summaryrefslogtreecommitdiff
path: root/security
diff options
context:
space:
mode:
Diffstat (limited to 'security')
-rw-r--r--security/Makefile1
-rw-r--r--security/autofirma/Makefile3
-rw-r--r--security/aws-lc/Makefile2
-rw-r--r--security/aws-lc/distinfo6
-rw-r--r--security/easy-rsa/Makefile2
-rw-r--r--security/easy-rsa/files/pkg-message.in3
-rw-r--r--security/keychain/Makefile2
-rw-r--r--security/keychain/distinfo6
-rw-r--r--security/krb5-121/Makefile12
-rw-r--r--security/krb5-122/Makefile12
-rw-r--r--security/krb5-devel/Makefile12
-rw-r--r--security/py-authlib/Makefile2
-rw-r--r--security/py-authlib/distinfo6
-rw-r--r--security/py-joserfc/Makefile2
-rw-r--r--security/py-joserfc/distinfo6
-rw-r--r--security/rubygem-acme-client/Makefile2
-rw-r--r--security/rubygem-acme-client/distinfo6
-rw-r--r--security/rubygem-omniauth-gitlab/Makefile3
-rw-r--r--security/rubygem-omniauth-gitlab/files/patch-gemspec11
-rw-r--r--security/rubygem-openssl-ccm/Makefile3
-rw-r--r--security/rubygem-openssl-ccm/files/patch-gemspec10
-rw-r--r--security/rubygem-openssl-cmac/Makefile3
-rw-r--r--security/rubygem-openssl-cmac/files/patch-gemspec10
-rw-r--r--security/rubygem-openssl/Makefile2
-rw-r--r--security/rubygem-openssl/distinfo6
-rw-r--r--security/rubygem-openssl3/Makefile22
-rw-r--r--security/rubygem-openssl3/distinfo3
-rw-r--r--security/rubygem-openssl3/pkg-descr2
-rw-r--r--security/rubygem-sshkit/Makefile2
-rw-r--r--security/rubygem-sshkit/distinfo6
-rw-r--r--security/shibboleth-sp/Makefile2
-rw-r--r--security/shibboleth-sp/distinfo6
-rw-r--r--security/shibboleth-sp/pkg-plist4
-rw-r--r--security/snuffleupagus/Makefile2
-rw-r--r--security/sqlmap/Makefile7
-rw-r--r--security/sqlmap/distinfo6
-rw-r--r--security/suricata/Makefile2
-rw-r--r--security/vuxml/vuln/2025.xml165
-rw-r--r--security/wazuh-manager/distinfo8
-rw-r--r--security/xray-core/Makefile1
-rw-r--r--security/xray-core/files/xray.in3
41 files changed, 303 insertions, 71 deletions
diff --git a/security/Makefile b/security/Makefile
index 67f44efbc33a..c8bc4fb9daf1 100644
--- a/security/Makefile
+++ b/security/Makefile
@@ -1221,6 +1221,7 @@
SUBDIR += rubygem-openssl-ccm
SUBDIR += rubygem-openssl-cmac
SUBDIR += rubygem-openssl-signature_algorithm
+ SUBDIR += rubygem-openssl3
SUBDIR += rubygem-openvas-omp
SUBDIR += rubygem-origami
SUBDIR += rubygem-pbkdf2-ruby
diff --git a/security/autofirma/Makefile b/security/autofirma/Makefile
index 034ca3b487e2..ba6ae18ec0cb 100644
--- a/security/autofirma/Makefile
+++ b/security/autofirma/Makefile
@@ -12,6 +12,7 @@ LICENSE= GPLv2 EUPL11
LICENSE_COMB= dual
LICENSE_FILE= ${WRKSRC}/usr/share/common-licenses/eupl-1.1.txt
+EXTRACT_DEPENDS= zip:archivers/zip
LIB_DEPENDS= libnss3.so:security/nss
USES= desktop-file-utils java zip
@@ -34,7 +35,7 @@ WRKSRC=${WRKDIR}
post-extract:
${TAR} -C ${WRKDIR} -xvzf ${WRKDIR}/autofirma_1_9.deb
${TAR} -C ${WRKDIR} -xvzf ${WRKDIR}/data.tar.gz
- ${ZIP_CMD} -d ${PORTNAME}.jar "nss/WINDOWS/*" "windows/*" "osx/*" "linux/*"
+ zip -d ${WRKDIR}/usr/lib/Autofirma/${PORTNAME}.jar "nss/WINDOWS/*" "windows/*" "osx/*" "linux/*"
do-install:
${MKDIR} ${STAGEDIR}${DATADIR}
diff --git a/security/aws-lc/Makefile b/security/aws-lc/Makefile
index bfb4e5b4b697..c91ea8c22e4a 100644
--- a/security/aws-lc/Makefile
+++ b/security/aws-lc/Makefile
@@ -1,5 +1,5 @@
PORTNAME= aws-lc
-PORTVERSION= 1.65.1
+PORTVERSION= 1.66.0
DISTVERSIONPREFIX= v
CATEGORIES= security
diff --git a/security/aws-lc/distinfo b/security/aws-lc/distinfo
index b5de7c54a7e9..07122433a55c 100644
--- a/security/aws-lc/distinfo
+++ b/security/aws-lc/distinfo
@@ -1,3 +1,3 @@
-TIMESTAMP = 1765032670
-SHA256 (aws-aws-lc-v1.65.1_GH0.tar.gz) = d4cf3b19593fc7876b23741e8ca7c48e0043679cec393fe24b138c3f1ffd6254
-SIZE (aws-aws-lc-v1.65.1_GH0.tar.gz) = 124042558
+TIMESTAMP = 1766036365
+SHA256 (aws-aws-lc-v1.66.0_GH0.tar.gz) = 21020d848ffb7db0df0954afbb79b3eb80c389ced5f5286060d9416dd428a486
+SIZE (aws-aws-lc-v1.66.0_GH0.tar.gz) = 126538688
diff --git a/security/easy-rsa/Makefile b/security/easy-rsa/Makefile
index 4a7e4df1f41f..b10997333c64 100644
--- a/security/easy-rsa/Makefile
+++ b/security/easy-rsa/Makefile
@@ -1,6 +1,6 @@
PORTNAME= easy-rsa
DISTVERSION= 3.2.5
-PORTREVISION= 0 # leave in if 0 to avoid accidental PORTEPOCH bumps
+PORTREVISION= 1 # leave in if 0 to avoid accidental PORTEPOCH bumps
PORTEPOCH= 1
CATEGORIES= security net-mgmt
MASTER_SITES= https://github.com/OpenVPN/easy-rsa/releases/download/v${DISTVERSION}/ \
diff --git a/security/easy-rsa/files/pkg-message.in b/security/easy-rsa/files/pkg-message.in
index aa6fcbb7be4b..7094bcc18cdb 100644
--- a/security/easy-rsa/files/pkg-message.in
+++ b/security/easy-rsa/files/pkg-message.in
@@ -12,8 +12,7 @@ See %%PREFIX%%/share/doc/easy-rsa/README.quickstart.md for further information.
