not odd or the constant term is zero contrary to requirement.
++ *
++ * The return value is also `0` when the leading exponent exceeds
++ * `OPENSSL_ECC_MAX_FIELD_BITS`, this guards against CPU exhaustion attacks,
+ */
+ int BN_GF2m_poly2arr(const BIGNUM *a, int p[], int max)
+ {
+ int i, j, k = 0;
+ BN_ULONG mask;
+
+- if (BN_is_zero(a))
++ if (!BN_is_odd(a))
+ return 0;
+
+ for (i = a->top - 1; i >= 0; i--) {
+@@ -1167,12 +1178,13 @@ int BN_GF2m_poly2arr(const BIGNUM *a, int p[], int max)
+ }
+ }
+
+- if (k < max) {
++ if (k > 0 && p[0] > OPENSSL_ECC_MAX_FIELD_BITS)
++ return 0;
++
++ if (k < max)
+ p[k] = -1;
+- k++;
+- }
+
+- return k;
++ return k + 1;
+ }
+
+ /*
+diff --git a/test/ec_internal_test.c b/test/ec_internal_test.c
+index 8c2cd05631696..02cfd4e9d8858 100644
+--- test/ec_internal_test.c.orig
++++ test/ec_internal_test.c
+@@ -155,6 +155,56 @@ static int field_tests_ecp_mont(void)
+ }
+
+ #ifndef OPENSSL_NO_EC2M
++/* Test that decoding of invalid GF2m field parameters fails. */
++static int ec2m_field_sanity(void)
++{
++ int ret = 0;
++ BN_CTX *ctx = BN_CTX_new();
++ BIGNUM *p, *a, *b;
++ EC_GROUP *group1 = NULL, *group2 = NULL, *group3 = NULL;
++
++ TEST_info("Testing GF2m hardening\n");
++
++ BN_CTX_start(ctx);
++ p = BN_CTX_get(ctx);
++ a = BN_CTX_get(ctx);
++ if (!TEST_ptr(b = BN_CTX_get(ctx))
++ || !TEST_true(BN_one(a))
++ || !TEST_true(BN_one(b)))
++ goto out;
++
++ /* Even pentanomial value should be rejected */
++ if (!TEST_true(BN_set_word(p, 0xf2)))
++ goto out;
++ if (!TEST_ptr_null(group1 = EC_GROUP_new_curve_GF2m(p, a, b, ctx)))
++ TEST_error("Zero constant term accepted in GF2m polynomial");
++
++ /* Odd hexanomial should also be rejected */
++ if (!TEST_true(BN_set_word(p, 0xf3)))
++ goto out;
++ if (!TEST_ptr_null(group2 = EC_GROUP_new_curve_GF2m(p, a, b, ctx)))
++ TEST_error("Hexanomial accepted as GF2m polynomial");
++
++ /* Excessive polynomial degree should also be rejected */
++ if (!TEST_true(BN_set_word(p, 0x71))
++ || !TEST_true(BN_set_bit(p, OPENSSL_ECC_MAX_FIELD_BITS + 1)))
++ goto out;
++ if (!TEST_ptr_null(group3 = EC_GROUP_new_curve_GF2m(p, a, b, ctx)))
++ TEST_error("GF2m polynomial degree > %d accepted",
++ OPENSSL_ECC_MAX_FIELD_BITS);
++
++ ret = group1 == NULL && group2 == NULL && group3 == NULL;
++
++ out:
++ EC_GROUP_free(group1);
++ EC_GROUP_free(group2);
++ EC_GROUP_free(group3);
++ BN_CTX_end(ctx);
++ BN_CTX_free(ctx);
++
++ return ret;
++}
++
+ /* test EC_GF2m_simple_method directly */
+ static int field_tests_ec2_simple(void)
+ {
+@@ -443,6 +493,7 @@ int setup_tests(void)
+ ADD_TEST(field_tests_ecp_simple);
+ ADD_TEST(field_tests_ecp_mont);
+ #ifndef OPENSSL_NO_EC2M
++ ADD_TEST(ec2m_field_sanity);
+ ADD_TEST(field_tests_ec2_simple);
+ #endif
+ ADD_ALL_TESTS(field_tests_default, crv_len);
diff --git a/security/openssl33-quictls/pkg-descr b/security/openssl33-quictls/pkg-descr
new file mode 100644
index 000000000000..0373df3f0b26
--- /dev/null
+++ b/security/openssl33-quictls/pkg-descr
@@ -0,0 +1,8 @@
+This is a fork of OpenSSL to enable QUIC. This fork adds API that can be
+used by QUIC implementations for connection handshakes.
+
+There is a community need for a QUIC capable TLS library. This fork is
+intended as stopgap solution to enable higher level frameworks and runtimes
+to use QUIC with the proven and reliable TLS functionality from OpenSSL.
+This fork will be maintained until OpenSSL officially provides reasonable
+support for QUIC implementations.
diff --git a/security/openssl33-quictls/pkg-message b/security/openssl33-quictls/pkg-message
new file mode 100644
index 000000000000..7cd49c285a43
--- /dev/null
+++ b/security/openssl33-quictls/pkg-message
@@ -0,0 +1,20 @@
+[
+{ type: install
+ message: <<EOM
+
+This QUIC capable OpenSSL fork is in an ALPHA stage
+
+Do NOT use for production!
+
+EOM
+}
+{ type: upgrade
+ message: <<EOM
+
+This QUIC capable OpenSSL fork is in an ALPHA stage
+
+Do NOT use for production!
