summaryrefslogtreecommitdiff
path: root/security
diff options
context:
space:
mode:
Diffstat (limited to 'security')
-rw-r--r--security/arti/files/patch-powerpc64le20
-rw-r--r--security/liboqs/Makefile3
-rw-r--r--security/nuclei/Makefile2
-rw-r--r--security/nuclei/distinfo10
-rw-r--r--security/py-pwntools/Makefile11
-rw-r--r--security/rustls-ffi/files/patch-powerpc64le38
-rw-r--r--security/snort3/Makefile2
-rw-r--r--security/snort3/distinfo6
-rw-r--r--security/snort3/pkg-plist1
-rw-r--r--security/vuxml/vuln/2025.xml143
10 files changed, 222 insertions, 14 deletions
diff --git a/security/arti/files/patch-powerpc64le b/security/arti/files/patch-powerpc64le
new file mode 100644
index 000000000000..c70aea7304f9
--- /dev/null
+++ b/security/arti/files/patch-powerpc64le
@@ -0,0 +1,20 @@
+Obtained from: https://cgit.FreeBSD.org/ports/commit/?id=f08b67611f0b19c0ee8d9053ee4d22e09b03f2b1
+
+--- cargo-crates/aws-lc-sys-0.29.0/aws-lc/crypto/fipsmodule/cpucap/cpu_ppc64le.c.orig 2024-07-03 21:50:24 UTC
++++ cargo-crates/aws-lc-sys-0.29.0/aws-lc/crypto/fipsmodule/cpucap/cpu_ppc64le.c
+@@ -69,10 +69,15 @@ void OPENSSL_cpuid_setup(void) {
+
+ void OPENSSL_cpuid_setup(void) {
+ #if defined(AT_HWCAP2)
++#if defined(__linux__)
+ OPENSSL_ppc64le_hwcap2 = getauxval(AT_HWCAP2);
++#elif defined(__FreeBSD__)
++ elf_aux_info(AT_HWCAP2, &OPENSSL_ppc64le_hwcap2, sizeof(OPENSSL_ppc64le_hwcap2));
++#endif
+ #else
+ OPENSSL_ppc64le_hwcap2 = 0;
+ #endif
++
+ OPENSSL_cpucap_initialized = 1;
+
+ // OPENSSL_ppccap is a 64-bit hex string which may start with "0x".
diff --git a/security/liboqs/Makefile b/security/liboqs/Makefile
index dd3ff28871c0..2a53bfa1bb1b 100644
--- a/security/liboqs/Makefile
+++ b/security/liboqs/Makefile
@@ -1,5 +1,6 @@
PORTNAME= liboqs
DISTVERSION= 0.13.0
+PORTREVISION= 1
CATEGORIES= security
MAINTAINER= yuri@FreeBSD.org
@@ -31,7 +32,7 @@ BINARY_ALIAS= python3=${PYTHON_CMD}
.include <bsd.port.options.mk>
-.if ${ARCH} == amd64 || ${ARCH} == aarch64 || ${ARCH} == risc64
+.if ${ARCH} == amd64 || ${ARCH} == aarch64 || ${ARCH} == risc64 || ${ARCH} == powerpc64le
PLIST_SUB+= KEM_BIKE="" # BIKE algorithm is limited by architecture in .CMake/alg_support.cmake
.else
PLIST_SUB+= KEM_BIKE="@comment "
diff --git a/security/nuclei/Makefile b/security/nuclei/Makefile
index bf4fd87882ba..ff4ce951c803 100644
--- a/security/nuclei/Makefile
+++ b/security/nuclei/Makefile
@@ -1,6 +1,6 @@
PORTNAME= nuclei
DISTVERSIONPREFIX= v
-DISTVERSION= 3.4.5
+DISTVERSION= 3.4.6
CATEGORIES= security
MAINTAINER= dutra@FreeBSD.org
diff --git a/security/nuclei/distinfo b/security/nuclei/distinfo
index e4cf46444ae0..fb33bee95717 100644
--- a/security/nuclei/distinfo
+++ b/security/nuclei/distinfo
@@ -1,5 +1,5 @@
-TIMESTAMP = 1750899492
-SHA256 (go/security_nuclei/nuclei-v3.4.5/v3.4.5.mod) = 5afbb1c8d97f83b0d2b11bd9bf677f5b88043b95241def65c6cdf11d290bbdbe
-SIZE (go/security_nuclei/nuclei-v3.4.5/v3.4.5.mod) = 17916
-SHA256 (go/security_nuclei/nuclei-v3.4.5/v3.4.5.zip) = d88771513264794e0f2acb6c03682492363addc36b92c80330fb25ff747462ac
-SIZE (go/security_nuclei/nuclei-v3.4.5/v3.4.5.zip) = 12383461