An on-line help is available, you can run:
- easyrsa help # for help on commands
- easyrsa help options # for help on options
+ easyrsa help # for help on commands and options
**** SECURITY WARNING FOR PAST security/easy-rsa versions ****
**** easyrsa may have encrypted your CA private key with a weak cipher
diff --git a/security/keychain/Makefile b/security/keychain/Makefile
index 4f071b73d6fd..304d63403853 100644
--- a/security/keychain/Makefile
+++ b/security/keychain/Makefile
@@ -1,5 +1,5 @@
PORTNAME= keychain
-PORTVERSION= 2.9.6
+PORTVERSION= 2.9.8
CATEGORIES= security
MAINTAINER= garga@FreeBSD.org
diff --git a/security/keychain/distinfo b/security/keychain/distinfo
index 588c263ce07b..18a187f1d543 100644
--- a/security/keychain/distinfo
+++ b/security/keychain/distinfo
@@ -1,3 +1,3 @@
-TIMESTAMP = 1759928737
-SHA256 (funtoo-keychain-2.9.6_GH0.tar.gz) = 23e58da1f3ea7cbe15069e7d3c730277d0cb6a4bec2db76adc20a06acd4c0a42
-SIZE (funtoo-keychain-2.9.6_GH0.tar.gz) = 51990
+TIMESTAMP = 1766160351
+SHA256 (funtoo-keychain-2.9.8_GH0.tar.gz) = 589cf55ae5c4b65af1d977d705beb319006efca5bcdda8352b8558d0dcff5a84
+SIZE (funtoo-keychain-2.9.8_GH0.tar.gz) = 61665
diff --git a/security/krb5-121/Makefile b/security/krb5-121/Makefile
index e5b2c56906d2..3fd6a66b5c37 100644
--- a/security/krb5-121/Makefile
+++ b/security/krb5-121/Makefile
@@ -43,10 +43,10 @@ CPE_PRODUCT= kerberos
FLAVORS= default ldap
OPTIONS_DEFINE= EXAMPLES NLS DOCS DNS_FOR_REALM LDAP LMDB
-OPTIONS_DEFAULT= DOCS READLINE BUILTIN
+OPTIONS_DEFAULT= DOCS READLINE CRYPTO_BUILTIN
OPTIONS_RADIO= CMD_LINE_EDITING CRYPTO
OPTIONS_RADIO_CMD_LINE_EDITING= READLINE LIBEDIT LIBEDIT_BASE
-OPTIONS_RADIO_CRYPTO= BUILTIN OPENSSL
+OPTIONS_RADIO_CRYPTO= CRYPTO_BUILTIN CRYPTO_OPENSSL
CMD_LINE_EDITING_DESC= Command line editing for kadmin and ktutil
DNS_FOR_REALM_DESC= Enable DNS lookups for Kerberos realm names
DNS_FOR_REALM_CONFIGURE_ENABLE= dns-for-realm
@@ -65,10 +65,10 @@ LIBEDIT_USES= libedit
LIBEDIT_CONFIGURE_WITH= libedit
LIBEDIT_BASE_CONFIGURE_WITH= libedit
LIBEDIT_BASE_DESC= Use libedit in FreeBSD base
-BUILTIN_DESC= Use crypto built into KRB5
-BUILTIN_CONFIGURE_ON= --with-crypto-impl=builtin
-OPENSSL_DESC= Use OpenSSL crypto
-OPENSSL_CONFIGURE_ON= --with-crypto-impl=openssl
+CRYPTO_BUILTIN_DESC= Use crypto built into KRB5
+CRYPTO_BUILTIN_CONFIGURE_ON= --with-crypto-impl=builtin
+CRYPTO_OPENSSL_DESC= Use OpenSSL crypto
+CRYPTO_OPENSSL_CONFIGURE_ON= --with-crypto-impl=openssl
.if ${FLAVOR:U} == ldap
OPTIONS_DEFAULT+= LDAP LMDB
diff --git a/security/krb5-122/Makefile b/security/krb5-122/Makefile
index 2ae37b61fd34..af51d1ea6fdc 100644
--- a/security/krb5-122/Makefile
+++ b/security/krb5-122/Makefile
@@ -42,10 +42,10 @@ CPE_PRODUCT= kerberos
FLAVORS= default ldap
OPTIONS_DEFINE= EXAMPLES NLS DOCS DNS_FOR_REALM LDAP LMDB
-OPTIONS_DEFAULT= DOCS READLINE BUILTIN
+OPTIONS_DEFAULT= DOCS READLINE CRYPTO_BUILTIN
OPTIONS_RADIO= CMD_LINE_EDITING CRYPTO
OPTIONS_RADIO_CMD_LINE_EDITING= READLINE LIBEDIT LIBEDIT_BASE
-OPTIONS_RADIO_CRYPTO= BUILTIN OPENSSL
+OPTIONS_RADIO_CRYPTO= CRYPTO_BUILTIN CRYPTO_OPENSSL
CMD_LINE_EDITING_DESC= Command line editing for kadmin and ktutil
DNS_FOR_REALM_DESC= Enable DNS lookups for Kerberos realm names
DNS_FOR_REALM_CONFIGURE_ENABLE= dns-for-realm
@@ -64,10 +64,10 @@ LIBEDIT_USES= libedit
LIBEDIT_CONFIGURE_WITH= libedit
LIBEDIT_BASE_CONFIGURE_WITH= libedit
LIBEDIT_BASE_DESC= Use libedit in FreeBSD base
-BUILTIN_DESC= Use crypto built into KRB5