+
+EOM
+}
+]
diff --git a/security/openssl33-quictls/pkg-plist b/security/openssl33-quictls/pkg-plist
new file mode 100644
index 000000000000..3e3f644f4a2c
--- /dev/null
+++ b/security/openssl33-quictls/pkg-plist
@@ -0,0 +1,281 @@
+bin/c_rehash
+bin/openssl
+include/openssl/aes.h
+include/openssl/asn1.h
+include/openssl/asn1_mac.h
+include/openssl/asn1err.h
+include/openssl/asn1t.h
+include/openssl/async.h
+include/openssl/asyncerr.h
+include/openssl/bio.h
+include/openssl/bioerr.h
+include/openssl/blowfish.h
+include/openssl/bn.h
+include/openssl/bnerr.h
+include/openssl/buffer.h
+include/openssl/buffererr.h
+include/openssl/camellia.h
+include/openssl/cast.h
+include/openssl/cmac.h
+include/openssl/cmp.h
+include/openssl/cmp_util.h
+include/openssl/cmperr.h
+include/openssl/cms.h
+include/openssl/cmserr.h
+include/openssl/comp.h
+include/openssl/comperr.h
+include/openssl/conf.h
+include/openssl/conf_api.h
+include/openssl/conferr.h
+include/openssl/configuration.h
+include/openssl/conftypes.h
+include/openssl/core.h
+include/openssl/core_dispatch.h
+include/openssl/core_names.h
+include/openssl/core_object.h
+include/openssl/crmf.h
+include/openssl/crmferr.h
+include/openssl/crypto.h
+include/openssl/cryptoerr.h
+include/openssl/cryptoerr_legacy.h
+include/openssl/ct.h
+include/openssl/cterr.h
+include/openssl/decoder.h
+include/openssl/decodererr.h
+include/openssl/des.h
+include/openssl/dh.h
+include/openssl/dherr.h
+include/openssl/dsa.h
+include/openssl/dsaerr.h
+include/openssl/dtls1.h
+include/openssl/e_os2.h
+include/openssl/e_ostime.h
+include/openssl/ebcdic.h
+include/openssl/ec.h
+include/openssl/ecdh.h
+include/openssl/ecdsa.h
+include/openssl/ecerr.h
+include/openssl/encoder.h
+include/openssl/encodererr.h
+include/openssl/engine.h
+include/openssl/engineerr.h
+include/openssl/err.h
+include/openssl/ess.h
+include/openssl/esserr.h
+include/openssl/evp.h
+include/openssl/evperr.h
+include/openssl/fips_names.h
+include/openssl/fipskey.h
+include/openssl/hmac.h
+include/openssl/hpke.h
+include/openssl/http.h
+include/openssl/httperr.h
+include/openssl/idea.h
+include/openssl/kdf.h
+include/openssl/kdferr.h
+include/openssl/lhash.h
+include/openssl/macros.h
+include/openssl/md2.h
+include/openssl/md4.h
+include/openssl/md5.h
+include/openssl/mdc2.h
+include/openssl/modes.h
+include/openssl/obj_mac.h
+include/openssl/objects.h
+include/openssl/objectserr.h
+include/openssl/ocsp.h
+include/openssl/ocsperr.h
+include/openssl/opensslconf.h
+include/openssl/opensslv.h
+include/openssl/ossl_typ.h
+include/openssl/param_build.h
+include/openssl/params.h
+include/openssl/pem.h
+include/openssl/pem2.h
+include/openssl/pemerr.h
+include/openssl/pkcs12.h
+include/openssl/pkcs12err.h
+include/openssl/pkcs7.h
+include/openssl/pkcs7err.h
+include/openssl/prov_ssl.h
+include/openssl/proverr.h
+include/openssl/provider.h
+include/openssl/quic.h
+include/openssl/rand.h
+include/openssl/randerr.h
+include/openssl/rc2.h
+include/openssl/rc4.h
+include/openssl/rc5.h
+include/openssl/ripemd.h
+include/openssl/rsa.h
+include/openssl/rsaerr.h
+include/openssl/safestack.h
+include/openssl/seed.h
+include/openssl/self_test.h
+include/openssl/sha.h
+include/openssl/srp.h
+include/openssl/srtp.h
+include/openssl/ssl.h
+include/openssl/ssl2.h
+include/openssl/ssl3.h
+include/openssl/sslerr.h
+include/openssl/sslerr_legacy.h
+include/openssl/stack.h
+include/openssl/store.h
+include/openssl/storeerr.h
+include/openssl/symhacks.h
+include/openssl/thread.h
+include/openssl/tls1.h
+include/openssl/trace.h
+include/openssl/ts.h
+include/openssl/tserr.h
+include/openssl/txt_db.h
+include/openssl/types.h
+include/openssl/ui.h
+include/openssl/uierr.h
+include/openssl/whrlpool.h
+include/openssl/x509.h
+include/openssl/x509_vfy.h
+include/openssl/x509err.h
+include/openssl/x509v3.h
+include/openssl/x509v3err.h
+lib/cmake/OpenSSL/OpenSSLConfig.cmake
+lib/cmake/OpenSSL/OpenSSLConfigVersion.cmake
+%%SHARED%%lib/engines-%%SHLIBVER%%/capi.so
+%%SHARED%%lib/engines-%%SHLIBVER%%/devcrypto.so
+%%SHARED%%lib/engines-%%SHLIBVER%%/loader_attic.so
+%%SHARED%%lib/engines-%%SHLIBVER%%/padlock.so
+lib/libcrypto.a
+%%SHARED%%lib/libcrypto.so
+%%SHARED%%lib/libcrypto.so.%%SHLIBVER%%
+lib/libssl.a
+%%SHARED%%lib/libssl.so