+TIMESTAMP = 1751730063
+SHA256 (go/security_nuclei/nuclei-v3.4.6/v3.4.6.mod) = 95c7844c02f7c9c24a53544e7bcdfd252a11c8fb61a80f555fbffd6dfaf402a6
+SIZE (go/security_nuclei/nuclei-v3.4.6/v3.4.6.mod) = 18995
+SHA256 (go/security_nuclei/nuclei-v3.4.6/v3.4.6.zip) = 6ea753633305e332bcfd8af6b0e6f7042ebf6a1751bc27c3536f535c4b4c3c40
+SIZE (go/security_nuclei/nuclei-v3.4.6/v3.4.6.zip) = 12374607
diff --git a/security/py-pwntools/Makefile b/security/py-pwntools/Makefile
index 6451f8ce529e..187252876f64 100644
--- a/security/py-pwntools/Makefile
+++ b/security/py-pwntools/Makefile
@@ -1,5 +1,6 @@
PORTNAME= pwntools
-PORTVERSION= 4.14.1
+DISTVERSION= 4.14.1
+PORTREVISION= 2
CATEGORIES= security python
MASTER_SITES= PYPI
PKGNAMEPREFIX= ${PYTHON_PKGNAMEPREFIX}
@@ -13,7 +14,6 @@ LICENSE_COMB= multi
RUN_DEPENDS= ${PYTHON_PKGNAMEPREFIX}capstone>=3.0.5rc2:devel/py-capstone@${PY_FLAVOR} \
${PYTHON_PKGNAMEPREFIX}colored-traceback>0:devel/py-colored-traceback@${PY_FLAVOR} \
- ${PYTHON_PKGNAMEPREFIX}python-dateutil>0:devel/py-python-dateutil@${PY_FLAVOR} \
${PYTHON_PKGNAMEPREFIX}intervaltree>=3.0:devel/py-intervaltree@${PY_FLAVOR} \
${PYTHON_PKGNAMEPREFIX}mako>=1.0.0:textproc/py-mako@${PY_FLAVOR} \
${PYTHON_PKGNAMEPREFIX}packaging>=0:devel/py-packaging@${PY_FLAVOR} \
@@ -24,6 +24,7 @@ RUN_DEPENDS= ${PYTHON_PKGNAMEPREFIX}capstone>=3.0.5rc2:devel/py-capstone@${PY_FL
${PYTHON_PKGNAMEPREFIX}pygments>=2.9:textproc/py-pygments@${PY_FLAVOR} \
${PYTHON_PKGNAMEPREFIX}pyserial>=2.7:comms/py-pyserial@${PY_FLAVOR} \
${PYTHON_PKGNAMEPREFIX}pysocks>0:net/py-pysocks@${PY_FLAVOR} \
+ ${PYTHON_PKGNAMEPREFIX}python-dateutil>0:devel/py-python-dateutil@${PY_FLAVOR} \
${PYTHON_PKGNAMEPREFIX}requests>=2.0:www/py-requests@${PY_FLAVOR} \
${PYTHON_PKGNAMEPREFIX}ropgadget>0:security/py-ropgadget@${PY_FLAVOR} \
${PYTHON_PKGNAMEPREFIX}rpyc>0:devel/py-RPyC@${PY_FLAVOR} \
@@ -35,4 +36,8 @@ USES= cpe python
CPE_VENDOR= pwntools_project
USE_PYTHON= autoplist concurrent distutils
-.include <bsd.port.mk>
+.include <bsd.port.pre.mk>
+
+PYDISTUTILS_INSTALLARGS+= --only-use-pwn-command
+
+.include <bsd.port.post.mk>
diff --git a/security/rustls-ffi/files/patch-powerpc64le b/security/rustls-ffi/files/patch-powerpc64le
new file mode 100644
index 000000000000..213395b8e26c
--- /dev/null
+++ b/security/rustls-ffi/files/patch-powerpc64le
@@ -0,0 +1,38 @@
+Obtained from: https://cgit.FreeBSD.org/ports/commit/?id=f08b67611f0b19c0ee8d9053ee4d22e09b03f2b1
+
+--- cargo-crates/aws-lc-fips-sys-0.13.0/aws-lc/crypto/fipsmodule/cpucap/cpu_ppc64le.c.orig 2024-07-03 21:50:24 UTC
++++ cargo-crates/aws-lc-fips-sys-0.13.0/aws-lc/crypto/fipsmodule/cpucap/cpu_ppc64le.c
+@@ -69,10 +69,15 @@ void OPENSSL_cpuid_setup(void) {
+
+ void OPENSSL_cpuid_setup(void) {
+ #if defined(AT_HWCAP2)
++#if defined(__linux__)
+ OPENSSL_ppc64le_hwcap2 = getauxval(AT_HWCAP2);
++#elif defined(__FreeBSD__)
++ elf_aux_info(AT_HWCAP2, &OPENSSL_ppc64le_hwcap2, sizeof(OPENSSL_ppc64le_hwcap2));
++#endif
+ #else
+ OPENSSL_ppc64le_hwcap2 = 0;
+ #endif
++
+ OPENSSL_cpucap_initialized = 1;
+
+ // OPENSSL_ppccap is a 64-bit hex string which may start with "0x".