-BUILTIN_CONFIGURE_ON= --with-crypto-impl=builtin
-OPENSSL_DESC= Use OpenSSL crypto
-OPENSSL_CONFIGURE_ON= --with-crypto-impl=openssl
+CRYPTO_BUILTIN_DESC= Use crypto built into KRB5
+CRYPTO_BUILTIN_CONFIGURE_ON= --with-crypto-impl=builtin
+CRYPTO_OPENSSL_DESC= Use OpenSSL crypto
+CRYPTO_OPENSSL_CONFIGURE_ON= --with-crypto-impl=openssl
.if ${FLAVOR:U} == ldap
OPTIONS_DEFAULT+= LDAP LMDB
diff --git a/security/krb5-devel/Makefile b/security/krb5-devel/Makefile
index b7f77986aee8..0bb9349d6ca7 100644
--- a/security/krb5-devel/Makefile
+++ b/security/krb5-devel/Makefile
@@ -45,10 +45,10 @@ CPE_PRODUCT= kerberos
FLAVORS= default ldap
OPTIONS_DEFINE= EXAMPLES NLS DNS_FOR_REALM LDAP LMDB
-OPTIONS_DEFAULT= KRB5_PDF KRB5_HTML READLINE BUILTIN
+OPTIONS_DEFAULT= KRB5_PDF KRB5_HTML READLINE CRYPTO_BUILTIN
OPTIONS_RADIO= CMD_LINE_EDITING CRYPTO
OPTIONS_RADIO_CMD_LINE_EDITING= READLINE LIBEDIT LIBEDIT_BASE
-OPTIONS_RADIO_CRYPTO= BUILTIN OPENSSL
+OPTIONS_RADIO_CRYPTO= CRYPTO_BUILTIN CRYPTO_OPENSSL
CMD_LINE_EDITING_DESC= Command line editing for kadmin and ktutil
DNS_FOR_REALM_DESC= Enable DNS lookups for Kerberos realm names
DNS_FOR_REALM_CONFIGURE_ENABLE= dns-for-realm
@@ -67,10 +67,10 @@ LIBEDIT_USES= libedit
LIBEDIT_CONFIGURE_WITH= libedit
LIBEDIT_BASE_CONFIGURE_WITH= libedit
LIBEDIT_BASE_DESC= Use libedit in FreeBSD base
-BUILTIN_DESC= Use crypto built into KRB5
-BUILTIN_CONFIGURE_ON= --with-crypto-impl=builtin
-OPENSSL_DESC= Use OpenSSL crypto
-OPENSSL_CONFIGURE_ON= --with-crypto-impl=openssl
+CRYPTO_BUILTIN_DESC= Use crypto built into KRB5
+CRYPTO_BUILTIN_CONFIGURE_ON= --with-crypto-impl=builtin
+CRYPTO_OPENSSL_DESC= Use OpenSSL crypto
+CRYPTO_OPENSSL_CONFIGURE_ON= --with-crypto-impl=openssl
.if ${FLAVOR:U} == ldap
OPTIONS_DEFAULT+= LDAP LMDB
diff --git a/security/py-authlib/Makefile b/security/py-authlib/Makefile
index 55033d4eb214..192f80333ccd 100644
--- a/security/py-authlib/Makefile
+++ b/security/py-authlib/Makefile
@@ -1,5 +1,5 @@
PORTNAME= authlib
-PORTVERSION= 1.6.5
+PORTVERSION= 1.6.6
CATEGORIES= security python
MASTER_SITES= PYPI
PKGNAMEPREFIX= ${PYTHON_PKGNAMEPREFIX}
diff --git a/security/py-authlib/distinfo b/security/py-authlib/distinfo
index 58aaf71e0566..a11717c72272 100644
--- a/security/py-authlib/distinfo
+++ b/security/py-authlib/distinfo
@@ -1,3 +1,3 @@
-TIMESTAMP = 1759774705
-SHA256 (authlib-1.6.5.tar.gz) = 6aaf9c79b7cc96c900f0b284061691c5d4e61221640a948fe690b556a6d6d10b
-SIZE (authlib-1.6.5.tar.gz) = 164553
+TIMESTAMP = 1766036505
+SHA256 (authlib-1.6.6.tar.gz) = 45770e8e056d0f283451d9996fbb59b70d45722b45d854d58f32878d0a40c38e
+SIZE (authlib-1.6.6.tar.gz) = 164894
diff --git a/security/py-joserfc/Makefile b/security/py-joserfc/Makefile
index a0e345319fa3..98446c7a5326 100644
--- a/security/py-joserfc/Makefile
+++ b/security/py-joserfc/Makefile
@@ -1,5 +1,5 @@
PORTNAME= joserfc
-PORTVERSION= 1.5.0
+PORTVERSION= 1.6.0
CATEGORIES= security python
MASTER_SITES= PYPI
PKGNAMEPREFIX= ${PYTHON_PKGNAMEPREFIX}
diff --git a/security/py-joserfc/distinfo b/security/py-joserfc/distinfo
index ed21ffec4d0d..43fcd8dac444 100644
--- a/security/py-joserfc/distinfo
+++ b/security/py-joserfc/distinfo
@@ -1,3 +1,3 @@
-TIMESTAMP = 1765032814
-SHA256 (joserfc-1.5.0.tar.gz) = 4e88d757cf08ec1d370561a15dd6dda8452ad4e335066a9aeb1b426bffe91c56
-SIZE (joserfc-1.5.0.tar.gz) = 213086
+TIMESTAMP = 1766036507
+SHA256 (joserfc-1.6.0.tar.gz) = 27946ee53f591c2da65b726a663a68f0fb000732eaadfe819bbbda6429702ad0
+SIZE (joserfc-1.6.0.tar.gz) = 225982
