diff options
Diffstat (limited to '')
59 files changed, 1098 insertions, 164 deletions
diff --git a/security/Makefile b/security/Makefile index fd6b6dafa7ea..77f3408b22bf 100644 --- a/security/Makefile +++ b/security/Makefile @@ -456,6 +456,7 @@ SUBDIR += openssl31-quictls SUBDIR += openssl32 SUBDIR += openssl33 + SUBDIR += openssl33-quictls SUBDIR += openssl34 SUBDIR += openssl35 SUBDIR += openvas @@ -838,6 +839,8 @@ SUBDIR += php83-sodium SUBDIR += php84-filter SUBDIR += php84-sodium + SUBDIR += php85-filter + SUBDIR += php85-sodium SUBDIR += picocrypt SUBDIR += picosha2 SUBDIR += pidgin-encryption diff --git a/security/afl++/Makefile b/security/afl++/Makefile index 41e79b781385..6e45c1ed62e0 100644 --- a/security/afl++/Makefile +++ b/security/afl++/Makefile @@ -1,6 +1,6 @@ PORTNAME= afl DISTVERSIONPREFIX= v -DISTVERSION= 4.32c +DISTVERSION= 4.33c CATEGORIES= security PKGNAMESUFFIX= ++-${FLAVOR} diff --git a/security/afl++/distinfo b/security/afl++/distinfo index 21befac35cea..871fd6e76ebe 100644 --- a/security/afl++/distinfo +++ b/security/afl++/distinfo @@ -1,3 +1,3 @@ -TIMESTAMP = 1746197618 -SHA256 (AFLplusplus-AFLplusplus-v4.32c_GH0.tar.gz) = dc7f59a11ce8cf67a3ed09a5ac78028c6f793b239b21fd83e5b2370cea166926 -SIZE (AFLplusplus-AFLplusplus-v4.32c_GH0.tar.gz) = 3045679 +TIMESTAMP = 1751370940 +SHA256 (AFLplusplus-AFLplusplus-v4.33c_GH0.tar.gz) = 98903c8036282c8908b1d8cc0d60caf3ea259db4339503a76449b47acce58d1d +SIZE (AFLplusplus-AFLplusplus-v4.33c_GH0.tar.gz) = 3058802 diff --git a/security/aws-lc/Makefile b/security/aws-lc/Makefile index 803ea2798817..67c1020ba0f6 100644 --- a/security/aws-lc/Makefile +++ b/security/aws-lc/Makefile @@ -1,5 +1,5 @@ PORTNAME= aws-lc -PORTVERSION= 1.53.1 +PORTVERSION= 1.54.0 DISTVERSIONPREFIX= v CATEGORIES= security diff --git a/security/aws-lc/distinfo b/security/aws-lc/distinfo index 7e178c8c2194..2a7e6ae009f0 100644 --- a/security/aws-lc/distinfo +++ b/security/aws-lc/distinfo @@ -1,3 +1,3 @@ -TIMESTAMP = 1750954130 -SHA256 (aws-aws-lc-v1.53.1_GH0.tar.gz) = 74137613ea4e322600400fdc2e21c83f08f4c68d368ebe006eab264e4e685e01 -SIZE (aws-aws-lc-v1.53.1_GH0.tar.gz) = 127004586 +TIMESTAMP = 1751208136 +SHA256 (aws-aws-lc-v1.54.0_GH0.tar.gz) = d491b6d6b233e88314a15170d435e28259f7cf4f950a427acc80a0e977aa683a +SIZE (aws-aws-lc-v1.54.0_GH0.tar.gz) = 127011221 diff --git a/security/boringssl/Makefile b/security/boringssl/Makefile index d72689f75660..ca47e59e4c7d 100644 --- a/security/boringssl/Makefile +++ b/security/boringssl/Makefile @@ -1,5 +1,5 @@ PORTNAME= boringssl -PORTVERSION= 0.0.0.0.2025.06.25.01 +PORTVERSION= 0.0.0.0.2025.07.01.01 CATEGORIES= security EXTRACT_ONLY= ${GH_ACCOUNT}-${PORTNAME}-${PORTVERSION}-${GH_TAGNAME}_GH0.tar.gz @@ -19,7 +19,7 @@ CPE_VENDOR= google USE_GITHUB= yes GH_ACCOUNT= google -GH_TAGNAME= 78b48c1 +GH_TAGNAME= f3dcc46 CMAKE_ARGS+= -DBUILD_SHARED_LIBS=1 CFLAGS_i386= -msse2 diff --git a/security/boringssl/distinfo b/security/boringssl/distinfo index 64e40c2a4f5f..2e858a1aa0eb 100644 --- a/security/boringssl/distinfo +++ b/security/boringssl/distinfo @@ -1,4 +1,4 @@ -TIMESTAMP = 1750950234 +TIMESTAMP = 1751480474 SHA256 (filippo.io/edwards25519/@v/v1.1.0.zip) = 9ac43a686d06fdebd719f7af3866c87eb069302272dfb131007adf471c308b65 SIZE (filippo.io/edwards25519/@v/v1.1.0.zip) = 55809 SHA256 (filippo.io/edwards25519/@v/v1.1.0.mod) = 099556fc4d7e6f5cb135efdd8b6bb4c0932e38ea058c53fc5fa5ce285572fb61 @@ -11,5 +11,5 @@ SHA256 (golang.org/x/sys/@v/v0.32.0.zip) = 85d47075d21fd7ef35d9a47fc73f2356fb3cd SIZE (golang.org/x/sys/@v/v0.32.0.zip) = 1991164 SHA256 (golang.org/x/sys/@v/v0.32.0.mod) = f67e3e18f4c08e60a7e80726ab36b691fdcea5b81ae1c696ff64caf518bcfe3d SIZE (golang.org/x/sys/@v/v0.32.0.mod) = 35 -SHA256 (google-boringssl-0.0.0.0.2025.06.25.01-78b48c1_GH0.tar.gz) = 2cfaa5f01ecedb7d662d7b01cac6f2f5f873a52f694a44af69de9b8efcdb6e90 -SIZE (google-boringssl-0.0.0.0.2025.06.25.01-78b48c1_GH0.tar.gz) = 46168678 +SHA256 (google-boringssl-0.0.0.0.2025.07.01.01-f3dcc46_GH0.tar.gz) = b81478b62838ddaa32f4b304a39659ee4c858289263f73d52a3684364774f94e +SIZE (google-boringssl-0.0.0.0.2025.07.01.01-f3dcc46_GH0.tar.gz) = 46169690 diff --git a/security/cosign/Makefile b/security/cosign/Makefile index 50bc7042755e..25aa6f4e1082 100644 --- a/security/cosign/Makefile +++ b/security/cosign/Makefile @@ -1,6 +1,6 @@ PORTNAME= cosign DISTVERSIONPREFIX= v -DISTVERSION= 2.5.1 +DISTVERSION= 2.5.2 CATEGORIES= security MAINTAINER= bofh@FreeBSD.org @@ -23,7 +23,7 @@ GO_BUILDFLAGS= -ldflags="-buildid= \ PLIST_FILES= bin/${PORTNAME} -GIT_HASH= a7345fb2ce17b52b5bc687970fa31ff85bc2f7ca +GIT_HASH= af5a988bb15a03919ccaac7a2ddcad7a9d006f38 .include <bsd.port.pre.mk> diff --git a/security/cosign/distinfo b/security/cosign/distinfo index 6094ea46b910..621a1398dec8 100644 --- a/security/cosign/distinfo +++ b/security/cosign/distinfo @@ -1,5 +1,5 @@ -TIMESTAMP = 1751272854 -SHA256 (go/security_cosign/cosign-v2.5.1/v2.5.1.mod) = 73cd50764e440cee0dc08dd15dbe489d880980170cef56164f3f351a3c861bac -SIZE (go/security_cosign/cosign-v2.5.1/v2.5.1.mod) = 15329 -SHA256 (go/security_cosign/cosign-v2.5.1/v2.5.1.zip) = d2a7631cb2b26181682af19fc7d067da852b9edee54e3124fddcf1b82c7663d4 -SIZE (go/security_cosign/cosign-v2.5.1/v2.5.1.zip) = 1274453 +TIMESTAMP = 1751444102 +SHA256 (go/security_cosign/cosign-v2.5.2/v2.5.2.mod) = 5bc5ad2f641929f53eeb4fcec33fba55b78a51cf707f53f74feae8a0e7ad0bae +SIZE (go/security_cosign/cosign-v2.5.2/v2.5.2.mod) = 15326 +SHA256 (go/security_cosign/cosign-v2.5.2/v2.5.2.zip) = 91f0aebf97ae40581273a4e44fad958ce7ff02dd232663f9fffd074596efa82e +SIZE (go/security_cosign/cosign-v2.5.2/v2.5.2.zip) = 1274354 diff --git a/security/kanidm/Makefile b/security/kanidm/Makefile index aed265502929..e79f46fee92e 100644 --- a/security/kanidm/Makefile +++ b/security/kanidm/Makefile @@ -1,6 +1,6 @@ PORTNAME= kanidm DISTVERSIONPREFIX= v -DISTVERSION= 1.6.1 +DISTVERSION= 1.6.2 CATEGORIES= security net MAINTAINER= bofh@FreeBSD.org diff --git a/security/kanidm/Makefile.crates b/security/kanidm/Makefile.crates index ec2cd21bf07f..142b4ad552a5 100644 --- a/security/kanidm/Makefile.crates +++ b/security/kanidm/Makefile.crates @@ -651,4 +651,4 @@ CARGO_CRATES= addr2line-0.24.2 \ zxcvbn-3.1.0 \ sshkeys@git+https://github.com/Firstyear/rust-sshkeys.git?rev=3a081cbf7480628223bcb96fc8aaa8c19109d007\#3a081cbf7480628223bcb96fc8aaa8c19109d007 \ libnss@git+https://github.com/Firstyear/libnss-rs.git?branch=20250207-freebsd\#763da4beaadc1e475b89ed876de31a5e393f6d30 \ - compact_jwt@git+https://github.com/Firstyear/compact-jwt.git?rev=b3d2b5700cfe567d384c81df35d25537fbf7f110\#b3d2b5700cfe567d384c81df35d25537fbf7f110 + compact_jwt@git+https://github.com/Firstyear/compact-jwt.git?rev=043976842773dd035fe394261347edeb644e3091\#043976842773dd035fe394261347edeb644e3091 diff --git a/security/kanidm/distinfo b/security/kanidm/distinfo index 81d7c632cbe6..762a6b5cc73a 100644 --- a/security/kanidm/distinfo +++ b/security/kanidm/distinfo @@ -1,4 +1,4 @@ -TIMESTAMP = 1751273631 +TIMESTAMP = 1751446844 SHA256 (rust/crates/addr2line-0.24.2.crate) = dfbe277e56a376000877090da837660b4427aad530e3028d44e0bffe4f89a1c1 SIZE (rust/crates/addr2line-0.24.2.crate) = 39015 SHA256 (rust/crates/adler2-2.0.0.crate) = 512761e0bb2578dd7380c6baaa0f4ce03e84f95e960231d1dec8bf4d7d6e2627 @@ -1305,7 +1305,7 @@ SHA256 (Firstyear-rust-sshkeys-3a081cbf7480628223bcb96fc8aaa8c19109d007_GH0.tar. SIZE (Firstyear-rust-sshkeys-3a081cbf7480628223bcb96fc8aaa8c19109d007_GH0.tar.gz) = 31393 SHA256 (Firstyear-libnss-rs-763da4beaadc1e475b89ed876de31a5e393f6d30_GH0.tar.gz) = 0ac9d8c22288fc2d236ae447c867cfca07de5a44182631a68a96fb8587f23870 SIZE (Firstyear-libnss-rs-763da4beaadc1e475b89ed876de31a5e393f6d30_GH0.tar.gz) = 12094 -SHA256 (Firstyear-compact-jwt-b3d2b5700cfe567d384c81df35d25537fbf7f110_GH0.tar.gz) = f9308a607e2ad1755c67452f52acd1d7c0f3d30d40f15551d3e7ad3bacc4a3da -SIZE (Firstyear-compact-jwt-b3d2b5700cfe567d384c81df35d25537fbf7f110_GH0.tar.gz) = 62309 -SHA256 (kanidm-kanidm-v1.6.1_GH0.tar.gz) = 89e993c3b81720122385b82f47f04fff2acbfd5540af25b507a8cab713a70e86 -SIZE (kanidm-kanidm-v1.6.1_GH0.tar.gz) = 