+%%SHARED%%lib/libssl.so.%%SHLIBVER%%
+%%FIPS%%%%SHARED%%lib/ossl-modules/fips.so
+%%LEGACY%%%%SHARED%%lib/ossl-modules/legacy.so
+libdata/pkgconfig/libcrypto.pc
+libdata/pkgconfig/libssl.pc
+libdata/pkgconfig/openssl.pc
+share/man/man1/CA.pl.1ossl.gz
+share/man/man1/asn1parse.1ossl.gz
+share/man/man1/c_rehash.1ossl.gz
+share/man/man1/ca.1ossl.gz
+share/man/man1/ciphers.1ossl.gz
+share/man/man1/cms.1ossl.gz
+share/man/man1/cmp.1ossl.gz
+share/man/man1/crl.1ossl.gz
+share/man/man1/crl2pkcs7.1ossl.gz
+share/man/man1/dgst.1ossl.gz
+share/man/man1/dhparam.1ossl.gz
+share/man/man1/dsa.1ossl.gz
+share/man/man1/dsaparam.1ossl.gz
+share/man/man1/ec.1ossl.gz
+share/man/man1/ecparam.1ossl.gz
+share/man/man1/enc.1ossl.gz
+share/man/man1/engine.1ossl.gz
+share/man/man1/errstr.1ossl.gz
+share/man/man1/gendsa.1ossl.gz
+share/man/man1/genpkey.1ossl.gz
+share/man/man1/genrsa.1ossl.gz
+share/man/man1/info.1ossl.gz
+share/man/man1/kdf.1ossl.gz
+share/man/man1/mac.1ossl.gz
+share/man/man1/nseq.1ossl.gz
+share/man/man1/ocsp.1ossl.gz
+share/man/man1/openssl-asn1parse.1ossl.gz
+share/man/man1/openssl-ca.1ossl.gz
+share/man/man1/openssl-ciphers.1ossl.gz
+share/man/man1/openssl-cmds.1ossl.gz
+share/man/man1/openssl-cmp.1ossl.gz
+share/man/man1/openssl-cms.1ossl.gz
+share/man/man1/openssl-crl.1ossl.gz
+share/man/man1/openssl-crl2pkcs7.1ossl.gz
+share/man/man1/openssl-dgst.1ossl.gz
+share/man/man1/openssl-dhparam.1ossl.gz
+share/man/man1/openssl-dsa.1ossl.gz
+share/man/man1/openssl-dsaparam.1ossl.gz
+share/man/man1/openssl-ec.1ossl.gz
+share/man/man1/openssl-ecparam.1ossl.gz
+share/man/man1/openssl-enc.1ossl.gz
+share/man/man1/openssl-engine.1ossl.gz
+share/man/man1/openssl-errstr.1ossl.gz
+share/man/man1/openssl-fipsinstall.1ossl.gz
+share/man/man1/openssl-format-options.1ossl.gz
+share/man/man1/openssl-gendsa.1ossl.gz
+share/man/man1/openssl-genpkey.1ossl.gz
+share/man/man1/openssl-genrsa.1ossl.gz
+share/man/man1/openssl-info.1ossl.gz
+share/man/man1/openssl-kdf.1ossl.gz
+share/man/man1/openssl-list.1ossl.gz
+share/man/man1/openssl-mac.1ossl.gz
+share/man/man1/openssl-namedisplay-options.1ossl.gz
+share/man/man1/openssl-nseq.1ossl.gz
+share/man/man1/openssl-ocsp.1ossl.gz
+share/man/man1/openssl-passphrase-options.1ossl.gz
+share/man/man1/openssl-passwd.1ossl.gz
+share/man/man1/openssl-pkcs12.1ossl.gz
+share/man/man1/openssl-pkcs7.1ossl.gz
+share/man/man1/openssl-pkcs8.1ossl.gz
+share/man/man1/openssl-pkey.1ossl.gz
+share/man/man1/openssl-pkeyparam.1ossl.gz
+share/man/man1/openssl-pkeyutl.1ossl.gz
+share/man/man1/openssl-prime.1ossl.gz
+share/man/man1/openssl-rand.1ossl.gz
+share/man/man1/openssl-rehash.1ossl.gz
+share/man/man1/openssl-req.1ossl.gz
+share/man/man1/openssl-rsa.1ossl.gz
+share/man/man1/openssl-rsautl.1ossl.gz
+share/man/man1/openssl-s_client.1ossl.gz
+share/man/man1/openssl-s_server.1ossl.gz
+share/man/man1/openssl-s_time.1ossl.gz
+share/man/man1/openssl-sess_id.1ossl.gz
+share/man/man1/openssl-smime.1ossl.gz
+share/man/man1/openssl-speed.1ossl.gz
+share/man/man1/openssl-spkac.1ossl.gz
+share/man/man1/openssl-srp.1ossl.gz
+share/man/man1/openssl-storeutl.1ossl.gz
+share/man/man1/openssl-ts.1ossl.gz
+share/man/man1/openssl-verification-options.1ossl.gz
+share/man/man1/openssl-verify.1ossl.gz
+share/man/man1/openssl-version.1ossl.gz
+share/man/man1/openssl-x509.1ossl.gz
+share/man/man1/openssl.1ossl.gz
+share/man/man1/passwd.1ossl.gz
+share/man/man1/pkcs12.1ossl.gz
+share/man/man1/pkcs7.1ossl.gz
+share/man/man1/pkcs8.1ossl.gz
+share/man/man1/pkey.1ossl.gz
+share/man/man1/pkeyparam.1ossl.gz
+share/man/man1/pkeyutl.1ossl.gz
+share/man/man1/prime.1ossl.gz
+share/man/man1/rand.1ossl.gz
+share/man/man1/rehash.1ossl.gz
+share/man/man1/req.1ossl.gz
+share/man/man1/rsa.1ossl.gz
+share/man/man1/rsautl.1ossl.gz
+share/man/man1/s_client.1ossl.gz
+share/man/man1/s_server.1ossl.gz
+share/man/man1/s_time.1ossl.gz
+share/man/man1/sess_id.1ossl.gz
+share/man/man1/smime.1ossl.gz
+share/man/man1/speed.1ossl.gz
+share/man/man1/spkac.1ossl.gz
+share/man/man1/srp.1ossl.gz
+share/man/man1/storeutl.1ossl.gz
+share/man/man1/ts.1ossl.gz
+share/man/man1/tsget.1ossl.gz
+share/man/man1/verify.1ossl.gz
+share/man/man1/version.1ossl.gz
+share/man/man1/x509.1ossl.gz
+share/man/man5/config.5ossl.gz