diff --git a/security/rubygem-acme-client/Makefile b/security/rubygem-acme-client/Makefile
index e5bf6340b0dc..e7be426598f7 100644
--- a/security/rubygem-acme-client/Makefile
+++ b/security/rubygem-acme-client/Makefile
@@ -1,5 +1,5 @@
PORTNAME= acme-client
-PORTVERSION= 2.0.28
+PORTVERSION= 2.0.29
CATEGORIES= security rubygems
MASTER_SITES= RG
diff --git a/security/rubygem-acme-client/distinfo b/security/rubygem-acme-client/distinfo
index f20ee4ff7cd5..7ceb92c18c42 100644
--- a/security/rubygem-acme-client/distinfo
+++ b/security/rubygem-acme-client/distinfo
@@ -1,3 +1,3 @@
-TIMESTAMP = 1764511054
-SHA256 (rubygem/acme-client-2.0.28.gem) = 3756de6aa433a1d829b438d69a1de8bafbdf40e44fa3af7ab7a6cd132fa8e43b
-SIZE (rubygem/acme-client-2.0.28.gem) = 23552
+TIMESTAMP = 1766036629
+SHA256 (rubygem/acme-client-2.0.29.gem) = 2750537f644659aaf62d9e3a94e96acbd0cebcd24425c2231ed38e73cc4034f1
+SIZE (rubygem/acme-client-2.0.29.gem) = 24064
diff --git a/security/rubygem-omniauth-gitlab/Makefile b/security/rubygem-omniauth-gitlab/Makefile
index 159210eeda6f..75a5ee05c2ef 100644
--- a/security/rubygem-omniauth-gitlab/Makefile
+++ b/security/rubygem-omniauth-gitlab/Makefile
@@ -1,5 +1,6 @@
PORTNAME= omniauth-gitlab
PORTVERSION= 4.1.0
+PORTREVISION= 1
CATEGORIES= security rubygems
MASTER_SITES= RG
@@ -11,7 +12,7 @@ LICENSE= MIT
LICENSE_FILE= ${WRKSRC}/LICENSE.txt
RUN_DEPENDS= rubygem-omniauth>=2.0<3:security/rubygem-omniauth \
- rubygem-omniauth-oauth2>=1.8.0<1.9:net/rubygem-omniauth-oauth2
+ rubygem-omniauth-oauth2>=1.8.0<2:net/rubygem-omniauth-oauth2
USES= gem
diff --git a/security/rubygem-omniauth-gitlab/files/patch-gemspec b/security/rubygem-omniauth-gitlab/files/patch-gemspec
new file mode 100644
index 000000000000..6b516a7acf8a
--- /dev/null
+++ b/security/rubygem-omniauth-gitlab/files/patch-gemspec
@@ -0,0 +1,11 @@
+--- omniauth-gitlab.gemspec.orig 2025-12-18 13:25:02 UTC
++++ omniauth-gitlab.gemspec
+@@ -20,7 +20,7 @@ Gem::Specification.new do |s|
+ s.specification_version = 4
+
+ s.add_runtime_dependency(%q<omniauth>.freeze, ["~> 2.0".freeze])
+- s.add_runtime_dependency(%q<omniauth-oauth2>.freeze, ["~> 1.8.0".freeze])
++ s.add_runtime_dependency(%q<omniauth-oauth2>.freeze, ["~> 1.8".freeze])
+ s.add_development_dependency(%q<rspec>.freeze, ["~> 3.1".freeze])
+ s.add_development_dependency(%q<rspec-its>.freeze, ["~> 1.0".freeze])
+ s.add_development_dependency(%q<simplecov>.freeze, [">= 0".freeze])
diff --git a/security/rubygem-openssl-ccm/Makefile b/security/rubygem-openssl-ccm/Makefile
index 615466c3d016..3ebafaebf291 100644
--- a/security/rubygem-openssl-ccm/Makefile
+++ b/security/rubygem-openssl-ccm/Makefile
@@ -1,5 +1,6 @@
PORTNAME= openssl-ccm
PORTVERSION= 1.3.0
+PORTREVISION= 1
CATEGORIES= security rubygems
MASTER_SITES= RG
@@ -10,7 +11,7 @@ WWW= https://github.com/SmallLars/openssl-ccm
LICENSE= MIT
LICENSE_FILE= ${WRKSRC}/LICENSE
-RUN_DEPENDS= rubygem-openssl>=3.0<4:security/rubygem-openssl
+RUN_DEPENDS= rubygem-openssl>=3.0:security/rubygem-openssl
USES= gem
diff --git a/security/rubygem-openssl-ccm/files/patch-gemspec b/security/rubygem-openssl-ccm/files/patch-gemspec
new file mode 100644
index 000000000000..eab39d40b2de
--- /dev/null
+++ b/security/rubygem-openssl-ccm/files/patch-gemspec
@@ -0,0 +1,10 @@
+--- openssl-ccm.gemspec.orig 2025-12-18 12:39:52 UTC
++++ openssl-ccm.gemspec
+@@ -24,6 +24,6 @@ Gem::Specification.new do |s|
+
+ s.specification_version = 4
+
+- s.add_runtime_dependency(%q<openssl>.freeze, ["~> 3.0".freeze])