8649026 +SHA256 (Firstyear-compact-jwt-043976842773dd035fe394261347edeb644e3091_GH0.tar.gz) = 8ef6d8217b5cde04f624cac7eb27dd922b08aa3d815d38a11920a032115c5584 +SIZE (Firstyear-compact-jwt-043976842773dd035fe394261347edeb644e3091_GH0.tar.gz) = 62413 +SHA256 (kanidm-kanidm-v1.6.2_GH0.tar.gz) = 3283758b7c03da55d2dfc470be76d25a3fa845ed842d7196214f3f07c48ac917 +SIZE (kanidm-kanidm-v1.6.2_GH0.tar.gz) = 8649404 diff --git a/security/nettle/Makefile b/security/nettle/Makefile index 79573ea82af5..ddea868f1be1 100644 --- a/security/nettle/Makefile +++ b/security/nettle/Makefile @@ -1,5 +1,5 @@ PORTNAME= nettle -PORTVERSION= 3.10.1 +PORTVERSION= 3.10.2 CATEGORIES= security MASTER_SITES= GNU \ https://www.lysator.liu.se/~nisse/archive/ diff --git a/security/nettle/distinfo b/security/nettle/distinfo index 97625f47b80f..ceeab63d0f14 100644 --- a/security/nettle/distinfo +++ b/security/nettle/distinfo @@ -1,3 +1,3 @@ -TIMESTAMP = 1735705131 -SHA256 (nettle-3.10.1.tar.gz) = b0fcdd7fc0cdea6e80dcf1dd85ba794af0d5b4a57e26397eee3bc193272d9132 -SIZE (nettle-3.10.1.tar.gz) = 2643267 +TIMESTAMP = 1751208138 +SHA256 (nettle-3.10.2.tar.gz) = fe9ff51cb1f2abb5e65a6b8c10a92da0ab5ab6eaf26e7fc2b675c45f1fb519b5 +SIZE (nettle-3.10.2.tar.gz) = 2644644 diff --git a/security/nettle/files/extra-patch-Makefile.in b/security/nettle/files/extra-patch-Makefile.in index 2974b822043a..2c1480398adf 100644 --- a/security/nettle/files/extra-patch-Makefile.in +++ b/security/nettle/files/extra-patch-Makefile.in @@ -1,6 +1,6 @@ ---- Makefile.in.orig 2023-06-01 18:40:35 UTC +--- Makefile.in.orig 2025-06-26 18:29:02 UTC +++ Makefile.in -@@ -19,7 +19,7 @@ OPT_NETTLE_SOURCES = @OPT_NETTLE_SOURCES@ +@@ -19,7 +19,7 @@ FAT_TEST_LIST = @FAT_TEST_LIST@ FAT_TEST_LIST = @FAT_TEST_LIST@ diff --git a/security/nettle/files/patch-configure b/security/nettle/files/patch-configure index 1b8f460d9501..d210a2e1be01 100644 --- a/security/nettle/files/patch-configure +++ b/security/nettle/files/patch-configure @@ -1,6 +1,6 @@ ---- configure.orig 2023-06-01 18:40:35 UTC +--- configure.orig 2025-06-26 18:29:02 UTC +++ configure -@@ -6638,7 +6638,7 @@ $as_echo "$as_me: WARNING: Cross compiling for linux. +@@ -7532,7 +7532,7 @@ printf "%s\n" "$as_me: WARNING: Cross compiling for li # and 64-bit in lib. Don't know about "kfreebsd", does # it follow the Linux fhs conventions? *:freebsd*:32) diff --git a/security/nettle/files/patch-examples-nettle-openssl.c b/security/nettle/files/patch-examples-nettle-openssl.c index d7cf037c61c3..006e654aa899 100644 --- a/security/nettle/files/patch-examples-nettle-openssl.c +++ b/security/nettle/files/patch-examples-nettle-openssl.c @@ -1,6 +1,6 @@ ---- examples/nettle-openssl.c.orig 2021-03-21 08:32:25 UTC +--- examples/nettle-openssl.c.orig 2025-06-26 18:29:03 UTC +++ examples/nettle-openssl.c -@@ -374,6 +374,7 @@ openssl_hash_update(void *p, +@@ -291,6 +291,7 @@ openssl_hash_update(void *p, EVP_DigestUpdate(ctx->evp, src, length); } @@ -8,7 +8,7 @@ #define OPENSSL_HASH(NAME, name) \ static void \ openssl_##name##_init(void *p) \ -@@ -404,6 +405,38 @@ nettle_openssl_##name = { \ +@@ -321,6 +322,38 @@ nettle_openssl_##name = { \ openssl_hash_update, \ openssl_##name##_digest \ }; @@ -46,4 +46,4 @@ +#endif OPENSSL_HASH(MD5, md5) - OPENSSL_HASH(SHA, sha1) + OPENSSL_HASH(SHA1, sha1) diff --git a/security/nettle/files/patch-powerpc64-p8-aes-decrypt-internal.asm b/security/nettle/files/patch-powerpc64-p8-aes-decrypt-internal.asm index 67ceabec79c5..e23c8a8f6463 100644 --- a/security/nettle/files/patch-powerpc64-p8-aes-decrypt-internal.asm +++ b/security/nettle/files/patch-powerpc64-p8-aes-decrypt-internal.asm @@ -1,4 +1,4 @@ ---- powerpc64/p8/aes-decrypt-internal.asm.orig 2024-06-16 15:27:54 UTC +--- powerpc64/p8/aes-decrypt-internal.asm.orig 2025-06-26 18:29:03 UTC +++ powerpc64/p8/aes-decrypt-internal.asm @@ -64,7 +64,7 @@ PROLOGUE(_nettle_aes_decrypt) diff --git a/security/nettle/files/patch-powerpc64-p8-aes-encrypt-internal.asm b/security/nettle/files/patch-powerpc64-p8-aes-encrypt-internal.asm index 313ba61a4f6b..67218e1caaf4 100644 --- a/security/nettle/files/patch-powerpc64-p8-aes-encrypt-internal.asm +++ b/security/nettle/files/patch-powerpc64-p8-aes-encrypt-internal.asm @@ -1,6 +1,6 @@ ---- powerpc64/p8/aes-encrypt-internal.asm.orig 2022-06-02 17:57:16 UTC +--- powerpc64/p8/aes-encrypt-internal.asm.orig 2025-06-26 18:29:03 UTC +++ powerpc64/p8/aes-encrypt-internal.asm -@@ -63,7 +63,7 @@ define(`S7', `v9') +@@ -64,7 +64,7 @@ PROLOGUE(_nettle_aes_encrypt) define(`FUNC_ALIGN', `5') PROLOGUE(_nettle_aes_encrypt) @@ -9,7 +9,7 @@ subi ROUNDS,ROUNDS,1 srdi LENGTH,LENGTH,4 -@@ -328,6 +328,6 @@ EPILOGUE(_nettle_aes_encrypt) +@@ -269,6 +269,6 @@ EPILOGUE(_nettle_aes_encrypt) .data .align 4 diff --git a/security/nettle/pkg-plist b/security/nettle/pkg-plist index 25ba25f62658..48c756c49b45 100644 --- a/security/nettle/pkg-plist +++ b/security/nettle/pkg-plist @@ -79,11 +79,11 @@ include/nettle/yarrow.h lib/libhogweed.a lib/libhogweed.so lib/libhogweed.so.6 -lib/libhogweed.so.6.10 +lib/libhogweed.so.6.11 lib/libnettle.a lib/libnettle.so lib/libnettle.so.8 -lib/libnettle.so.8.10 +lib/libnettle.so.8.11 libdata/pkgconfig/hogweed.pc libdata/pkgconfig/nettle.pc %%PORTDOCS%%%%DOCSDIR%%/NEWS diff --git a/security/nss/Makefile b/security/nss/Makefile index 9078124dc1b9..b99ebcb77547 100644 --- a/security/nss/Makefile +++ b/security/nss/Makefile @@ -1,5 +1,5 @@ PORTNAME= nss -PORTVERSION= 3.113 +PORTVERSION= 3.113.1 CATEGORIES= security MASTER_SITES= MOZILLA/security/${PORTNAME}/releases/${DISTNAME:tu:C/[-.]/_/g}_RTM/src diff --git a/security/nss/distinfo b/security/nss/distinfo index 1b9b86ef2940..fe38e674c30a 100644 --- a/security/nss/distinfo +++ b/security/nss/distinfo @@ -1,3 +1,3 @@ -TIMESTAMP = 1750348960 -SHA256 (nss-3.113.tar.gz) = acef06b512d3bd81c87a63b3c8653d258bb689d2191fc0e64decf5a1efa01c0f -SIZE (nss-3.113.tar.gz) = 76625834 +TIMESTAMP = 1751391207 +SHA256 (nss-3.113.1.tar.gz) = b8c586cc0ac60b76477f62483f664f119c26000a8189dd9ef417df7dbd33a2cc +SIZE (nss-3.113.1.tar.gz) = 76626220 diff --git a/security/openssl/Makefile b/security/openssl/Makefile index 863590936744..0c43cf9a6808 100644 --- a/security/openssl/Makefile +++ b/security/openssl/Makefile @@ -1,5 +1,5 @@ PORTNAME= openssl -PORTVERSION= 3.0.16 +PORTVERSION= 3.0.17 PORTEPOCH= 1 CATEGORIES= security devel MASTER_SITES= https://github.com/openssl/openssl/releases/download/${DISTNAME}/ diff --git a/security/openssl/distinfo b/security/openssl/distinfo index a995eee15899..110c105d736f 100644 --- a/security/openssl/distinfo +++ b/security/openssl/distinfo @@ -1,3 +1,3 @@ -TIMESTAMP = 1739293708 -SHA256 (openssl-3.0.16.tar.gz) = 57e03c50feab5d31b152af2b764f10379aecd8ee92f16c985983ce4a99f7ef86 -SIZE (openssl-3.0.16.tar.gz) = 15334967 +TIMESTAMP = 1751448128 +SHA256 (openssl-3.0.17.tar.gz) = dfdd77e4ea1b57ff3a6dbde6b0bdc3f31db5ac99e7fdd4eaf9e1fbb6ec2db8ce +SIZE (openssl-3.0.17.tar.gz) = 15344831 diff --git a/security/openssl31-quictls/Makefile b/security/openssl31-quictls/Makefile index 68804cb00ff3..f6b137be1d18 100644 --- a/security/openssl31-quictls/Makefile +++ b/security/openssl31-quictls/Makefile @@ -10,10 +10,13 @@ MAINTAINER= brnrd@FreeBSD.org COMMENT= QUIC capable fork of OpenSSL WWW= https://www.github.com/quictls/openssl +DEPRECATED= End-of-Life, please switch to security/quictls or OpenSSL 3.5 +EXPIRATION_DATE= 2025-03-14 + LICENSE= APACHE20 LICENSE_FILE= ${WRKSRC}/LICENSE.txt -CONFLICTS_INSTALL= boringssl libressl libressl-devel openssl openssl111 openssl3* openssl-quictls +CONFLICTS_INSTALL= boringssl libressl libressl-devel openssl openssl111 openssl3* openssl-quictls openssl33-quictls BROKEN_i386= ld: error: undefined symbol: __atomic_is_lock_free diff --git a/security/openssl31/Makefile b/security/openssl31/Makefile index 3f98568e46a7..4ef745ce5e89 100644 --- a/security/openssl31/Makefile +++ b/security/openssl31/Makefile @@ -11,7 +11,8 @@ WWW= https://www.openssl.org/ LICENSE= APACHE20 LICENSE_FILE= ${WRKSRC}/LICENSE.txt -#EXPIRATION_DATE= 2025-03-14 +DEPRECECATED= End-of-Life, will be removed when new