+share/man/man5/fips_config.5ossl.gz
+share/man/man5/x509v3_config.5ossl.gz
+%%OPENSSLDIR%%/misc/CA.pl
+@comment %%OPENSSLDIR%%/misc/tsget.pl
+%%OPENSSLDIR%%/misc/tsget
+@sample %%OPENSSLDIR%%/ct_log_list.cnf.dist %%OPENSSLDIR%%/ct_log_list.cnf
+%%FIPS%%%%OPENSSLDIR%%/fipsmodule.cnf
+@sample %%OPENSSLDIR%%/openssl.cnf.dist %%OPENSSLDIR%%/openssl.cnf
+@dir lib/ossl-modules
+@dir %%OPENSSLDIR%%/private
+@dir %%OPENSSLDIR%%/certs
diff --git a/security/openssl33-quictls/version.mk b/security/openssl33-quictls/version.mk
new file mode 100644
index 000000000000..c3fe2e51c987
--- /dev/null
+++ b/security/openssl33-quictls/version.mk
@@ -0,0 +1 @@
+OPENSSL_SHLIBVER?= 15
diff --git a/security/openssl33/Makefile b/security/openssl33/Makefile
index 92b2a3b70d07..f4cdbb7a8866 100644
--- a/security/openssl33/Makefile
+++ b/security/openssl33/Makefile
@@ -1,5 +1,5 @@
PORTNAME= openssl
-PORTVERSION= 3.3.3
+PORTVERSION= 3.3.4
CATEGORIES= security devel
PKGNAMESUFFIX= 33
MASTER_SITES= https://github.com/openssl/openssl/releases/download/${DISTNAME}/
@@ -11,6 +11,8 @@ WWW= https://www.openssl.org/
LICENSE= APACHE20
LICENSE_FILE= ${WRKSRC}/LICENSE.txt
+EXPIRATION_DATE= 2026-04-09
+
CONFLICTS_INSTALL= boringssl libressl libressl-devel openssl openssl111 openssl3[1245] openssl*-quictls
HAS_CONFIGURE= yes
diff --git a/security/openssl33/distinfo b/security/openssl33/distinfo
index ba314a4dcc7f..a6394ed16a43 100644
--- a/security/openssl33/distinfo
+++ b/security/openssl33/distinfo
@@ -1,3 +1,3 @@
-TIMESTAMP = 1739294023
-SHA256 (openssl-3.3.3.tar.gz) = 712590fd20aaa60ec75d778fe5b810d6b829ca7fb1e530577917a131f9105539
-SIZE (openssl-3.3.3.tar.gz) = 18102481
+TIMESTAMP = 1751448373
+SHA256 (openssl-3.3.4.tar.gz) = 8d1a5fc323d3fd351dc05458457fd48f78652d2a498e1d70ffea07b4d0eb3fa8
+SIZE (openssl-3.3.4.tar.gz) = 18113350
diff --git a/security/openssl34/Makefile b/security/openssl34/Makefile
index b1ab27b4efc0..4bc0fe6c59a2 100644
--- a/security/openssl34/Makefile
+++ b/security/openssl34/Makefile
@@ -1,5 +1,5 @@
PORTNAME= openssl
-DISTVERSION= 3.4.1
+DISTVERSION= 3.4.2
CATEGORIES= security devel
PKGNAMESUFFIX= 34
MASTER_SITES= https://github.com/openssl/openssl/releases/download/${DISTNAME}/
@@ -11,6 +11,8 @@ WWW= https://www.openssl.org/
LICENSE= APACHE20
LICENSE_FILE= ${WRKSRC}/LICENSE.txt
+EXPIRATION_DATE= 2026-10-22
+
CONFLICTS_INSTALL= boringssl libressl libressl-devel openssl openssl111 openssl3[1235] openssl*-quictls
HAS_CONFIGURE= yes
diff --git a/security/openssl34/distinfo b/security/openssl34/distinfo
index d8af1d8ae114..f57015331c43 100644
--- a/security/openssl34/distinfo
+++ b/security/openssl34/distinfo
@@ -1,3 +1,3 @@
-TIMESTAMP = 1739294109
-SHA256 (openssl-3.4.1.tar.gz) = 002a2d6b30b58bf4bea46c43bdd96365aaf8daa6c428782aa4feee06da197df3
-SIZE (openssl-3.4.1.tar.gz) = 18346056
+TIMESTAMP = 1751448388
+SHA256 (openssl-3.4.2.tar.gz) = 17b02459fc28be415470cccaae7434f3496cac1306b86b52c83886580e82834c
+SIZE (openssl-3.4.2.tar.gz) = 18357346
diff --git a/security/openssl35/Makefile b/security/openssl35/Makefile
index 03c8a5cf9203..f98afc6ba292 100644
--- a/security/openssl35/Makefile
+++ b/security/openssl35/Makefile
@@ -1,6 +1,5 @@
PORTNAME= openssl
-PORTVERSION= 3.5.0
-PORTREVISION= 1
+PORTVERSION= 3.5.1
CATEGORIES= security devel
PKGNAMESUFFIX= 35
MASTER_SITES= https://github.com/openssl/openssl/releases/download/${DISTNAME}/
diff --git a/security/openssl35/distinfo b/security/openssl35/distinfo
index a607cb09a0e2..dbaa6f6357a6 100644
--- a/security/openssl35/distinfo
+++ b/security/openssl35/distinfo
@@ -1,3 +1,3 @@
-TIMESTAMP = 1744140897
-SHA256 (openssl-3.5.0.tar.gz) = 344d0a79f1a9b08029b0744e2cc401a43f9c90acd1044d09a530b4885a8e9fc0
-SIZE (openssl-3.5.0.tar.gz) = 53136912
+TIMESTAMP = 1751448415
+SHA256 (openssl-3.5.1.tar.gz) = 529043b15cffa5f36077a4d0af83f3de399807181d607441d734196d889b641f
+SIZE (openssl-3.5.1.tar.gz) = 53158817
diff --git a/security/openssl35/files/patch-CVE-2025-4575 b/security/openssl35/files/patch-CVE-2025-4575
deleted file mode 100644
index 1bcec34bcb96..000000000000
--- a/security/openssl35/files/patch-CVE-2025-4575
+++ /dev/null
@@ -1,61 +0,0 @@
-From e96d22446e633d117e6c9904cb15b4693e956eaa Mon Sep 17 00:00:00 2001
-From: Tomas Mraz <tomas@openssl.org>