++ s.add_runtime_dependency(%q<openssl>.freeze, [">= 3.0".freeze])
+ end
+
diff --git a/security/rubygem-openssl-cmac/Makefile b/security/rubygem-openssl-cmac/Makefile
index 42b63866830e..39b14194ace1 100644
--- a/security/rubygem-openssl-cmac/Makefile
+++ b/security/rubygem-openssl-cmac/Makefile
@@ -1,5 +1,6 @@
PORTNAME= openssl-cmac
PORTVERSION= 2.1.0
+PORTREVISION= 1
CATEGORIES= security rubygems
MASTER_SITES= RG
@@ -10,7 +11,7 @@ WWW= https://github.com/SmallLars/openssl-cmac
LICENSE= MIT
LICENSE_FILE= ${WRKSRC}/LICENSE
-RUN_DEPENDS= rubygem-openssl>=3.0<4:security/rubygem-openssl
+RUN_DEPENDS= rubygem-openssl>=3.0:security/rubygem-openssl
USES= gem
diff --git a/security/rubygem-openssl-cmac/files/patch-gemspec b/security/rubygem-openssl-cmac/files/patch-gemspec
new file mode 100644
index 000000000000..cee7f6932efa
--- /dev/null
+++ b/security/rubygem-openssl-cmac/files/patch-gemspec
@@ -0,0 +1,10 @@
+--- openssl-cmac.gemspec.orig 2025-12-18 12:47:47 UTC
++++ openssl-cmac.gemspec
+@@ -24,6 +24,6 @@ Gem::Specification.new do |s|
+
+ s.specification_version = 4
+
+- s.add_runtime_dependency(%q<openssl>.freeze, ["~> 3.0".freeze])
++ s.add_runtime_dependency(%q<openssl>.freeze, [">= 3.0".freeze])
+ end
+
diff --git a/security/rubygem-openssl/Makefile b/security/rubygem-openssl/Makefile
index ae4449b2d1df..92332acebf00 100644
--- a/security/rubygem-openssl/Makefile
+++ b/security/rubygem-openssl/Makefile
@@ -1,5 +1,5 @@
PORTNAME= openssl
-PORTVERSION= 3.3.2
+PORTVERSION= 4.0.0
CATEGORIES= security rubygems
MASTER_SITES= RG
diff --git a/security/rubygem-openssl/distinfo b/security/rubygem-openssl/distinfo
index 2b626fe628f7..163e6f6f2d63 100644
--- a/security/rubygem-openssl/distinfo
+++ b/security/rubygem-openssl/distinfo
@@ -1,3 +1,3 @@
-TIMESTAMP = 1762587464
-SHA256 (rubygem/openssl-3.3.2.gem) = 7f4e01215dc9c4be1fca71d692406be3e6340b39c1f71a47fea9c497decd0f6c
-SIZE (rubygem/openssl-3.3.2.gem) = 207872
+TIMESTAMP = 1766036631
+SHA256 (rubygem/openssl-4.0.0.gem) = 185711ed93d4e9c9a9db6efea7edb202dfe04f7d3692fbab988e3d84e498ee91
+SIZE (rubygem/openssl-4.0.0.gem) = 205824
diff --git a/security/rubygem-openssl3/Makefile b/security/rubygem-openssl3/Makefile
new file mode 100644
index 000000000000..089448e21b7f
--- /dev/null
+++ b/security/rubygem-openssl3/Makefile
@@ -0,0 +1,22 @@
+PORTNAME= openssl
+PORTVERSION= 3.3.2
+CATEGORIES= security rubygems
+MASTER_SITES= RG
+PKGNAMESUFFIX= 3
+
+MAINTAINER= sunpoet@FreeBSD.org
+COMMENT= Wrap the OpenSSL library
+WWW= https://github.com/ruby/openssl
+
+LICENSE= BSD2CLAUSE RUBY
+LICENSE_COMB= dual
+LICENSE_FILE_BSD2CLAUSE=${WRKSRC}/BSDL
+LICENSE_FILE_RUBY= ${WRKSRC}/COPYING
+
+USES= cpe gem ssl
+
+CPE_VENDOR= ruby-lang
+
+PORTSCOUT= limit:^3\.
+
+.include <bsd.port.mk>
diff --git a/security/rubygem-openssl3/distinfo b/security/rubygem-openssl3/distinfo
new file mode 100644
index 000000000000..2b626fe628f7
--- /dev/null
+++ b/security/rubygem-openssl3/distinfo
@@ -0,0 +1,3 @@
+TIMESTAMP = 1762587464
+SHA256 (rubygem/openssl-3.3.2.gem) = 7f4e01215dc9c4be1fca71d692406be3e6340b39c1f71a47fea9c497decd0f6c
+SIZE (rubygem/openssl-3.3.2.gem) = 207872
diff --git a/security/rubygem-openssl3/pkg-descr b/security/rubygem-openssl3/pkg-descr
new file mode 100644
index 000000000000..a5823175eba3
--- /dev/null
+++ b/security/rubygem-openssl3/pkg-descr
@@ -0,0 +1,2 @@
+OpenSSL provides SSL, TLS and general purpose cryptography. This gem wraps the
+OpenSSL library.