vulnerabilities are reported or at end of quarter. Upgrade to security/openssl35 latest LTS. +EXPIRATION_DATE= 2025-03-14 CONFLICTS_INSTALL= boringssl libressl libressl-devel openssl openssl111 openssl3[2345] openssl*-quictls diff --git a/security/openssl32/Makefile b/security/openssl32/Makefile index ae59b26936e6..597dd245415c 100644 --- a/security/openssl32/Makefile +++ b/security/openssl32/Makefile @@ -1,5 +1,5 @@ PORTNAME= openssl -PORTVERSION= 3.2.4 +PORTVERSION= 3.2.5 CATEGORIES= security devel PKGNAMESUFFIX= 32 MASTER_SITES= https://github.com/openssl/openssl/releases/download/${DISTNAME}/ @@ -11,6 +11,8 @@ WWW= https://www.openssl.org/ LICENSE= APACHE20 LICENSE_FILE= ${WRKSRC}/LICENSE.txt +EXPIRATION_DATE= 2025-11-23 + CONFLICTS_INSTALL= boringssl libressl libressl-devel openssl openssl111 openssl3[1345] openssl*-quictls HAS_CONFIGURE= yes diff --git a/security/openssl32/distinfo b/security/openssl32/distinfo index 24e08af5bfb9..a79020e9f3da 100644 --- a/security/openssl32/distinfo +++ b/security/openssl32/distinfo @@ -1,3 +1,3 @@ -TIMESTAMP = 1739293970 -SHA256 (openssl-3.2.4.tar.gz) = b23ad7fd9f73e43ad1767e636040e88ba7c9e5775bfa5618436a0dd2c17c3716 -SIZE (openssl-3.2.4.tar.gz) = 17782746 +TIMESTAMP = 1751448354 +SHA256 (openssl-3.2.5.tar.gz) = b36347d024a0f5bd09fefcd6af7a58bb30946080eb8ce8f7be78562190d09879 +SIZE (openssl-3.2.5.tar.gz) = 17800797 diff --git a/security/openssl33-quictls/Makefile b/security/openssl33-quictls/Makefile new file mode 100644 index 000000000000..4d53a2b5a87d --- /dev/null +++ b/security/openssl33-quictls/Makefile @@ -0,0 +1,190 @@ +PORTNAME= openssl +DISTVERSIONPREFIX= ${PORTNAME}- +PORTVERSION= 3.3.0 +CATEGORIES= security devel +PKGNAMESUFFIX= 33-quictls + +MAINTAINER= brnrd@FreeBSD.org +COMMENT= QUIC capable fork of OpenSSL +WWW= https://www.github.com/quictls/quictls + +LICENSE= APACHE20 +LICENSE_FILE= ${WRKSRC}/LICENSE.txt + +CONFLICTS_INSTALL= boringssl libressl libressl-devel openssl openssl111 openssl3* openssl*-quictls + +BROKEN_i386= ld: error: undefined symbol: __atomic_is_lock_free + +HAS_CONFIGURE= yes +CONFIGURE_SCRIPT= config +CONFIGURE_ENV= PERL="${PERL}" +CONFIGURE_ARGS= --openssldir=${OPENSSLDIR} \ + --prefix=${PREFIX} + +USES= cpe perl5 +USE_PERL5= build +USE_GITHUB= yes +GH_ACCOUNT= quictls +GH_PROJECT= quictls + +TEST_TARGET= test + +LDFLAGS_i386= -Wl,-znotext + +MAKE_ARGS+= WHOLE_ARCHIVE_FLAG=--whole-archive CNF_LDFLAGS="${LDFLAGS}" +MAKE_ENV+= LIBRPATH="${PREFIX}/lib" GREP_OPTIONS= + +EXTRA_PATCHES+= ${.CURDIR}/../openssl/files/patch-crypto_async_arch_async__posix.h + +OPTIONS_GROUP= CIPHERS HASHES MODULES OPTIMIZE PROTOCOLS +OPTIONS_GROUP_CIPHERS= ARIA DES GOST IDEA SM4 RC2 RC4 RC5 WEAK-SSL-CIPHERS +OPTIONS_GROUP_HASHES= MD2 MD4 MDC2 RMD160 SM2 SM3 +OPTIONS_GROUP_OPTIMIZE= ASM SSE2 THREADS +OPTIONS_GROUP_MODULES= FIPS LEGACY +OPTIONS_DEFINE_i386= I386 +OPTIONS_GROUP_PROTOCOLS=NEXTPROTONEG SCTP SSL3 TLS1 TLS1_1 TLS1_2 + +OPTIONS_DEFINE= ASYNC CT MAN3 RFC3779 SHARED ZLIB + +OPTIONS_DEFAULT=ASM ASYNC CT DES EC FIPS GOST MAN3 MD4 NEXTPROTONEG \ + RC2 RC4 RMD160 SCTP SHARED SSE2 THREADS TLS1 TLS1_1 TLS1_2 + +OPTIONS_EXCLUDE_i386= FIPS + +OPTIONS_GROUP_OPTIMIZE_amd64= EC + +.if ${MACHINE_ARCH} == "amd64" +OPTIONS_GROUP_OPTIMIZE+= EC +.elif ${MACHINE_ARCH} == "mips64el" +OPTIONS_GROUP_OPTIMIZE+= EC +.endif + +OPTIONS_SUB= yes + +ARIA_DESC= ARIA (South Korean standard) +ASM_DESC= Assembler code +ASYNC_DESC= Asynchronous mode +CIPHERS_DESC= Block Cipher Support +CT_DESC= Certificate Transparency Support +DES_DESC= (Triple) Data Encryption Standard +EC_DESC= Optimize NIST elliptic curves +FIPS_DESC= Build FIPS provider (Note: NOT yet FIPS validated) +GOST_DESC= GOST (Russian standard) +HASHES_DESC= Hash Function Support +I386_DESC= i386 (instead of i486+) +IDEA_DESC= International Data Encryption Algorithm +LEGACY_DESC= Older algorithms +MAN3_DESC= Install API manpages (section 3, 7) +MD2_DESC= MD2 (obsolete) (requires LEGACY) +MD4_DESC= MD4 (unsafe) +MDC2_DESC= MDC-2 (patented, requires DES) +MODULES_DESC= Provider modules +NEXTPROTONEG_DESC= Next Protocol Negotiation (SPDY) +OPTIMIZE_DESC= Optimizations +PROTOCOLS_DESC= Protocol Support +RC2_DESC= RC2 (unsafe) +RC4_DESC= RC4 (unsafe) +RC5_DESC= RC5 (patented) +RMD160_DESC= RIPEMD-160 +RFC3779_DESC= RFC3779 support (BGP) +SCTP_DESC= SCTP (Stream Control Transmission) +SHARED_DESC= Build shared libraries +SM2_DESC= SM2 Elliptic Curve DH (Chinese standard) +SM3_DESC= SM3 256bit (Chinese standard) +SM4_DESC= SM4 128bit (Chinese standard) +SSE2_DESC= Runtime SSE2 detection +SSL3_DESC= SSLv3 (unsafe) +TLS1_DESC= TLSv1.0 (requires TLS1_1, TLS1_2) +TLS1_1_DESC= TLSv1.1 (requires TLS1_2) +TLS1_2_DESC= TLSv1.2 +WEAK-SSL-CIPHERS_DESC= Weak cipher support (unsafe) + +# Upstream default disabled options +.for _option in fips md2 ktls rc5 sctp ssl3 weak-ssl-ciphers zlib +${_option:tu}_CONFIGURE_ON= enable-${_option} +.endfor + +# Upstream default enabled options +.for _option in aria asm async ct des gost idea md4 mdc2 legacy \ + nextprotoneg rc2 rc4 rfc3779 rmd160 shared sm2 sm3 sm4 sse2 \ + threads tls1 tls1_1 tls1_2 +${_option:tu}_CONFIGURE_OFF= no-${_option} +.endfor + +MD2_IMPLIES= LEGACY +MDC2_IMPLIES= DES +TLS1_IMPLIES= TLS1_1 +TLS1_1_IMPLIES= TLS1_2 + +EC_CONFIGURE_ON= enable-ec_nistp_64_gcc_128 +FIPS_VARS= shlibs+=lib/ossl-modules/fips.so +I386_CONFIGURE_ON= 386 +LEGACY_VARS= shlibs+=lib/ossl-modules/legacy.so +MAN3_EXTRA_PATCHES_OFF= ${FILESDIR}/extra-patch-util_find-doc-nits +SHARED_MAKE_ENV= SHLIBVER=${OPENSSL_SHLIBVER} +SHARED_PLIST_SUB= SHLIBVER=${OPENSSL_SHLIBVER} +SHARED_USE= ldconfig=yes +SHARED_VARS= shlibs+="lib/libcrypto.so.${OPENSSL_SHLIBVER} \ + lib/libssl.so.${OPENSSL_SHLIBVER} \ + lib/engines-${OPENSSL_SHLIBVER}/capi.so \ + lib/engines-${OPENSSL_SHLIBVER}/devcrypto.so \ + lib/engines-${OPENSSL_SHLIBVER}/padlock.so" +SSL3_CONFIGURE_ON+= enable-ssl3-method +ZLIB_CONFIGURE_ON= zlib-dynamic + +SHLIBS= lib/engines-${OPENSSL_SHLIBVER}/loader_attic.so + +PORTSCOUT= limit:^${DISTVERSION:R:S/./\./g}\. + +.include <bsd.port.options.mk> + +.if ${ARCH} == powerpc64 +CONFIGURE_ARGS+= BSD-ppc64 +.elif ${ARCH} == powerpc64le +CONFIGURE_ARGS+= BSD-ppc64le +.elif ${ARCH} == riscv64 +CONFIGURE_ARGS+= BSD-riscv64 +.endif + +.include <bsd.port.pre.mk> +.if ${PREFIX} == /usr +IGNORE= the OpenSSL port can not be installed over the base version +.endif + +OPENSSLDIR?= ${PREFIX}/openssl +PLIST_SUB+= OPENSSLDIR=${OPENSSLDIR:S=^${PREFIX}/==} + +.include "version.mk" + +post-patch: + ${REINPLACE_CMD} -Ee 's|^MANDIR=.*$$|MANDIR=$$(INSTALLTOP)/share/man|' \ + -e 's|^(build\|install)_docs: .*|\1_docs: \1_man_docs|' \ + ${WRKSRC}/Configurations/unix-Makefile.tmpl + ${REINPLACE_CMD} 's|SHLIB_VERSION=3|SHLIB_VERSION=${OPENSSL_SHLIBVER}|' \ + ${WRKSRC}/VERSION.dat + +post-configure: + ( cd ${WRKSRC} ; ${PERL} configdata.pm --dump ) + +post-configure-MAN3-off: + ${REINPLACE_CMD} \ + -e 's|^build_man_docs:.*|build_man_docs: $$(MANDOCS1) $$(MANDOCS5)|' \ + -e 's|dummy $$(MANDOCS[37]); do |dummy; do |' \ + ${WRKSRC}/Makefile + +post-install-SHARED-on: +.for i in ${SHLIBS} + -@${STRIP_CMD} ${STAGEDIR}${PREFIX}/$i +.endfor + +post-install-SHARED-off: + ${RMDIR} ${STAGEDIR}${PREFIX}/lib/engines-${OPENSSL_SHLIBVER} + +post-install: + ${STRIP_CMD} ${STAGEDIR}${PREFIX}/bin/openssl + +post-install-MAN3-on: + ( cd ${STAGEDIR}/${PREFIX} ; find share/man/man3 -not -type d ; \ + find share/man/man7 -not -type d ) | sed 's/$$/.gz/' >> ${TMPPLIST} + +.include <bsd.port.post.mk> diff --git a/security/openssl33-quictls/distinfo b/security/openssl33-quictls/distinfo new file mode 100644 index 000000000000..4003eb7cc283 --- /dev/null +++ b/security/openssl33-quictls/distinfo @@ -0,0 +1,3 @@ +TIMESTAMP = 1751486314 +SHA256 (quictls-quictls-openssl-3.3.0_GH0.tar.gz) = ff194511e53c0bead06d316e6891deebb07e3713efc65ef938e22962a43579a4 +SIZE (quictls-quictls-openssl-3.3.0_GH0.tar.gz) = 18220759 diff --git a/security/openssl33-quictls/files/extra-patch-util_find-doc-nits b/security/openssl33-quictls/files/extra-patch-util_find-doc-nits new file mode 100644 index 000000000000..947f7447a445 --- /dev/null +++ b/security/openssl33-quictls/files/extra-patch-util_find-doc-nits @@ -0,0 +1,20 @@ +--- util/find-doc-nits.orig 2023-08-03 13:45:48 UTC ++++ util/find-doc-nits +@@ -80,7 +80,7 @@ my $temp = '/tmp/docnits.txt'; + my $OUT; + my $status = 0; + +-$opt_m = "man1,man3,man5,man7" unless $opt_m; ++$opt_m = "man1,man5" unless $opt_m; + die "Argument of -m option may contain only man1, man3, man5, and/or man7" + unless $opt_m =~ /^(man[1357][, ]?)