-Date: Tue, 20 May 2025 16:34:10 +0200
-Subject: [PATCH] apps/x509.c: Fix the -addreject option adding trust instead
- of rejection
-
-Fixes CVE-2025-4575
-
-Reviewed-by: Dmitry Belyavskiy <beldmit@gmail.com>
-Reviewed-by: Paul Dale <ppzgs1@gmail.com>
-(Merged from https://github.com/openssl/openssl/pull/27672)
-
-(cherry picked from commit 0eb9acc24febb1f3f01f0320cfba9654cf66b0ac)
----
- apps/x509.c | 2 +-
- test/recipes/25-test_x509.t | 12 +++++++++++-
- 2 files changed, 12 insertions(+), 2 deletions(-)
-
-diff --git a/apps/x509.c b/apps/x509.c
-index fdae8f383a667..0c340c15b321a 100644
---- apps/x509.c.orig
-+++ apps/x509.c
-@@ -465,7 +465,7 @@ int x509_main(int argc, char **argv)
- prog, opt_arg());
- goto opthelp;
- }
-- if (!sk_ASN1_OBJECT_push(trust, objtmp))
-+ if (!sk_ASN1_OBJECT_push(reject, objtmp))
- goto end;
- trustout = 1;
- break;
-diff --git a/test/recipes/25-test_x509.t b/test/recipes/25-test_x509.t
-index 09b61708ff8a5..dfa0a428f5f0c 100644
---- test/recipes/25-test_x509.t.orig
-+++ test/recipes/25-test_x509.t
-@@ -16,7 +16,7 @@ use OpenSSL::Test qw/:DEFAULT srctop_file/;
-
- setup("test_x509");
-
--plan tests => 134;
-+plan tests => 138;
-
- # Prevent MSys2 filename munging for arguments that look like file paths but
- # aren't
-@@ -110,6 +110,16 @@ ok(run(app(["openssl", "x509", "-new", "-force_pubkey", $key, "-subj", "/CN=EE",
- && run(app(["openssl", "verify", "-no_check_time",
- "-trusted", $ca, "-partial_chain", $caout])));
-
-+# test trust decoration
-+ok(run(app(["openssl", "x509", "-in", $ca, "-addtrust", "emailProtection",
-+ "-out", "ca-trusted.pem"])));
-+cert_contains("ca-trusted.pem", "Trusted Uses: E-mail Protection",
-+ 1, 'trusted use - E-mail Protection');
-+ok(run(app(["openssl", "x509", "-in", $ca, "-addreject", "emailProtection",
-+ "-out", "ca-rejected.pem"])));
-+cert_contains("ca-rejected.pem", "Rejected Uses: E-mail Protection",
-+ 1, 'rejected use - E-mail Protection');
-+
- subtest 'x509 -- x.509 v1 certificate' => sub {
- tconversion( -type => 'x509', -prefix => 'x509v1',
- -in => srctop_file("test", "testx509.pem") );
diff --git a/security/php85-filter/Makefile b/security/php85-filter/Makefile
new file mode 100644
index 000000000000..1d4737ba51c9
--- /dev/null
+++ b/security/php85-filter/Makefile
@@ -0,0 +1,7 @@
+CATEGORIES= security
+
+MASTERDIR= ${.CURDIR}/../../lang/php85
+
+PKGNAMESUFFIX= -filter
+
+.include "${MASTERDIR}/Makefile"
diff --git a/security/php85-sodium/Makefile b/security/php85-sodium/Makefile
new file mode 100644
index 000000000000..aff3c5308849
--- /dev/null
+++ b/security/php85-sodium/Makefile
@@ -0,0 +1,7 @@
+CATEGORIES= security
+
+MASTERDIR= ${.CURDIR}/../../lang/php85
+
+PKGNAMESUFFIX= -sodium
+
+.include "${MASTERDIR}/Makefile"
diff --git a/security/plasma6-kscreenlocker/distinfo b/security/plasma6-kscreenlocker/distinfo
index 9b45a355b193..b29b38d6d151 100644
--- a/security/plasma6-kscreenlocker/distinfo
+++ b/security/plasma6-kscreenlocker/distinfo
@@ -1,3 +1,3 @@
-TIMESTAMP = 1750789611
-SHA256 (KDE/plasma/6.4.1/kscreenlocker-6.4.1.tar.xz) = c849dc939a050a26f270393f8b59e8b86d671983a752e014af7c89a1c955b925
-SIZE (KDE/plasma/6.4.1/kscreenlocker-6.4.1.tar.xz) = 183776
+TIMESTAMP = 1751380541
+SHA256 (KDE/plasma/6.4.2/kscreenlocker-6.4.2.tar.xz) = ef2bc8c2f1f0df75c67778c4208a5ee02c0546356ef8352dd1ffdee867283cc4
+SIZE (KDE/plasma/6.4.2/kscreenlocker-6.4.2.tar.xz) = 183732
diff --git a/security/plasma6-ksshaskpass/distinfo b/security/plasma6-ksshaskpass/distinfo
index 8196ba2a8c6e..87b4a2ee1759 100644
--- a/security/plasma6-ksshaskpass/distinfo
+++ b/security/plasma6-ksshaskpass/distinfo
@@ -1,3 +1,3 @@
-TIMESTAMP = 1750789611
-SHA256 (KDE/plasma/6.4.1/ksshaskpass-6.4.1.tar.xz) = 5495db2d45f9b2ac50a81382f7e38c99ab83d7ea34adcf72b05c260d9d8a3433
-SIZE (KDE/plasma/6.4.1/ksshaskpass-6.4.1.tar.xz) = 30796
+TIMESTAMP = 1751380542
+SHA256 (KDE/plasma/6.4.2/ksshaskpass-6.4.2.tar.xz) = 6ef3811239c2ec505859f6c483927d6d69a59fbd8d6da41b385a977c231efffc
+SIZE (KDE/plasma/6.4.2/ksshaskpass-6.4.2.tar.xz) = 30792
diff --git a/security/plasma6-kwallet-pam/distinfo b/security/plasma6-kwallet-pam/distinfo
index 81c94e309bb8..3eb96bb2863b 100644
--- a/security/plasma6-kwallet-pam/distinfo
+++ b/security/plasma6-kwallet-pam/distinfo