diff --git a/security/rubygem-sshkit/Makefile b/security/rubygem-sshkit/Makefile
index 5c344199b86d..8bf216712600 100644
--- a/security/rubygem-sshkit/Makefile
+++ b/security/rubygem-sshkit/Makefile
@@ -1,5 +1,5 @@
PORTNAME= sshkit
-PORTVERSION= 1.24.0
+PORTVERSION= 1.25.0
CATEGORIES= security rubygems
MASTER_SITES= RG
diff --git a/security/rubygem-sshkit/distinfo b/security/rubygem-sshkit/distinfo
index 55ba18e42ad9..cedb89a63ca2 100644
--- a/security/rubygem-sshkit/distinfo
+++ b/security/rubygem-sshkit/distinfo
@@ -1,3 +1,3 @@
-TIMESTAMP = 1739117570
-SHA256 (rubygem/sshkit-1.24.0.gem) = 9597c1f984778ae9742f2dc839778d57a6a2efb868107046575c52ac7c628e6c
-SIZE (rubygem/sshkit-1.24.0.gem) = 145920
+TIMESTAMP = 1766036633
+SHA256 (rubygem/sshkit-1.25.0.gem) = c8c6543cdb60f91f1d277306d585dd11b6a064cb44eab0972827e4311ff96744
+SIZE (rubygem/sshkit-1.25.0.gem) = 145920
diff --git a/security/shibboleth-sp/Makefile b/security/shibboleth-sp/Makefile
index 96c934a50720..717e69651aad 100644
--- a/security/shibboleth-sp/Makefile
+++ b/security/shibboleth-sp/Makefile
@@ -1,5 +1,5 @@
PORTNAME= shibboleth-sp
-PORTVERSION= 3.5.1
+PORTVERSION= 3.5.2
CATEGORIES= security www
MASTER_SITES= http://shibboleth.net/downloads/service-provider/${PORTVERSION}/
diff --git a/security/shibboleth-sp/distinfo b/security/shibboleth-sp/distinfo
index 34c8b575369e..299262fd188e 100644
--- a/security/shibboleth-sp/distinfo
+++ b/security/shibboleth-sp/distinfo
@@ -1,3 +1,3 @@
-TIMESTAMP = 1756924496
-SHA256 (shibboleth-sp-3.5.1.tar.bz2) = 05da3a09d76c3ba1a5ddd7f919fd942be2d87025f214aba139c2b64b804f9a99
-SIZE (shibboleth-sp-3.5.1.tar.bz2) = 837446
+TIMESTAMP = 1766097097
+SHA256 (shibboleth-sp-3.5.2.tar.bz2) = c4e92c11e56adaa5ea480aba1d78c5f30fbd5d1badb4a13bdd85684bd801298a
+SIZE (shibboleth-sp-3.5.2.tar.bz2) = 838391
diff --git a/security/shibboleth-sp/pkg-plist b/security/shibboleth-sp/pkg-plist
index 0111f1e8eb89..45597aa2884f 100644
--- a/security/shibboleth-sp/pkg-plist
+++ b/security/shibboleth-sp/pkg-plist
@@ -92,7 +92,7 @@ include/shibsp/util/TemplateParameters.h
include/shibsp/version.h
lib/libshibsp.so
lib/libshibsp.so.12
-lib/libshibsp.so.12.0.1
+lib/libshibsp.so.12.0.2
lib/shibboleth/adfs-lite.so
lib/shibboleth/adfs.so
@comment %%MEMCACHED%%lib/shibboleth/memcache-store.so
@@ -104,7 +104,7 @@ lib/shibboleth/plugins.so
%%FASTCGI%%lib/shibboleth/shibresponder
lib/libshibsp-lite.so
lib/libshibsp-lite.so.12
-lib/libshibsp-lite.so.12.0.1
+lib/libshibsp-lite.so.12.0.2
libdata/pkgconfig/shibsp-lite.pc
libdata/pkgconfig/shibsp.pc
sbin/shibd
diff --git a/security/snuffleupagus/Makefile b/security/snuffleupagus/Makefile
index 5783534cd0a0..51cb5fe20f1d 100644
--- a/security/snuffleupagus/Makefile
+++ b/security/snuffleupagus/Makefile
@@ -8,7 +8,7 @@ PKGNAMEPREFIX= ${PHP_PKGNAMEPREFIX}
PATCH_SITES= https://github.com/${GH_ACCOUNT}/${PORTNAME}/commit/
PATCHFILES= b005df2.patch:-p2
-MAINTAINER= franco@opnsense.org
+MAINTAINER= ports@FreeBSD.org
COMMENT= Security module for PHP
WWW= https://snuffleupagus.readthedocs.io/
diff --git a/security/sqlmap/Makefile b/security/sqlmap/Makefile
index b22c8675730e..5ce8ab82c277 100644
--- a/security/sqlmap/Makefile
+++ b/security/sqlmap/Makefile
@@ -1,5 +1,5 @@
PORTNAME= sqlmap
-PORTVERSION= 1.8
+PORTVERSION= 1.9.12
CATEGORIES= security python
MASTER_SITES= PYPI
PKGNAMEPREFIX= ${PYTHON_PKGNAMEPREFIX}
@@ -18,7 +18,10 @@ RUN_DEPENDS= ${PYTHON_PKGNAMEPREFIX}sqlite3>0:databases/py-sqlite3@${PY_FLAVOR}
USES= python shebangfix
USE_PYTHON= autoplist pep517
-SHEBANG_FILES= *.py sqlmap/extra/shutils/*.sh sqlmap/extra/shutils/*.py
+SHEBANG_FILES= *.py sqlmap/extra/shutils/*.sh sqlmap/extra/shutils/*.py \
+ sqlmap/plugins/dbms/clickhouse/*.py \
+ sqlmap/thirdparty/identywaf/identYwaf.py
+
NO_ARCH= yes
OPTIONS_DEFINE= MSF
diff --git a/security/sqlmap/distinfo b/security/sqlmap/distinfo
index 396332c41449..ea6d5a319c34 100644
--- a/security/sqlmap/distinfo
+++ b/security/sqlmap/distinfo
@@ -1,3 +1,3 @@
-TIMESTAMP = 1716077230
-SHA256 (sqlmap-1.8.tar.gz) = 8dbb204ee36e57c123ff50f042345174dfd262f3ed0a044ed8d7251379472ba1
-SIZE (sqlmap-1.8.tar.gz) = 7208171
+TIMESTAMP = 1766217194
+SHA256 (sqlmap-1.9.12.tar.gz) = 0b3f37ccb8c6aaf0e3c15166322e001c1f0961bc601e44272875d5c32c44a757
+SIZE (sqlmap-1.9.12.tar.gz) = 7216017
diff --git a/security/suricata/Makefile b/security/suricata/Makefile