*$/; + my @sections = ( split /[, ]/, $opt_m ); +@@ -725,7 +725,7 @@ sub check { + next if $target eq ''; # Skip if links within page, or + next if $target =~ /::/; # links to a Perl module, or + next if $target =~ /^https?:/; # is a URL link, or +- next if $target =~ /\([1357]\)$/; # it has a section ++ next if $target =~ /\([15]\)$/; # it has a section + err($id, "Missing man section number (likely, $mansect) in L<$target>") + } + # Check for proper links to commands. diff --git a/security/openssl33-quictls/files/patch-CVE-2024-9143 b/security/openssl33-quictls/files/patch-CVE-2024-9143 new file mode 100644 index 000000000000..f36b97f194f7 --- /dev/null +++ b/security/openssl33-quictls/files/patch-CVE-2024-9143 @@ -0,0 +1,198 @@ +From fdf6723362ca51bd883295efe206cb5b1cfa5154 Mon Sep 17 00:00:00 2001 +From: Viktor Dukhovni <viktor@openssl.org> +Date: Thu, 19 Sep 2024 01:02:40 +1000 +Subject: [PATCH] Harden BN_GF2m_poly2arr against misuse. + +The BN_GF2m_poly2arr() function converts characteristic-2 field +(GF_{2^m}) Galois polynomials from a representation as a BIGNUM bitmask, +to a compact array with just the exponents of the non-zero terms. + +These polynomials are then used in BN_GF2m_mod_arr() to perform modular +reduction. A precondition of calling BN_GF2m_mod_arr() is that the +polynomial must have a non-zero constant term (i.e. the array has `0` as +its final element). + +Internally, callers of BN_GF2m_poly2arr() did not verify that +precondition, and binary EC curve parameters with an invalid polynomial +could lead to out of bounds memory reads and writes in BN_GF2m_mod_arr(). + +The precondition is always true for polynomials that arise from the +standard form of EC parameters for characteristic-two fields (X9.62). +See the "Finite Field Identification" section of: + + https://www.itu.int/ITU-T/formal-language/itu-t/x/x894/2018-cor1/ANSI-X9-62.html + +The OpenSSL GF(2^m) code supports only the trinomial and pentanomial +basis X9.62 forms. + +This commit updates BN_GF2m_poly2arr() to return `0` (failure) when +the constant term is zero (i.e. the input bitmask BIGNUM is not odd). + +Additionally, the return value is made unambiguous when there is not +enough space to also pad the array with a final `-1` sentinel value. +The return value is now always the number of elements (including the +final `-1`) that would be filled when the output array is sufficiently +large. Previously the same count was returned both when the array has +just enough room for the final `-1` and when it had only enough space +for non-sentinel values. + +Finally, BN_GF2m_poly2arr() is updated to reject polynomials whose +degree exceeds `OPENSSL_ECC_MAX_FIELD_BITS`, this guards against +CPU exhausition attacks via excessively large inputs. + +The above issues do not arise in processing X.509 certificates. These +generally have EC keys from "named curves", and RFC5840 (Section 2.1.1) +disallows explicit EC parameters. The TLS code in OpenSSL enforces this +constraint only after the certificate is decoded, but, even if explicit +parameters are specified, they are in X9.62 form, which cannot represent +problem values as noted above. + +Initially reported as oss-fuzz issue 71623. + +A closely related issue was earlier reported in +<https://github.com/openssl/openssl/issues/19826>. + +Severity: Low, CVE-2024-9143 + +Reviewed-by: Matt Caswell <matt@openssl.org> +Reviewed-by: Bernd Edlinger <bernd.edlinger@hotmail.de> +Reviewed-by: Paul Dale <ppzgs1@gmail.com> +Reviewed-by: Tomas Mraz <tomas@openssl.org> +(Merged from https://github.com/openssl/openssl/pull/25639) + +(cherry picked from commit 8e008cb8b23ec7dc75c45a66eeed09c815b11cd2) +--- + crypto/bn/bn_gf2m.c | 28 +++++++++++++++------- + test/ec_internal_test.c | 51 +++++++++++++++++++++++++++++++++++++++++ + 2 files changed, 71 insertions(+), 8 deletions(-) + +diff --git a/crypto/bn/bn_gf2m.c b/crypto/bn/bn_gf2m.c +index c811ae82d6b15..bcc66613cc14d 100644 +--- crypto/bn/bn_gf2m.c.orig ++++ crypto/bn/bn_gf2m.c +@@ -15,6 +15,7 @@ + #include "bn_local.h" + + #ifndef OPENSSL_NO_EC2M ++# include <openssl/ec.h> + + /* + * Maximum number of iterations before BN_GF2m_mod_solve_quad_arr should +@@ -1140,16 +1141,26 @@ int BN_GF2m_mod_solve_quad(BIGNUM *r, const BIGNUM *a, const BIGNUM *p, + /* + * Convert the bit-string representation of a polynomial ( \sum_{i=0}^n a_i * + * x^i) into an array of integers corresponding to the bits with non-zero +- * coefficient. Array is terminated with -1. Up to max elements of the array +- * will be filled. Return value is total number of array elements that would +- * be filled if array was large enough. ++ * coefficient. The array is intended to be suitable for use with ++ * `BN_GF2m_mod_arr()`, and so the constant term of the polynomial must not be ++ * zero. This translates to a requirement that the input BIGNUM `a` is odd. ++ * ++ * Given sufficient room, the array is terminated with -1. Up to max elements ++ * of the array will be filled. ++ * ++ * The return value is total number of array elements that would be filled if ++ * array was large enough, including the terminating `-1`. It is `0` when `a` ++ * is not odd or the constant term is zero contrary to requirement. ++ * ++ * The return value is also `0` when the leading exponent exceeds ++ * `OPENSSL_ECC_MAX_FIELD_BITS`, this guards against CPU exhaustion attacks, + */ + int BN_GF2m_poly2arr(const BIGNUM *a, int p[], int max) + { + int i, j, k = 0; + BN_ULONG mask; + +- if (BN_is_zero(a)) ++ if (!BN_is_odd(a)) + return 0; + + for (i = a->top - 1; i >= 0; i--) { +@@ -1167,12 +1178,13 @@ int BN_GF2m_poly2arr(const BIGNUM *a, int p[], int max) + } + } + +- if (k < max) { ++ if (k > 0 && p[0] > OPENSSL_ECC_MAX_FIELD_BITS) ++ return 0; ++ ++ if (k < max) + p[k] = -1; +- k++; +- } + +- return k; ++ return k + 1; + } + + /* +diff --git a/test/ec_internal_test.c b/test/ec_internal_test.c +index 8c2cd05631696..02cfd4e9d8858 100644 +--- test/ec_internal_test.c.orig ++++ test/ec_internal_test.c +@@ -155,6 +155,56 @@ static int field_tests_ecp_mont(void) + } + + #ifndef OPENSSL_NO_EC2M ++/* Test that decoding of invalid GF2m field parameters fails. */ ++static int ec2m_field_sanity(void) ++{ ++ int ret = 0; ++ BN_CTX *ctx = BN_CTX_new(); ++ BIGNUM *p, *a, *b; ++ EC_GROUP *group1 = NULL, *group2 = NULL, *group3 = NULL; ++ ++ TEST_info("Testing GF2m hardening\n"); ++ ++ BN_CTX_start(ctx); ++ p = BN_CTX_get(ctx); ++ a = BN_CTX_get(ctx); ++ if (!TEST_ptr(b = BN_CTX_get(ctx)) ++ || !TEST_true(BN_one(a)) ++ || !TEST_true(BN_one(b))) ++ goto out; ++ ++ /* Even pentanomial value should be rejected */ ++ if (!TEST_true(BN_set_word(p, 0xf2))) ++ goto out; ++ if (!TEST_ptr_null(group1 = EC_GROUP_new_curve_GF2m(p, a, b, ctx))) ++ TEST_error("Zero constant term accepted in GF2m polynomial"); ++ ++ /* Odd hexanomial should also be rejected */ ++ if (!TEST_true(BN_set_word(p, 0xf3))) ++ goto out; ++ if (!TEST_ptr_null(group2 = EC_GROUP_new_curve_GF2m(p, a, b, ctx))) ++ TEST_error("Hexanomial accepted as GF2m polynomial"); ++ ++ /* Excessive polynomial degree should also be rejected */ ++ if (!TEST_true(BN_set_word(p, 0x71)) ++ || !TEST_true(BN_set_bit(p, OPENSSL_ECC_MAX_FIELD_BITS + 1))) ++ goto out; ++ if (!TEST_ptr_null(group3 = EC_GROUP_new_curve_GF2m(p, a, b, ctx))) ++ TEST_error("GF2m polynomial degree > %d accepted", ++ OPENSSL_ECC_MAX_FIELD_BITS); ++ ++ ret = group1 == NULL && group2 == NULL && group3 == NULL; ++ ++ out: ++ EC_GROUP_free(group1); ++ EC_GROUP_free(group2); ++ EC_GROUP_free(group3); ++ BN_CTX_end(ctx); ++ BN_CTX_free(ctx); ++ ++ return ret; ++} ++ + /* test