@@ -1,3 +1,3 @@
-TIMESTAMP = 1750789612
-SHA256 (KDE/plasma/6.4.1/kwallet-pam-6.4.1.tar.xz) = 04d4d7075cb93cac10a7e0504836d961c7a2eda4f08987bb500f927200298b7c
-SIZE (KDE/plasma/6.4.1/kwallet-pam-6.4.1.tar.xz) = 22400
+TIMESTAMP = 1751380542
+SHA256 (KDE/plasma/6.4.2/kwallet-pam-6.4.2.tar.xz) = fc5578ae860d74ce7695cf0b561a72bcf4730636694d8debfc10c85e97296ae9
+SIZE (KDE/plasma/6.4.2/kwallet-pam-6.4.2.tar.xz) = 22396
diff --git a/security/rubygem-gitlab-cloud-connector/Makefile b/security/rubygem-gitlab-cloud-connector/Makefile
index b59e9cf5734e..17348ef607c0 100644
--- a/security/rubygem-gitlab-cloud-connector/Makefile
+++ b/security/rubygem-gitlab-cloud-connector/Makefile
@@ -1,5 +1,5 @@
PORTNAME= gitlab-cloud-connector
-PORTVERSION= 1.17.0
+PORTVERSION= 1.19.0
CATEGORIES= security rubygems
MASTER_SITES= RG
diff --git a/security/rubygem-gitlab-cloud-connector/distinfo b/security/rubygem-gitlab-cloud-connector/distinfo
index f3bc3876d43c..b702ac666f5a 100644
--- a/security/rubygem-gitlab-cloud-connector/distinfo
+++ b/security/rubygem-gitlab-cloud-connector/distinfo
@@ -1,3 +1,3 @@
-TIMESTAMP = 1750222196
-SHA256 (rubygem/gitlab-cloud-connector-1.17.0.gem) = b9eaf5544cebb66667be560cc032fd6e26ccb6c35c0912b3cd1fadb7cbcfbf34
-SIZE (rubygem/gitlab-cloud-connector-1.17.0.gem) = 18432
+TIMESTAMP = 1750912646
+SHA256 (rubygem/gitlab-cloud-connector-1.19.0.gem) = cfa644b4d827062f5c625d391ca3e6904e7667f0f6efe96adab81e051d8d07ad
+SIZE (rubygem/gitlab-cloud-connector-1.19.0.gem) = 18432
diff --git a/security/snort3/Makefile b/security/snort3/Makefile
index 50ff68cab2c4..833bdf00cb11 100644
--- a/security/snort3/Makefile
+++ b/security/snort3/Makefile
@@ -1,6 +1,5 @@
PORTNAME= snort
-DISTVERSION= 3.8.1.0
-PORTREVISION= 1
+DISTVERSION= 3.9.0.0
PORTEPOCH= 1
CATEGORIES= security
PKGNAMESUFFIX= 3
diff --git a/security/snort3/distinfo b/security/snort3/distinfo
index 3b5d7f18d701..043da5daa3cb 100644
--- a/security/snort3/distinfo
+++ b/security/snort3/distinfo
@@ -1,3 +1,3 @@
-TIMESTAMP = 1748521147
-SHA256 (snort3-snort3-3.8.1.0_GH0.tar.gz) = adbd958bd0f9b2c78997bfda5a36cbbc843f07a71712db0b56f085e2cd124164
-SIZE (snort3-snort3-3.8.1.0_GH0.tar.gz) = 3484205
+TIMESTAMP = 1751444666
+SHA256 (snort3-snort3-3.9.0.0_GH0.tar.gz) = a294be2921440ec39a265e770c15dc52ab011918c6fd288d99e442ceb12f961d
+SIZE (snort3-snort3-3.9.0.0_GH0.tar.gz) = 3484705
diff --git a/security/snort3/pkg-plist b/security/snort3/pkg-plist
index 5da84b8b5dd6..67291c403269 100644
--- a/security/snort3/pkg-plist
+++ b/security/snort3/pkg-plist
@@ -39,7 +39,6 @@ include/snort/flow/flow_key.h
include/snort/flow/flow_stash.h
include/snort/flow/ha.h
include/snort/flow/session.h
-include/snort/flow/stash_item.h
include/snort/flow/stream_flow.h
include/snort/framework/api_options.h
include/snort/framework/base_api.h
diff --git a/security/snuffleupagus/Makefile b/security/snuffleupagus/Makefile
index 9b113b64de11..5783534cd0a0 100644
--- a/security/snuffleupagus/Makefile
+++ b/security/snuffleupagus/Makefile
@@ -21,7 +21,7 @@ USES= localbase:ldflags php:build,ext
USE_GITHUB= yes
GH_ACCOUNT= jvoisin
USE_PHP= session:build
-IGNORE_WITH_PHP= 84
+IGNORE_WITH_PHP= 84 85
CONFIGURE_ARGS= --enable-snuffleupagus
diff --git a/security/sudo/Makefile b/security/sudo/Makefile
index 14466a9e7774..b9bea691da08 100644
--- a/security/sudo/Makefile
+++ b/security/sudo/Makefile
@@ -1,5 +1,5 @@
PORTNAME= sudo
-PORTVERSION= 1.9.17
+PORTVERSION= 1.9.17p1
CATEGORIES= security
MASTER_SITES= SUDO
diff --git a/security/sudo/distinfo b/security/sudo/distinfo
index 9b38cd2b5a6c..a01a900722c6 100644
--- a/security/sudo/distinfo
+++ b/security/sudo/distinfo
@@ -1,3 +1,3 @@
-TIMESTAMP = 1750523514
-SHA256 (sudo-1.9.17.tar.gz) = 3f212c69d534d5822b492d099abb02a593f91ca99f5afde5cb9bd3e1dcdad069
-SIZE (sudo-1.9.17.tar.gz) = 5447899
+TIMESTAMP = 1751356446
+SHA256 (sudo-1.9.17p1.tar.gz) = ff607ea717072197738a78f778692cd6df9a7e3e404565f51de063ca27455d32
+SIZE (sudo-1.9.17p1.tar.gz) = 5449076
diff --git a/security/trivy/Makefile b/security/trivy/Makefile
index 05cfa55f0b39..d208cccbab53 100644
--- a/security/trivy/Makefile
+++ b/security/trivy/Makefile
@@ -1,7 +1,6 @@
PORTNAME= trivy
DISTVERSIONPREFIX= v
-DISTVERSION= 0.63.0
-PORTREVISION= 1
+DISTVERSION= 0.64.0