index 6d56f51eba60..14275450849d 100644
--- a/security/suricata/Makefile
+++ b/security/suricata/Makefile
@@ -4,7 +4,7 @@ PORTREVISION= 1
CATEGORIES= security
MASTER_SITES= https://www.openinfosecfoundation.org/download/
-MAINTAINER= franco@opnsense.org
+MAINTAINER= bofh@FreeBSD.org
COMMENT= High Performance Network IDS, IPS and Security Monitoring engine
WWW= https://suricata.io
diff --git a/security/vuxml/vuln/2025.xml b/security/vuxml/vuln/2025.xml
index 8daf847a93d7..3fa157e87559 100644
--- a/security/vuxml/vuln/2025.xml
+++ b/security/vuxml/vuln/2025.xml
@@ -1,3 +1,168 @@
+ <vuln vid="dc7e30db-de67-11f0-b893-5404a68ad561">
+ <topic>traefik -- Inverted TLS Verification Logic in Kubernetes NGINX Provider</topic>
+ <affects>
+<package>
+<name>traefik</name>
+<range><lt>3.6.3</lt></range>
+</package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>The traefik project reports:</p>
+ <blockquote cite="https://github.com/traefik/traefik/security/advisories/GHSA-7vww-mvcr-x6vj">
+ <p>
+ There is a potential vulnerability in Traefik NGINX
+ provider managing the
+ nginx.ingress.kubernetes.io/proxy-ssl-verify annotation.
+ The provider inverts the semantics of the
+ nginx.ingress.kubernetes.io/proxy-ssl-verify annotation.
+ Setting the annotation to "on" (intending to enable
+ backend TLS certificate verification) actually disables
+ verification, allowing man-in-the-middle attacks against
+ HTTPS backends when operators believe they are
+ protected.
+ </p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2025-66491</cvename>
+ <url>https://nvd.nist.gov/vuln/detail/CVE-2025-66491</url>
+ </references>
+ <dates>
+ <discovery>2025-12-08</discovery>
+ <entry>2025-12-21</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="91b9790e-de65-11f0-b893-5404a68ad561">
+ <topic>traefik -- Bypassing security controls via special characters</topic>
+ <affects>
+<package>
+<name>traefik</name>
+<range><lt>3.6.3</lt></range>
+</package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>The traefik project reports:</p>
+ <blockquote cite="https://github.com/traefik/traefik/security/advisories/GHSA-gm3x-23wp-hc2c">
+ <p>There is a potential vulnerability in Traefik managing
+ the requests using a PathPrefix, Path or PathRegex
+ matcher.
+ When Traefik is configured to route the requests to a
+ backend using a matcher based on the path; if the
+ request path contains an encoded restricted character
+ from the following set ('/', '', 'Null', ';', '?', '#'),
+ it is possible to target a backend, exposed using
+ another router, by-passing the middlewares chain.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2025-66490</cvename>
+ <url>https://nvd.nist.gov/vuln/detail/CVE-2025-66490</url>
+ </references>
+ <dates>
+ <discovery>2025-12-08</discovery>
+ <entry>2025-12-21</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="c32cb4b7-ddcb-11f0-902c-b42e991fc52e">
+ <topic>smb4k -- Critical vulnerabilities in Mount Helper</topic>
+ <affects>
+<package>
+<name>smb4k</name>
+<range><lt>4.0.4</lt></range>
+</package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>vulndb reports:</p>
+ <blockquote cite="https://vuldb.com/?id.336198">
+ <p>A vulnerability, which was classified as critical, was
+ found in smb4k up to 4.0.4. Affected is some unknown
+ functionality of the component Mount Helper. The
+ manipulation with an unknown input leads to a access control
+ vulnerability. CWE is classifying the issue as CWE-284. The
+ product does not restrict or incorrectly restricts access to
+ a resource from an unauthorized actor. This is going to have
+ an impact on integrity, and availability. The advisory is
+ available at seclists.org. The exploitability is told to be
+ easy. Local access is required to approach this attack. The
+ technical details are unknown and an exploit is not
+ available.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2025-66002</cvename>
+ <url>https://vuldb.com/?id.336198</url>
+ <cvename>CVE-2025-66003</cvename>
+ <url>https://vuldb.com/?id.336199</url>
+ </references>
+ <dates>
+ <discovery>2025-12-20</discovery>
+ <entry>2025-12-20</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="2a33d28e-ddc0-11f0-902c-b42e991fc52e">
+ <topic>Firefox -- Use-after-free</topic>
+ <affects>
+ <package>
+ <name>firefox</name>