EC_GF2m_simple_method directly */ + static int field_tests_ec2_simple(void) + { +@@ -443,6 +493,7 @@ int setup_tests(void) + ADD_TEST(field_tests_ecp_simple); + ADD_TEST(field_tests_ecp_mont); + #ifndef OPENSSL_NO_EC2M ++ ADD_TEST(ec2m_field_sanity); + ADD_TEST(field_tests_ec2_simple); + #endif + ADD_ALL_TESTS(field_tests_default, crv_len); diff --git a/security/openssl33-quictls/pkg-descr b/security/openssl33-quictls/pkg-descr new file mode 100644 index 000000000000..0373df3f0b26 --- /dev/null +++ b/security/openssl33-quictls/pkg-descr @@ -0,0 +1,8 @@ +This is a fork of OpenSSL to enable QUIC. This fork adds API that can be +used by QUIC implementations for connection handshakes. + +There is a community need for a QUIC capable TLS library. This fork is +intended as stopgap solution to enable higher level frameworks and runtimes +to use QUIC with the proven and reliable TLS functionality from OpenSSL. +This fork will be maintained until OpenSSL officially provides reasonable +support for QUIC implementations. diff --git a/security/openssl33-quictls/pkg-message b/security/openssl33-quictls/pkg-message new file mode 100644 index 000000000000..7cd49c285a43 --- /dev/null +++ b/security/openssl33-quictls/pkg-message @@ -0,0 +1,20 @@ +[ +{ type: install + message: <<EOM + +This QUIC capable OpenSSL fork is in an ALPHA stage + +Do NOT use for production! + +EOM +} +{ type: upgrade + message: <<EOM + +This QUIC capable OpenSSL fork is in an ALPHA stage + +Do NOT use for production! + +EOM +} +] diff --git a/security/openssl33-quictls/pkg-plist b/security/openssl33-quictls/pkg-plist new file mode 100644 index 000000000000..3e3f644f4a2c --- /dev/null +++ b/security/openssl33-quictls/pkg-plist @@ -0,0 +1,281 @@ +bin/c_rehash +bin/openssl +include/openssl/aes.h +include/openssl/asn1.h +include/openssl/asn1_mac.h +include/openssl/asn1err.h +include/openssl/asn1t.h +include/openssl/async.h +include/openssl/asyncerr.h +include/openssl/bio.h +include/openssl/bioerr.h +include/openssl/blowfish.h +include/openssl/bn.h +include/openssl/bnerr.h +include/openssl/buffer.h +include/openssl/buffererr.h +include/openssl/camellia.h +include/openssl/cast.h +include/openssl/cmac.h +include/openssl/cmp.h +include/openssl/cmp_util.h +include/openssl/cmperr.h +include/openssl/cms.h +include/openssl/cmserr.h +include/openssl/comp.h +include/openssl/comperr.h +include/openssl/conf.h +include/openssl/conf_api.h +include/openssl/conferr.h +include/openssl/configuration.h +include/openssl/conftypes.h +include/openssl/core.h +include/openssl/core_dispatch.h +include/openssl/core_names.h +include/openssl/core_object.h +include/openssl/crmf.h +include/openssl/crmferr.h +include/openssl/crypto.h +include/openssl/cryptoerr.h +include/openssl/cryptoerr_legacy.h +include/openssl/ct.h +include/openssl/cterr.h +include/openssl/decoder.h +include/openssl/decodererr.h +include/openssl/des.h +include/openssl/dh.h +include/openssl/dherr.h +include/openssl/dsa.h +include/openssl/dsaerr.h +include/openssl/dtls1.h +include/openssl/e_os2.h +include/openssl/e_ostime.h +include/openssl/ebcdic.h +include/openssl/ec.h +include/openssl/ecdh.h +include/openssl/ecdsa.h +include/openssl/ecerr.h +include/openssl/encoder.h +include/openssl/encodererr.h +include/openssl/engine.h +include/openssl/engineerr.h +include/openssl/err.h +include/openssl/ess.h +include/openssl/esserr.h +include/openssl/evp.h +include/openssl/evperr.h +include/openssl/fips_names.h +include/openssl/fipskey.h +include/openssl/hmac.h +include/openssl/hpke.h +include/openssl/http.h +include/openssl/httperr.h +include/openssl/idea.h +include/openssl/kdf.h +include/openssl/kdferr.h +include/openssl/lhash.h +include/openssl/macros.h +include/openssl/md2.h +include/openssl/md4.h +include/openssl/md5.h +include/openssl/mdc2.h +include/openssl/modes.h +include/openssl/obj_mac.h +include/openssl/objects.h +include/openssl/objectserr.h +include/openssl/ocsp.h +include/openssl/ocsperr.h +include/openssl/opensslconf.h +include/openssl/opensslv.h +include/openssl/ossl_typ.h +include/openssl/param_build.h +include/openssl/params.h +include/openssl/pem.h +include/openssl/pem2.h +include/openssl/pemerr.h +include/openssl/pkcs12.h +include/openssl/pkcs12err.h +include/openssl/pkcs7.h +include/openssl/pkcs7err.h +include/openssl/prov_ssl.h +include/openssl/proverr.h +include/openssl/provider.h +include/openssl/quic.h +include/openssl/rand.h +include/openssl/randerr.h +include/openssl/rc2.h +include/openssl/rc4.h +include/openssl/rc5.h +include/openssl/ripemd.h +include/openssl/rsa.h +include/openssl/rsaerr.h +include/openssl/safestack.h +include/openssl/seed.h +include/openssl/self_test.h +include/openssl/sha.h +include/openssl/srp.h +include/openssl/srtp.h +include/openssl/ssl.h +include/openssl/ssl2.h +include/openssl/ssl3.h +include/openssl/sslerr.h +include/openssl/sslerr_legacy.h +include/openssl/stack.h +include/openssl/store.h +include/openssl/storeerr.h +include/openssl/symhacks.h +include/openssl/thread.h +include/openssl/tls1.h +include/openssl/trace.h +include/openssl/ts.h +include/openssl/tserr.h +include/openssl/txt_db.h +include/openssl/types.h +include/openssl/ui.h +include/openssl/uierr.h +include/openssl/whrlpool.h +include/openssl/x509.h +include/openssl/x509_vfy.h +include/openssl/x509err.h +include/openssl/x509v3.h +include/openssl/x509v3err.h +lib/cmake/OpenSSL/OpenSSLConfig.cmake +lib/cmake/OpenSSL/OpenSSLConfigVersion.cmake +%%SHARED%%lib/engines-%%SHLIBVER%%/capi.so +%%SHARED%%lib/engines-%%SHLIBVER%%/devcrypto.so +%%SHARED%%lib/engines-%%SHLIBVER%%/loader_attic.so +%%SHARED%%lib/engines-%%SHLIBVER%%/padlock.so +lib/libcrypto.a +%%SHARED%%lib/libcrypto.so +%%SHARED%%lib/libcrypto.so.%%SHLIBVER%% +lib/libssl.a +%%SHARED%%lib/libssl.so +%%SHARED%%lib/libssl.so.%%SHLIBVER%% +%%FIPS%%%%SHARED%%lib/ossl-modules/fips.so +%%LEGACY%%%%SHARED%%lib/ossl-modules/legacy.so +libdata/pkgconfig/libcrypto.pc +libdata/pkgconfig/libssl.pc +libdata/pkgconfig/openssl.pc +share/man/man1/CA.pl.1ossl.gz +share/man/man1/asn1parse.1ossl.gz +share/man/man1/c_rehash.1ossl.gz +share/man/man1/ca.1ossl.gz +share/man/man1/ciphers.1ossl.gz +share/man/man1/cms.1ossl.gz +share/man/man1/cmp.1ossl.gz +share/man/man1/crl.1ossl.gz +share/man/man1/crl2pkcs7.1ossl.gz +share/man/man1/dgst.1ossl.gz +share/man/man1/dhparam.1ossl.gz +share/man/man1/dsa.1ossl.gz +share/man/man1/dsaparam.1ossl.gz +share/man/man1/ec.1ossl.gz +share/man/man1/ecparam.1ossl.gz +share/man/man1/enc.1ossl.gz +share/man/man1/engine.1ossl.gz +share/man/man1/errstr.1ossl.gz +share/man/man1/gendsa.1ossl.gz +share/man/man1/genpkey.1ossl.gz +share/man/man1/genrsa.1ossl.gz +share/man/man1/info.1ossl.gz +share/man/man1/kdf.1ossl.gz +share/man/man1/mac.1ossl.gz +share/man/man1/nseq.1ossl.gz +share/man/man1/ocsp.1ossl.gz +share/man/man1/openssl-asn1parse.1ossl.gz +share/man/man1/openssl-ca.1ossl.gz +share/man/man1/openssl-ciphers.1ossl.gz +share/man/man1/openssl-cmds.1ossl.gz +share/man/man1/openssl-cmp.1ossl.gz +share/man/man1/openssl-cms.1ossl.gz +share/man/man1/openssl-crl.1ossl.gz +share/man/man1/openssl-crl2pkcs7.1ossl.gz +share/man/man1/openssl-dgst.1ossl.gz +share/man/man1/openssl-dhparam.1ossl.gz +share/man/man1/openssl-dsa.1ossl.gz +share/man/man1/openssl-dsaparam.1ossl.gz +share/man/man1/openssl-ec.1ossl.gz +share/man/man1/openssl-ecparam.1ossl.gz +share/man/man1/openssl-enc.1ossl.gz +share/man/man1/openssl-engine.1ossl.gz +share/man/man1/openssl-errstr.1ossl.gz +share/man/man1/openssl-fipsinstall.1ossl.gz +share/man/man1/openssl-format-options.1ossl.gz +share/man/man1/openssl-gendsa.1ossl.gz +share/man/man1/openssl-genpkey.1ossl.gz +share/man/man1/openssl-genrsa.1ossl.gz +share/man/man1/openssl-info.1ossl.gz +share/man/man1/openssl-kdf.1ossl.gz +share/man/man1/openssl-list.1ossl.gz +share/man/man1/openssl-mac.1ossl.gz +share/man/man1/openssl-namedisplay-options.1ossl.gz +share/man/man1/openssl-nseq.1ossl.gz +share/man/man1/openssl-ocsp.1ossl.gz +share/man/man1/openssl-passphrase-options.1ossl.gz +share/man/man1/openssl-passwd.1ossl.gz +share/man/man1/openssl-pkcs12.1ossl.gz +share/man/man1/openssl-pkcs7.1ossl.gz +share/man/man1/openssl-pkcs8.1ossl.gz +share/man/man1/openssl-pkey.1ossl.gz +share/man/man1/openssl-pkeyparam.1ossl.gz +share/man/man1/openssl-pkeyutl.1ossl.gz +share/man/man1/openssl-prime.1ossl.gz +share/man/man1/openssl-rand.1ossl.gz +share/man/man1/openssl-rehash.1ossl.gz +share/man/man1/openssl-req.1ossl.gz +share/man/man1/openssl-rsa.1ossl.gz +share/man/man1/openssl-rsautl.1ossl.gz +share/man/man1/openssl-s_client.1ossl.gz +share/man/man1/openssl-s_server.1ossl.gz +share/man/man1/openssl-s_time.1ossl.gz +share/man/man1/openssl-sess_id.1ossl.gz +share/man/man1/openssl-smime.1ossl.gz +share/man/man1/openssl-speed.1ossl.gz +share/man/man1/openssl-spkac.1ossl.gz +share/man/man1/openssl-srp.1ossl.gz +share/man/man1/openssl-storeutl.1ossl.gz +share/man/man1/openssl-ts.1ossl.gz +share/man/man1/openssl-verification-options.1ossl.gz +share/man/man1/openssl-verify.1ossl.gz +share/man/man1/openssl-version.1ossl.gz +share/man/man1/openssl-x509.1ossl.gz +share/man/man1/openssl.1ossl.gz +share/man/man1/passwd.1ossl.gz +share/man/man1/pkcs12.1ossl.gz +share/man/man1/pkcs7.1ossl.gz +share/man/man1/pkcs8.1ossl.gz +share/man/man1/pkey.1ossl.gz +share/man/man1/pkeyparam.1ossl.gz +share/man/man1/pkeyutl.1ossl.gz +share/man/man1/prime.1ossl.gz +share/man/man1/rand.1ossl.gz +share/man/man1/rehash.1ossl.gz +share/man/man1/req.1ossl.gz +share/man/man1/rsa.1ossl.gz +share/man/man1/rsautl.1ossl.gz +share/man/man1/s_client.1ossl.gz +share/man/man1/s_server.1ossl.gz +share/man/man1/s_time.1ossl.gz +share/man/man1/sess_id.1ossl.gz +share/man/man1/smime.1ossl.gz +share/man/man1/speed.1ossl.gz +share/man/man1/spkac.1ossl.gz +share/man/man1/srp.1ossl.gz +share/man/man1/storeutl.1ossl.gz +share/man/man1/ts.1ossl.gz +share/man/man1/tsget.1ossl.gz +share/man/man1/verify.1ossl.gz +share/man/man1/version.1ossl.gz +share/man/man1/x509.1ossl.gz +share/man/man5/config.5ossl.gz +share/man/man5/fips_config.5ossl.gz +share/man/man5/x509v3_config.5ossl.gz +%%OPENSSLDIR%%/misc/CA.pl +@comment %%OPENSSLDIR%%/misc/tsget.pl +%%OPENSSLDIR%%/misc/tsget +@sample %%OPENSSLDIR%%/ct_log_list.cnf.dist %%OPENSSLDIR%%/ct_log_list.cnf +%%FIPS%%%%OPENSSLDIR%%/fipsmodule.cnf +@sample %%OPENSSLDIR%%/openssl.cnf.dist %%OPENSSLDIR%%/openssl.cnf +@dir lib/ossl-modules +@dir %%OPENSSLDIR%%/private +@dir %%OPENSSLDIR%%/certs diff --git a/security/openssl33-quictls/version.mk b/security/openssl33-quictls/version.mk new file mode 100644 index 000000000000..c3fe2e51c987 --- /dev/null +++ b/security/openssl33-quictls/version.mk @@ -0,0 +1 @@ +OPENSSL_SHLIBVER?= 15 diff --git a/security/openssl33/Makefile b/security/openssl33/Makefile index 92b2a3b70d07..f4cdbb7a8866 100644 --- a/security/openssl33/Makefile +++ b/security/openssl33/Makefile @@ -1,5 +1,5 @@ PORTNAME= openssl -PORTVERSION= 3.3.3 +PORTVERSION= 3.3.4 CATEGORIES= security devel PKGNAMESUFFIX= 33 MASTER_SITES= https://github.com/openssl/openssl/releases/download/${DISTNAME}/ @@ -11,6 +11,8 @@ WWW= https://www.openssl.org/ LICENSE= APACHE20 LICENSE_FILE= ${WRKSRC}/LICENSE.txt +EXPIRATION_DATE= 2026-04-09 + CONFLICTS_INSTALL= boringssl libressl libressl-devel openssl openssl111 openssl3[1245] openssl*-quictls HAS_CONFIGURE= yes diff --git a/security/openssl33/distinfo b/security/openssl33/distinfo index ba314a4dcc7f..a6394ed16a43 100644 --- a/security/openssl33/distinfo +++ b/security/openssl33/distinfo @@ -1,3 +1,3 @@ -TIMESTAMP = 1739294023 -SHA256 (openssl-3.3.3.tar.gz) = 712590fd20aaa60ec75d778fe5b810d6b829ca7fb1e530577917a131f9105539 -SIZE (openssl-3.3.3.tar.gz) = 18102481 +TIMESTAMP = 1751448373 +SHA256 (openssl-3.3.4.tar.gz) = 8d1a5fc323d3fd351dc05458457fd48f78652d2a498e1d70ffea07b4d0eb3fa8 +SIZE (openssl-3.3.4.tar.gz) = 18113350 diff --git a/security/openssl34/Makefile b/security/openssl34/Makefile index b1ab27b4efc0..4bc0fe6c59a2 100644 --- a/security/openssl34/Makefile +++ b/security/openssl34/Makefile @@ -1,5 +1,5 @@ PORTNAME= openssl -DISTVERSION= 3.4.1 +DISTVERSION= 3.4.2 CATEGORIES= security devel PKGNAMESUFFIX= 34 MASTER_SITES= https://github.com/openssl/openssl/releases/download/${DISTNAME}/ @@ -11,6 +11,8 @@ WWW= https://www.openssl.org/ LICENSE= APACHE20 LICENSE_FILE= ${WRKSRC}/LICENSE.txt +EXPIRATION_DATE= 2026-10-22 + CONFLICTS_INSTALL= boringssl libressl libressl-devel openssl openssl111 openssl3[1235] openssl*-quictls HAS_CONFIGURE= yes diff --git a/security/openssl34/distinfo b/security/openssl34/distinfo index d8af1d8ae114..f57015331c43 100644 --- a/security/openssl34/distinfo +++ b/security/openssl34/distinfo @@ -1,3 +1,3 @@ -TIMESTAMP = 1739294109 -SHA256 (openssl-3.4.1.tar.gz) = 002a2d6b30b58bf4bea46c43bdd96365aaf8daa6c428782aa4feee06da197df3 -SIZE (openssl-3.4.1.tar.gz) = 18346056 +TIMESTAMP = 1751448388 +SHA256 (openssl-3.4.2.tar.gz) = 17b02459fc28be415470cccaae7434f3496cac1306b86b52c83886580e82834c +SIZE (openssl-3.4.2.tar.gz) = 18357346 diff --git a/security/openssl35/Makefile b/security/openssl35/Makefile index 03c8a5cf9203..f98afc6ba292 100644 --- a/security/openssl35/Makefile +++ b/security/openssl35/Makefile @@ -1,6 +1,5 @@ PORTNAME= openssl -PORTVERSION= 3.5.0 -PORTREVISION= 1 +PORTVERSION= 3.5.1 CATEGORIES= security devel PKGNAMESUFFIX= 35 MASTER_SITES= https://github.com/openssl/openssl/releases/download/${DISTNAME}/ diff --git a/security/openssl35/distinfo b/security/openssl35/distinfo index a607cb09a0e2..dbaa6f6357a6 100644 --- a/security/openssl35/distinfo +++ b/security/openssl35/distinfo @@ -1,3 +1,3 @@ -TIMESTAMP = 1744140897 -SHA256 (openssl-3.5.0.tar.gz) = 344d0a79f1a9b08029b0744e2cc401a43f9c90acd1044d09a530b4885a8e9fc0 -SIZE (openssl-3.5.0.tar.gz) = 53136912 +TIMESTAMP = 1751448415 +SHA256 (openssl-3.5.1.tar.gz) = 529043b15cffa5f36077a4d0af83f3de399807181d607441d734196d889b641f +SIZE (openssl-3.5.1.tar.gz) = 53158817 diff --git a/security/openssl35/files/patch-CVE-2025-4575 b/security/openssl35/files/patch-CVE-2025-4575 deleted file mode 100644 index 1bcec34bcb96..000000000000 --- a/security/openssl35/files/patch-CVE-2025-4575 +++ /dev/null @@ -1,61 +0,0 @@ -From e96d22446e633d117e6c9904cb15b4693e956eaa Mon Sep 17 00:00:00 2001 -From: Tomas Mraz <tomas@openssl.org> -Date: Tue, 20 May 2025 16:34:10 +0200 -Subject: [PATCH] apps/x509.c: Fix the -addreject option adding trust instead - of rejection - -Fixes CVE-2025-4575 - -Reviewed-by: Dmitry Belyavskiy <beldmit@gmail.com> -Reviewed-by: Paul Dale <ppzgs1@gmail.com> -(Merged from https://github.com/openssl/openssl/pull/27672) - -(cherry picked from commit 0eb9acc24febb1f3f01f0320cfba9654cf66b0ac) ---- - apps/x509.c | 2 +- - test/recipes/25-test_x509.t | 12 +++++++++++- - 2 files changed, 12 insertions(+), 2 deletions(-) - -diff --git a/apps/x509.c b/apps/x509.c -index fdae8f383a667..0c340c15b321a 100644 ---- apps/x509.c.orig -+++ apps/x509.c -@@ -465,7 +465,7 @@ int x509_main(int argc, char **argv) - prog, opt_arg()); - goto opthelp; - } -- if (!sk_ASN1_OBJECT_push(trust, objtmp)) -+ if (!sk_ASN1_OBJECT_push(reject, objtmp)) - goto end; - trustout = 1; - break; -diff --git a/test/recipes/25-test_x509.t b/test/recipes/25-test_x509.t -index 09b61708ff8a5..dfa0a428f5f0c 100644 ---- test/recipes/25-test_x509.t.orig -+++ test/recipes/25-test_x509.t -@@ -16,7 +16,7 @@ use OpenSSL::Test qw/:DEFAULT srctop_file/; - - setup("test_x509"); - --plan tests => 134; -+plan tests => 138; - - # Prevent MSys2 filename munging for arguments that look like file paths but - # aren't -@@ -110,6 +110,16 @@ ok(run(app(["openssl", "x509", "-new", "-force_pubkey", $key, "-subj", "/CN=EE", - && run(app(["openssl", "verify", "-no_check_time", - "-trusted", $ca, "-partial_chain", $caout]))); - -+# test trust decoration -+ok(run(app(["openssl", "x509", "-in", $ca, "-addtrust", "emailProtection", -+ "-out", "ca-trusted.pem"]))); -+cert_contains("ca-trusted.pem", "Trusted Uses: E-mail Protection", -+ 1, 'trusted use - E-mail Protection'); -+ok(run(app(["openssl", "x509", "-in", $ca, "-addreject", "emailProtection", -+ "-out", "ca-rejected.pem"]))); -+cert_contains("ca-rejected.pem", "Rejected Uses: E-mail Protection", -+ 1, 'rejected use - E-mail