CATEGORIES= security
MAINTAINER= mfechner@FreeBSD.org
diff --git a/security/trivy/distinfo b/security/trivy/distinfo
index 14015874c1c6..24ad8282e01f 100644
--- a/security/trivy/distinfo
+++ b/security/trivy/distinfo
@@ -1,5 +1,5 @@
-TIMESTAMP = 1748580283
-SHA256 (go/security_trivy/trivy-v0.63.0/v0.63.0.mod) = f0b5b8182a3155cfd22aedd2f1266794a26549664c18b8358a411ba634188fa3
-SIZE (go/security_trivy/trivy-v0.63.0/v0.63.0.mod) = 23467
-SHA256 (go/security_trivy/trivy-v0.63.0/v0.63.0.zip) = 638bc4adc54bf61afc8647c9f4fa5db30e6352dfe033655c30d0af02eca5c14d
-SIZE (go/security_trivy/trivy-v0.63.0/v0.63.0.zip) = 58804833
+TIMESTAMP = 1751363247
+SHA256 (go/security_trivy/trivy-v0.64.0/v0.64.0.mod) = 0cdadb981316deab57b0abfdca161b8a907173478b82770c901c8d58ce4a2016
+SIZE (go/security_trivy/trivy-v0.64.0/v0.64.0.mod) = 23200
+SHA256 (go/security_trivy/trivy-v0.64.0/v0.64.0.zip) = f5f0943b22846cd637d140585dd5a318e303cf0fe9f45b5f138153e2a292fc06
+SIZE (go/security_trivy/trivy-v0.64.0/v0.64.0.zip) = 58856559
diff --git a/security/vuxml/vuln/2025.xml b/security/vuxml/vuln/2025.xml
index e9e2390a00f0..fbceba5c7d7c 100644
--- a/security/vuxml/vuln/2025.xml
+++ b/security/vuxml/vuln/2025.xml
@@ -1,3 +1,254 @@
+ <vuln vid="5c777f88-40ff-4e1e-884b-ad63dfb9bb15">
+ <topic>chromium -- multiple security fixes</topic>
+ <affects>
+ <package>
+ <name>chromium</name>
+ <range><lt>138.0.7204.96</lt></range>
+ </package>
+ <package>
+ <name>ungoogled-chromium</name>
+ <range><lt>138.0.7204.96</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Chrome Releases reports:</p>
+ <blockquote cite="https://chromereleases.googleblog.com/2025/06/stable-channel-update-for-desktop_30.html">
+ <p>This update includes 1 security fix:</p>
+ <ul>
+ <li>[427663123] High CVE-2025-6554: Type Confusion in V8.</li>
+ </ul>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2025-6554</cvename>
+ <url>https://chromereleases.googleblog.com/2025/06/stable-channel-update-for-desktop_30.html</url>
+ </references>
+ <dates>
+ <discovery>2025-06-30</discovery>
+ <entry>2025-07-02</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="9c91e1f8-f255-4b57-babe-2e385558f1dc">
+ <topic>chromium -- multiple security fixes</topic>
+ <affects>
+ <package>
+ <name>chromium</name>
+ <range><lt>138.0.7204.49</lt></range>
+ </package>
+ <package>
+ <name>ungoogled-chromium</name>
+ <range><lt>138.0.7204.49</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Chrome Releases reports:</p>
+ <blockquote cite="https://chromereleases.googleblog.com/2025/06/stable-channel-update-for-desktop_24.html">
+ <p>This update includes 11 security fixes:</p>
+ <ul>
+ <li>[407328533] Medium CVE-2025-6555: Use after free in Animation. Reported by Lyra Rebane (rebane2001) on 2025-03-30</li>
+ <li>[40062462] Low CVE-2025-6556: Insufficient policy enforcement in Loader. Reported by Shaheen Fazim on 2023-01-02</li>
+ <li>[406631048] Low CVE-2025-6557: Insufficient data validation in DevTools. Reported by Ameen Basha M K on 2025-03-27</li>
+ </ul>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2025-6555</cvename>
+ <cvename>CVE-2025-6556</cvename>
+ <cvename>CVE-2025-6557</cvename>
+ <url>https://chromereleases.googleblog.com/2025/06/stable-channel-update-for-desktop_24.html</url>
+ </references>
+ <dates>
+ <discovery>2025-06-24</discovery>
+ <entry>2025-07-02</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="24f4b495-56a1-11f0-9621-93abbef07693">
+ <topic>sudo -- privilege escalation vulnerability through host and chroot options</topic>
+ <affects>
+ <package>
+ <name>sudo</name>
+ <range><lt>1.9.17p1</lt></range>
+ </package>
+ <package>
+ <name>sudo-sssd</name>
+ <range><lt>1.9.17p1</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Todd C. Miller reports, crediting Rich Mirch from Stratascale Cyber Research Unit (CRU):</p>
+ <blockquote cite="https://www.sudo.ws/releases/stable/">
+ <p>Sudo 1.9.17p1:</p>
+ <ul>
+ <li>
+ Fixed CVE-2025-32462. Sudo's -h (--host) option could be specified
+ when running a command or editing a file. This could enable a
+ local privilege escalation attack if the sudoers file allows the
+ user to run commands on a different host. For more information,
+ see Local Privilege Escalation via host option.