+ <range><lt>146.0.1,2</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>https://bugzilla.mozilla.org/show_bug.cgi?id=2000597 reports:</p>
+ <blockquote cite="https://bugzilla.mozilla.org/show_bug.cgi?id=2000597">
+ <p>Use-after-free in the Disability Access APIs component.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2025-14860</cvename>
+ <url>https://cveawg.mitre.org/api/cve/CVE-2025-14860</url>
+ </references>
+ <dates>
+ <discovery>2025-12-18</discovery>
+ <entry>2025-12-20</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="23437e07-ddc0-11f0-902c-b42e991fc52e">
+ <topic>Firefox -- Memory safety bugs</topic>
+ <affects>
+ <package>
+ <name>firefox</name>
+ <range><lt>146.0.1,2</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>https://bugzilla.mozilla.org/buglist.cgi?bug_id=1996570%2C1999700 reports:</p>
+ <blockquote cite="https://bugzilla.mozilla.org/buglist.cgi?bug_id=1996570%2C1999700">
+ <p>Memory safety bugs present in Firefox 146. Some of these
+ bugs showed evidence of memory corruption and we presume
+ that with enough effort some of these could have been
+ exploited to run arbitrary code.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2025-14861</cvename>
+ <url>https://cveawg.mitre.org/api/cve/CVE-2025-14861</url>
+ </references>
+ <dates>
+ <discovery>2025-12-18</discovery>
+ <entry>2025-12-20</entry>
+ </dates>
+ </vuln>
+
<vuln vid="f99e70c2-dcb8-11f0-a15a-a8a1599412c6">
<topic>chromium -- multiple security fixes</topic>
<affects>
diff --git a/security/wazuh-manager/distinfo b/security/wazuh-manager/distinfo
index b6ada3611ec3..2dcbd4f32364 100644
--- a/security/wazuh-manager/distinfo
+++ b/security/wazuh-manager/distinfo
@@ -67,12 +67,12 @@ SHA256 (wazuh-4.14.1/wazuh-cache-fbsd14-amd64-4.14.1.tar.gz) = f2b26a36b116348e3
SIZE (wazuh-4.14.1/wazuh-cache-fbsd14-amd64-4.14.1.tar.gz) = 25055515
SHA256 (wazuh-4.14.1/wazuh-cache-fbsd15-aarch64-4.14.1.tar.gz) = c63484af8fd157f61b6bf0297b4233c3e2a3eee481f35c7d15fcb5b90d711489
SIZE (wazuh-4.14.1/wazuh-cache-fbsd15-aarch64-4.14.1.tar.gz) = 24690859
-SHA256 (wazuh-4.14.1/wazuh-cache-fbsd15-amd64-4.14.1.tar.gz) = bf77697d47df3eeb6ccc0d1e43841f5dd3570a7e11e8dd669d5098890b985657
-SIZE (wazuh-4.14.1/wazuh-cache-fbsd15-amd64-4.14.1.tar.gz) = 26650464
+SHA256 (wazuh-4.14.1/wazuh-cache-fbsd15-amd64-4.14.1.tar.gz) = 3818a9e752e29e661d4b577b3fb0a5a8bf691da6bde264453f2323d37b46408e
+SIZE (wazuh-4.14.1/wazuh-cache-fbsd15-amd64-4.14.1.tar.gz) = 26650237
SHA256 (wazuh-4.14.1/wazuh-cache-fbsd16-aarch64-4.14.1.tar.gz) = 1510ef710bcae78e22db88f443504d006e9e4b45d27c66bb84984211409f7e65
SIZE (wazuh-4.14.1/wazuh-cache-fbsd16-aarch64-4.14.1.tar.gz) = 24863114
-SHA256 (wazuh-4.14.1/wazuh-cache-fbsd16-amd64-4.14.1.tar.gz) = f706a10b1e31dc959e1751a015b3ec2e74ddbda0362ab192ba3918852731635c
-SIZE (wazuh-4.14.1/wazuh-cache-fbsd16-amd64-4.14.1.tar.gz) = 26653845
+SHA256 (wazuh-4.14.1/wazuh-cache-fbsd16-amd64-4.14.1.tar.gz) = 03e92ad3b8cc1d06f9e31d07aa13d1ba3dca85b302d869ec5ec3a2b517d3dbf0
+SIZE (wazuh-4.14.1/wazuh-cache-fbsd16-amd64-4.14.1.tar.gz) = 26653557
SHA256 (wazuh-4.14.1/wazuh-wazuh-v4.14.1_GH0.tar.gz) = aa59cb2baa7e7d38d8bb4ff6a22afbf2945de4fb555f9b8bb2657b6f89a773ed
SIZE (wazuh-4.14.1/wazuh-wazuh-v4.14.1_GH0.tar.gz) = 19810038
SHA256 (wazuh-4.14.1/alonsobsd-wazuh-freebsd-2f1307c_GH0.tar.gz) = a955c569217122779ab5b6b58bdfabbfa1cd452b4719cc35c791f7047b1f364f
diff --git a/security/xray-core/Makefile b/security/xray-core/Makefile
index 8874c68da3a4..744509ed5a3c 100644
--- a/security/xray-core/Makefile
+++ b/security/xray-core/Makefile
@@ -1,6 +1,7 @@
PORTNAME= xray-core
DISTVERSIONPREFIX= v
DISTVERSION= 25.12.8
+PORTREVISION= 1
CATEGORIES= security
MASTER_SITES= https://github.com/v2fly/geoip/releases/download/202512050148/:geoip \
https://github.com/v2fly/domain-list-community/releases/download/20251212112114/:geosite
diff --git a/security/xray-core/files/xray.in b/security/xray-core/files/xray.in
index 87516c9759d0..18c9beeb4f5c 100644
--- a/security/xray-core/files/xray.in
+++ b/security/xray-core/files/xray.in
@@ -20,6 +20,8 @@
name="xray"
rcvar="xray_enable"
+load_rc_config "$name"
+
: ${xray_enable="NO"}
: ${xray_config="%%PREFIX%%/etc/${name}-core"}
: ${xray_logdir="/var/log/${name}-core"}
@@ -43,5 +45,4 @@ xray_startprecmd() {
chown -R ${xray_user}:${xray_group} "${xray_logdir}"
}
-load_rc_config "$name"
run_rc_command "$1"