Protection'); -+ - subtest 'x509 -- x.509 v1 certificate' => sub { - tconversion( -type => 'x509', -prefix => 'x509v1', - -in => srctop_file("test", "testx509.pem") ); diff --git a/security/php85-filter/Makefile b/security/php85-filter/Makefile new file mode 100644 index 000000000000..1d4737ba51c9 --- /dev/null +++ b/security/php85-filter/Makefile @@ -0,0 +1,7 @@ +CATEGORIES= security + +MASTERDIR= ${.CURDIR}/../../lang/php85 + +PKGNAMESUFFIX= -filter + +.include "${MASTERDIR}/Makefile" diff --git a/security/php85-sodium/Makefile b/security/php85-sodium/Makefile new file mode 100644 index 000000000000..aff3c5308849 --- /dev/null +++ b/security/php85-sodium/Makefile @@ -0,0 +1,7 @@ +CATEGORIES= security + +MASTERDIR= ${.CURDIR}/../../lang/php85 + +PKGNAMESUFFIX= -sodium + +.include "${MASTERDIR}/Makefile" diff --git a/security/plasma6-kscreenlocker/distinfo b/security/plasma6-kscreenlocker/distinfo index 9b45a355b193..b29b38d6d151 100644 --- a/security/plasma6-kscreenlocker/distinfo +++ b/security/plasma6-kscreenlocker/distinfo @@ -1,3 +1,3 @@ -TIMESTAMP = 1750789611 -SHA256 (KDE/plasma/6.4.1/kscreenlocker-6.4.1.tar.xz) = c849dc939a050a26f270393f8b59e8b86d671983a752e014af7c89a1c955b925 -SIZE (KDE/plasma/6.4.1/kscreenlocker-6.4.1.tar.xz) = 183776 +TIMESTAMP = 1751380541 +SHA256 (KDE/plasma/6.4.2/kscreenlocker-6.4.2.tar.xz) = ef2bc8c2f1f0df75c67778c4208a5ee02c0546356ef8352dd1ffdee867283cc4 +SIZE (KDE/plasma/6.4.2/kscreenlocker-6.4.2.tar.xz) = 183732 diff --git a/security/plasma6-ksshaskpass/distinfo b/security/plasma6-ksshaskpass/distinfo index 8196ba2a8c6e..87b4a2ee1759 100644 --- a/security/plasma6-ksshaskpass/distinfo +++ b/security/plasma6-ksshaskpass/distinfo @@ -1,3 +1,3 @@ -TIMESTAMP = 1750789611 -SHA256 (KDE/plasma/6.4.1/ksshaskpass-6.4.1.tar.xz) = 5495db2d45f9b2ac50a81382f7e38c99ab83d7ea34adcf72b05c260d9d8a3433 -SIZE (KDE/plasma/6.4.1/ksshaskpass-6.4.1.tar.xz) = 30796 +TIMESTAMP = 1751380542 +SHA256 (KDE/plasma/6.4.2/ksshaskpass-6.4.2.tar.xz) = 6ef3811239c2ec505859f6c483927d6d69a59fbd8d6da41b385a977c231efffc +SIZE (KDE/plasma/6.4.2/ksshaskpass-6.4.2.tar.xz) = 30792 diff --git a/security/plasma6-kwallet-pam/distinfo b/security/plasma6-kwallet-pam/distinfo index 81c94e309bb8..3eb96bb2863b 100644 --- a/security/plasma6-kwallet-pam/distinfo +++ b/security/plasma6-kwallet-pam/distinfo @@ -1,3 +1,3 @@ -TIMESTAMP = 1750789612 -SHA256 (KDE/plasma/6.4.1/kwallet-pam-6.4.1.tar.xz) = 04d4d7075cb93cac10a7e0504836d961c7a2eda4f08987bb500f927200298b7c -SIZE (KDE/plasma/6.4.1/kwallet-pam-6.4.1.tar.xz) = 22400 +TIMESTAMP = 1751380542 +SHA256 (KDE/plasma/6.4.2/kwallet-pam-6.4.2.tar.xz) = fc5578ae860d74ce7695cf0b561a72bcf4730636694d8debfc10c85e97296ae9 +SIZE (KDE/plasma/6.4.2/kwallet-pam-6.4.2.tar.xz) = 22396 diff --git a/security/rubygem-gitlab-cloud-connector/Makefile b/security/rubygem-gitlab-cloud-connector/Makefile index b59e9cf5734e..17348ef607c0 100644 --- a/security/rubygem-gitlab-cloud-connector/Makefile +++ b/security/rubygem-gitlab-cloud-connector/Makefile @@ -1,5 +1,5 @@ PORTNAME= gitlab-cloud-connector -PORTVERSION= 1.17.0 +PORTVERSION= 1.19.0 CATEGORIES= security rubygems MASTER_SITES= RG diff --git a/security/rubygem-gitlab-cloud-connector/distinfo b/security/rubygem-gitlab-cloud-connector/distinfo index f3bc3876d43c..b702ac666f5a 100644 --- a/security/rubygem-gitlab-cloud-connector/distinfo +++ b/security/rubygem-gitlab-cloud-connector/distinfo @@ -1,3 +1,3 @@ -TIMESTAMP = 1750222196 -SHA256 (rubygem/gitlab-cloud-connector-1.17.0.gem) = b9eaf5544cebb66667be560cc032fd6e26ccb6c35c0912b3cd1fadb7cbcfbf34 -SIZE (rubygem/gitlab-cloud-connector-1.17.0.gem) = 18432 +TIMESTAMP = 1750912646 +SHA256 (rubygem/gitlab-cloud-connector-1.19.0.gem) = cfa644b4d827062f5c625d391ca3e6904e7667f0f6efe96adab81e051d8d07ad +SIZE (rubygem/gitlab-cloud-connector-1.19.0.gem) = 18432 diff --git a/security/snort3/Makefile b/security/snort3/Makefile index 50ff68cab2c4..833bdf00cb11 100644 --- a/security/snort3/Makefile +++ b/security/snort3/Makefile @@ -1,6 +1,5 @@ PORTNAME= snort -DISTVERSION= 3.8.1.0 -PORTREVISION= 1 +DISTVERSION= 3.9.0.0 PORTEPOCH= 1 CATEGORIES= security PKGNAMESUFFIX= 3 diff --git a/security/snort3/distinfo b/security/snort3/distinfo index 3b5d7f18d701..043da5daa3cb 100644 --- a/security/snort3/distinfo +++ b/security/snort3/distinfo @@ -1,3 +1,3 @@ -TIMESTAMP = 1748521147 -SHA256 (snort3-snort3-3.8.1.0_GH0.tar.gz) = adbd958bd0f9b2c78997bfda5a36cbbc843f07a71712db0b56f085e2cd124164 -SIZE (snort3-snort3-3.8.1.0_GH0.tar.gz) = 3484205 +TIMESTAMP = 1751444666 +SHA256 (snort3-snort3-3.9.0.0_GH0.tar.gz) = a294be2921440ec39a265e770c15dc52ab011918c6fd288d99e442ceb12f961d +SIZE (snort3-snort3-3.9.0.0_GH0.tar.gz) = 3484705 diff --git a/security/snort3/pkg-plist b/security/snort3/pkg-plist index 5da84b8b5dd6..67291c403269 100644 --- a/security/snort3/pkg-plist +++ b/security/snort3/pkg-plist @@ -39,7 +39,6 @@ include/snort/flow/flow_key.h include/snort/flow/flow_stash.h include/snort/flow/ha.h include/snort/flow/session.h -include/snort/flow/stash_item.h include/snort/flow/stream_flow.h include/snort/framework/api_options.h include/snort/framework/base_api.h diff --git a/security/snuffleupagus/Makefile b/security/snuffleupagus/Makefile index 9b113b64de11..5783534cd0a0 100644 --- a/security/snuffleupagus/Makefile +++ b/security/snuffleupagus/Makefile @@ -21,7 +21,7 @@ USES= localbase:ldflags php:build,ext USE_GITHUB= yes GH_ACCOUNT= jvoisin USE_PHP= session:build -IGNORE_WITH_PHP= 84 +IGNORE_WITH_PHP= 84 85 CONFIGURE_ARGS= --enable-snuffleupagus diff --git a/security/sudo/Makefile b/security/sudo/Makefile index 14466a9e7774..b9bea691da08 100644 --- a/security/sudo/Makefile +++ b/security/sudo/Makefile @@ -1,5 +1,5 @@ PORTNAME= sudo -PORTVERSION= 1.9.17 +PORTVERSION= 1.9.17p1 CATEGORIES= security MASTER_SITES= SUDO diff --git a/security/sudo/distinfo b/security/sudo/distinfo index 9b38cd2b5a6c..a01a900722c6 100644 --- a/security/sudo/distinfo +++ b/security/sudo/distinfo @@ -1,3 +1,3 @@ -TIMESTAMP = 1750523514 -SHA256 (sudo-1.9.17.tar.gz) = 3f212c69d534d5822b492d099abb02a593f91ca99f5afde5cb9bd3e1dcdad069 -SIZE (sudo-1.9.17.tar.gz) = 5447899 +TIMESTAMP = 1751356446 +SHA256 (sudo-1.9.17p1.tar.gz) = ff607ea717072197738a78f778692cd6df9a7e3e404565f51de063ca27455d32 +SIZE (sudo-1.9.17p1.tar.gz) = 5449076 diff --git a/security/trivy/Makefile b/security/trivy/Makefile index 05cfa55f0b39..d208cccbab53 100644 --- a/security/trivy/Makefile +++ b/security/trivy/Makefile @@ -1,7 +1,6 @@ PORTNAME= trivy DISTVERSIONPREFIX= v -DISTVERSION= 0.63.0 -PORTREVISION= 1 +DISTVERSION= 0.64.0 CATEGORIES= security MAINTAINER= mfechner@FreeBSD.org diff --git a/security/trivy/distinfo b/security/trivy/distinfo index 14015874c1c6..24ad8282e01f 100644 --- a/security/trivy/distinfo +++ b/security/trivy/distinfo @@ -1,5 +1,5 @@ -TIMESTAMP = 1748580283 -SHA256 (go/security_trivy/trivy-v0.63.0/v0.63.0.mod) = f0b5b8182a3155cfd22aedd2f1266794a26549664c18b8358a411ba634188fa3 -SIZE (go/security_trivy/trivy-v0.63.0/v0.63.0.mod) = 23467 -SHA256 (go/security_trivy/trivy-v0.63.0/v0.63.0.zip) = 638bc4adc54bf61afc8647c9f4fa5db30e6352dfe033655c30d0af02eca5c14d -SIZE (go/security_trivy/trivy-v0.63.0/v0.63.0.zip) = 58804833 +TIMESTAMP = 1751363247 +SHA256 (go/security_trivy/trivy-v0.64.0/v0.64.0.mod) = 0cdadb981316deab57b0abfdca161b8a907173478b82770c901c8d58ce4a2016 +SIZE (go/security_trivy/trivy-v0.64.0/v0.64.0.mod) = 23200 +SHA256 (go/security_trivy/trivy-v0.64.0/v0.64.0.zip) = f5f0943b22846cd637d140585dd5a318e303cf0fe9f45b5f138153e2a292fc06 +SIZE (go/security_trivy/trivy-v0.64.0/v0.64.0.zip) = 58856559 diff --git a/security/vuxml/vuln/2025.xml b/security/vuxml/vuln/2025.xml index e9e2390a00f0..fbceba5c7d7c 100644 --- a/security/vuxml/vuln/2025.xml +++ b/security/vuxml/vuln/2025.xml @@ -1,3 +1,254 @@ + <vuln vid="5c777f88-40ff-4e1e-884b-ad63dfb9bb15"> + <topic>chromium -- multiple security fixes</topic> + <affects> + <package> + <name>chromium</name> + <range><lt>138.0.7204.96</lt></range> + </package> + <package> + <name>ungoogled-chromium</name> + <range><lt>138.0.7204.96</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>Chrome Releases reports:</p> + <blockquote cite="https://chromereleases.googleblog.com/2025/06/stable-channel-update-for-desktop_30.html"> + <p>This update includes 1 security fix:</p> + <ul> + <li>[427663123] High CVE-2025-6554: Type Confusion in V8.