+ </li>
+ <li>
+ Fixed CVE-2025-32463. An attacker can leverage sudo's -R
+ (--chroot) option to run arbitrary commands as root, even if they
+ are not listed in the sudoers file. The chroot support has been
+ deprecated an will be removed entirely in a future release. For
+ more information, see Local Privilege Escalation via chroot
+ option.
+ </li>
+ </ul>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2025-32462</cvename>
+ <cvename>CVE-2025-32463</cvename>
+ <url>https://www.sudo.ws/releases/stable/</url>
+ <url>https://www.stratascale.com/vulnerability-alert-CVE-2025-32462-sudo-host</url>
+ <url>https://www.stratascale.com/vulnerability-alert-CVE-2025-32463-sudo-chroot</url>
+ </references>
+ <dates>
+ <discovery>2025-04-01</discovery>
+ <entry>2025-07-01</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="8df49466-5664-11f0-943a-18c04d5ea3dc">
+ <topic>xorg server -- Multiple vulnerabilities</topic>
+ <affects>
+ <package>
+ <name>xorg-server</name>
+ <name>xephyr</name>
+ <name>xorg-vfbserver</name>
+ <range><lt>21.1.18,1</lt></range>
+ </package>
+ <package>
+ <name>xorg-nextserver</name>
+ <range><lt>21.1.18,2</lt></range>
+ </package>
+ <package>
+ <name>xwayland</name>
+ <range><lt>24.1.8,1</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>The X.Org project reports:</p>
+ <blockquote cite="https://lists.x.org/archives/xorg-announce/2025-February/003584.html">
+ <ul>
+ <li>
+ CVE-2025-49176: Integer overflow in Big Requests Extension
+ <p>The Big Requests extension allows requests larger than the 16-bit length
+ limit.
+ It uses integers for the request length and checks for the size not to
+ exceed the maxBigRequestSize limit, but does so after translating the
+ length to integer by multiplying the given size in bytes by 4.
+ In doing so, it might overflow the integer size limit before actually
+ checking for the overflow, defeating the purpose of the test.</p>
+ </li>
+ </ul>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2025-49176</cvename>
+ <url>https://lists.x.org/archives/xorg/2025-June/062055.html</url>
+ </references>
+ <dates>
+ <discovery>2025-06-17</discovery>
+ <entry>2025-07-01</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="b14cabf7-5663-11f0-943a-18c04d5ea3dc">
+ <topic>xorg server -- Multiple vulnerabilities</topic>
+ <affects>
+ <package>
+ <name>xorg-server</name>
+ <name>xephyr</name>
+ <name>xorg-vfbserver</name>
+ <range><lt>21.1.17,1</lt></range>
+ </package>
+ <package>
+ <name>xorg-nextserver</name>
+ <range><lt>21.1.17,2</lt></range>
+ </package>
+ <package>
+ <name>xwayland</name>
+ <range><lt>24.1.7,1</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>The X.Org project reports:</p>
+ <blockquote cite="https://lists.x.org/archives/xorg-announce/2025-February/003584.html">
+ <ul>
+ <li>
+ CVE-2025-49175: Out-of-bounds access in X Rendering extension (Animated cursors)
+ <p>The X Rendering extension allows creating animated cursors providing a
+ list of cursors.
+ By default, the Xserver assumes at least one cursor is provided while a
+ client may actually pass no cursor at all, which causes an out-of-bound
+ read creating the animated cursor and a crash of the Xserver.</p>
+ </li>
+ <li>
+ CVE-2025-49177: Data leak in XFIXES Extension 6 (XFixesSetClientDisconnectMode)
+
+ <p>The handler of XFixesSetClientDisconnectMode does not check the client
+ request length.
+ A client could send a shorter request and read data from a former
+ request.</p>
+ </li>
+ <li>
+ CVE-2025-49178: Unprocessed client request via bytes to ignore
+
+ <p>When reading requests from the clients, the input buffer might be shared
+ and used between different clients.
+ If a given client sends a full request with non-zero bytes to ignore,
+ the bytes to ignore may still be non-zero even though the request is
+ full, in which case the buffer could be shared with another client who's
+ request will not be processed because of those bytes to ignore, leading
+ to a possible hang of the other client request.</p>
+ </li>
+ <li>
+ CVE-2025-49179: Integer overflow in X Record extension
+
+ <p>The RecordSanityCheckRegisterClients() function in the X Record extension
+ implementation of the Xserver checks for the request length, but does not
+ check for integer overflow.
+ A client might send a very large value for either the number of clients
+ or the number of protocol ranges that will cause an integer overflow in
+ the request length computation, defeating the check for request length.</p>
+ </li>
+ <li>
+ CVE-2025-49180: Integer overflow in RandR extension (RRChangeProviderProperty)
+
+ <p>A client might send a request causing an integer overflow when computing
+ the total size to allocate in RRChangeProviderProperty().</p>
+ </li>
+ </ul>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2025-49175</cvename>
+ <cvename>CVE-2025-49177</cvename>
+ <cvename>CVE-2025-49178</cvename>
+ <cvename>CVE-2025-49179</cvename>
+ <cvename>CVE-2025-49180</cvename>
+ <url>https://lists.x.org/archives/xorg/2025-June/062055.html</url>
+ </references>
+ <dates>
+ <discovery>2025-06-17</discovery>
+ <entry>2025-07-01</entry>
+ </dates>
+ </vuln>
+
<vuln vid="6b1b8989-55b0-11f0-ac64-589cfc10a551">
<topic>podman -- TLS connection used to pull VM images was not validated</topic>
<affects>