</li> + </ul> + </blockquote> + </body> + </description> + <references> + <cvename>CVE-2025-6554</cvename> + <url>https://chromereleases.googleblog.com/2025/06/stable-channel-update-for-desktop_30.html</url> + </references> + <dates> + <discovery>2025-06-30</discovery> + <entry>2025-07-02</entry> + </dates> + </vuln> + + <vuln vid="9c91e1f8-f255-4b57-babe-2e385558f1dc"> + <topic>chromium -- multiple security fixes</topic> + <affects> + <package> + <name>chromium</name> + <range><lt>138.0.7204.49</lt></range> + </package> + <package> + <name>ungoogled-chromium</name> + <range><lt>138.0.7204.49</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>Chrome Releases reports:</p> + <blockquote cite="https://chromereleases.googleblog.com/2025/06/stable-channel-update-for-desktop_24.html"> + <p>This update includes 11 security fixes:</p> + <ul> + <li>[407328533] Medium CVE-2025-6555: Use after free in Animation. Reported by Lyra Rebane (rebane2001) on 2025-03-30</li> + <li>[40062462] Low CVE-2025-6556: Insufficient policy enforcement in Loader. Reported by Shaheen Fazim on 2023-01-02</li> + <li>[406631048] Low CVE-2025-6557: Insufficient data validation in DevTools. Reported by Ameen Basha M K on 2025-03-27</li> + </ul> + </blockquote> + </body> + </description> + <references> + <cvename>CVE-2025-6555</cvename> + <cvename>CVE-2025-6556</cvename> + <cvename>CVE-2025-6557</cvename> + <url>https://chromereleases.googleblog.com/2025/06/stable-channel-update-for-desktop_24.html</url> + </references> + <dates> + <discovery>2025-06-24</discovery> + <entry>2025-07-02</entry> + </dates> + </vuln> + + <vuln vid="24f4b495-56a1-11f0-9621-93abbef07693"> + <topic>sudo -- privilege escalation vulnerability through host and chroot options</topic> + <affects> + <package> + <name>sudo</name> + <range><lt>1.9.17p1</lt></range> + </package> + <package> + <name>sudo-sssd</name> + <range><lt>1.9.17p1</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>Todd C. Miller reports, crediting Rich Mirch from Stratascale Cyber Research Unit (CRU):</p> + <blockquote cite="https://www.sudo.ws/releases/stable/"> + <p>Sudo 1.9.17p1:</p> + <ul> + <li> + Fixed CVE-2025-32462. Sudo's -h (--host) option could be specified + when running a command or editing a file. This could enable a + local privilege escalation attack if the sudoers file allows the + user to run commands on a different host. For more information, + see Local Privilege Escalation via host option. + </li> + <li> + Fixed CVE-2025-32463. An attacker can leverage sudo's -R + (--chroot) option to run arbitrary commands as root, even if they + are not listed in the sudoers file. The chroot support has been + deprecated an will be removed entirely in a future release. For + more information, see Local Privilege Escalation via chroot + option. + </li> + </ul> + </blockquote> + </body> + </description> + <references> + <cvename>CVE-2025-32462</cvename> + <cvename>CVE-2025-32463</cvename> + <url>https://www.sudo.ws/releases/stable/</url> + <url>https://www.stratascale.com/vulnerability-alert-CVE-2025-32462-sudo-host</url> + <url>https://www.stratascale.com/vulnerability-alert-CVE-2025-32463-sudo-chroot</url> + </references> + <dates> + <discovery>2025-04-01</discovery> + <entry>2025-07-01</entry> + </dates> + </vuln> + + <vuln vid="8df49466-5664-11f0-943a-18c04d5ea3dc"> + <topic>xorg server -- Multiple vulnerabilities</topic> + <affects> + <package> + <name>xorg-server</name> + <name>xephyr</name> + <name>xorg-vfbserver</name> + <range><lt>21.1.18,1</lt></range> + </package> + <package> + <name>xorg-nextserver</name> + <range><lt>21.1.18,2</lt></range> + </package> + <package> + <name>xwayland</name> + <range><lt>24.1.8,1</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>The X.Org project reports:</p> + <blockquote cite="https://lists.x.org/archives/xorg-announce/2025-February/003584.html"> + <ul> + <li> + CVE-2025-49176: Integer overflow in Big Requests Extension + <p>The Big Requests extension allows requests larger than the 16-bit length + limit. + It uses integers for the request length and checks for the size not to + exceed the maxBigRequestSize limit, but does so after translating the + length to integer by multiplying the given size in bytes by 4. + In doing so, it might overflow the integer size limit before actually + checking for the overflow, defeating the purpose of the test.</p> + </li> + </ul> + </blockquote> + </body> + </description> + <references> + <cvename>CVE-2025-49176</cvename> + <url>https://lists.x.org/archives/xorg/2025-June/062055.html</url> + </references> + <dates> + <discovery>2025-06-17</discovery> + <entry>2025-07-01</entry> + </dates> + </vuln> + + <vuln vid="b14cabf7-5663-11f0-943a-18c04d5ea3dc"> + <topic>xorg server -- Multiple vulnerabilities</topic> + <affects> + <package> + <name>xorg-server</name> + <name>xephyr</name> + <name>xorg-vfbserver</name> + <range><lt>21.1.17,1</lt></range> + </package> + <package> + <name>xorg-nextserver</name> + <range><lt>21.1.17,2</lt></range> + </package> + <package> + <name>xwayland</name> + <range><lt>24.1.7,1</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>The X.Org project reports:</p> + <blockquote cite="https://lists.x.org/archives/xorg-announce/2025-February/003584.html"> + <ul> + <li> + CVE-2025-49175: Out-of-bounds access in X Rendering extension (Animated cursors) + <p>The X Rendering extension allows creating animated cursors providing a + list of cursors. + By default, the Xserver assumes at least one cursor is provided while a + client may actually pass no cursor at all, which causes an out-of-bound + read creating the animated cursor and a crash of the Xserver.</p> + </li> + <li> + CVE-2025-49177: Data leak in XFIXES Extension 6 (XFixesSetClientDisconnectMode) + + <p>The handler of XFixesSetClientDisconnectMode does not check the client + request length. + A client could send a shorter request and read data from a former + request.</p> + </li> + <li> + CVE-2025-49178: Unprocessed client request via bytes to ignore + + <p>When reading requests from the clients, the input buffer might be shared + and used between different clients. + If a given client sends a full request with non-zero bytes to ignore, + the bytes to ignore may still be non-zero even though the request is + full, in which case the buffer could be shared with another client who's + request will not be processed because of those bytes to ignore, leading + to a possible hang of the other client request.</p> + </li> + <li> + CVE-2025-49179: Integer overflow in X Record extension + + <p>The RecordSanityCheckRegisterClients() function in the X Record extension + implementation of the Xserver checks for the request length, but does not + check for integer overflow. + A client might send a very large value for either the number of clients + or the number of protocol ranges that will cause an integer overflow in + the request length computation, defeating the check for request length.</p> + </li> + <li> + CVE-2025-49180: Integer overflow in RandR extension (RRChangeProviderProperty) + + <p>A client might send a request causing an integer overflow when computing + the total size to allocate in RRChangeProviderProperty().</p> + </li> + </ul> + </blockquote> + </body> + </description> + <references> + <cvename>CVE-2025-49175</cvename> + <cvename>CVE-2025-49177</cvename> + <cvename>CVE-2025-49178</cvename> + <cvename>CVE-2025-49179</cvename> + <cvename>CVE-2025-49180</cvename> + <url>https://lists.x.org/archives/xorg/2025-June/062055.html</url> + </references> + <dates> + <discovery>2025-06-17</discovery> + <entry>2025-07-01</entry> + </dates> + </vuln> + <vuln vid="6b1b8989-55b0-11f0-ac64-589cfc10a551"> <topic>podman -- TLS connection used to pull VM images was not validated</topic> <affects> |