+--- cargo-crates/aws-lc-sys-0.24.0/aws-lc/crypto/fipsmodule/cpucap/cpu_ppc64le.c.orig 2024-07-03 21:50:24 UTC
++++ cargo-crates/aws-lc-sys-0.24.0/aws-lc/crypto/fipsmodule/cpucap/cpu_ppc64le.c
+@@ -69,10 +69,15 @@ void OPENSSL_cpuid_setup(void) {
+
+ void OPENSSL_cpuid_setup(void) {
+ #if defined(AT_HWCAP2)
++#if defined(__linux__)
+ OPENSSL_ppc64le_hwcap2 = getauxval(AT_HWCAP2);
++#elif defined(__FreeBSD__)
++ elf_aux_info(AT_HWCAP2, &OPENSSL_ppc64le_hwcap2, sizeof(OPENSSL_ppc64le_hwcap2));
++#endif
+ #else
+ OPENSSL_ppc64le_hwcap2 = 0;
+ #endif
++
+ OPENSSL_cpucap_initialized = 1;
+
+ // OPENSSL_ppccap is a 64-bit hex string which may start with "0x".
diff --git a/security/snort3/Makefile b/security/snort3/Makefile
index 833bdf00cb11..59912933c61c 100644
--- a/security/snort3/Makefile
+++ b/security/snort3/Makefile
@@ -1,5 +1,5 @@
PORTNAME= snort
-DISTVERSION= 3.9.0.0
+DISTVERSION= 3.9.1.0
PORTEPOCH= 1
CATEGORIES= security
PKGNAMESUFFIX= 3
diff --git a/security/snort3/distinfo b/security/snort3/distinfo
index 043da5daa3cb..948c3a03b335 100644
--- a/security/snort3/distinfo
+++ b/security/snort3/distinfo
@@ -1,3 +1,3 @@
-TIMESTAMP = 1751444666
-SHA256 (snort3-snort3-3.9.0.0_GH0.tar.gz) = a294be2921440ec39a265e770c15dc52ab011918c6fd288d99e442ceb12f961d
-SIZE (snort3-snort3-3.9.0.0_GH0.tar.gz) = 3484705
+TIMESTAMP = 1751623929
+SHA256 (snort3-snort3-3.9.1.0_GH0.tar.gz) = fc19f20cd34192eb78f28d7f128c79c5d0096733277f2b630a8cf892b10f33ce
+SIZE (snort3-snort3-3.9.1.0_GH0.tar.gz) = 3501016
diff --git a/security/snort3/pkg-plist b/security/snort3/pkg-plist
index 67291c403269..ac9338536bea 100644
--- a/security/snort3/pkg-plist
+++ b/security/snort3/pkg-plist
@@ -86,6 +86,7 @@ include/snort/helpers/infractions.h
include/snort/helpers/json_stream.h
include/snort/helpers/literal_search.h
include/snort/helpers/memcap_allocator.h
+include/snort/helpers/ring2.h
include/snort/helpers/scratch_allocator.h
include/snort/helpers/sigsafe.h
include/snort/helpers/utf.h
diff --git a/security/vuxml/vuln/2025.xml b/security/vuxml/vuln/2025.xml
index 6bc7dd3de85f..32a7a8a7559a 100644
--- a/security/vuxml/vuln/2025.xml
+++ b/security/vuxml/vuln/2025.xml
@@ -1,3 +1,146 @@
+ <vuln vid="a55d2120-58cf-11f0-b4ad-b42e991fc52e">
+ <topic>firefox -- multiple vulnerabilities</topic>
+ <affects>
+ <package>
+ <name>firefox</name>
+ <range><lt>140.0,2</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>security@mozilla.org reports:</p>
+ <blockquote cite="https://bugzilla.mozilla.org/buglist.cgi?bug_id=1941377%2C1960948%2C1966187%2C1966505%2C1970764">
+ <p>An attacker was able to bypass the `connect-src`
+ directive of a Content Security Policy by manipulating
+ subdocuments. This would have also hidden the connections
+ from the Network tab in Devtools.</p>
+ <p>When Multi-Account Containers was enabled, DNS requests
+ could have bypassed a SOCKS proxy when the domain name was
+ invalid or the SOCKS proxy was not responding.</p>
+ <p>If a user visited a webpage with an invalid TLS
+ certificate, and granted an exception, the webpage was able to
+ provide a WebAuthn challenge that the user would be prompted
+ to complete. This is in violation of the WebAuthN spec which
+ requires &quot;a secure transport established without
+ errors&quot;.</p>
+ <p>The exception page for the HTTPS-Only feature, displayed
+ when a website is opened via HTTP, lacked an anti-clickjacking
+ delay, potentially allowing an attacker to trick a user into
+ granting an exception and loading a webpage over HTTP.</p>
+ <p>If a user saved a response from the Network tab in Devtools
+ using the Save As context menu option, that file may not have
+ been saved with the `.download` file extension.
+ This could have led to the user inadvertently running a
+ malicious executable.</p>
+ <p>Memory safety bugs present in Firefox 139 and Thunderbird
+ 139. Some of these bugs showed evidence of memory corruption
+ and we presume that with enough effort some of these could
+ have been exploited to run arbitrary code.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2025-6427</cvename>
+ <url>https://nvd.nist.gov/vuln/detail/CVE-2025-6427</url>
+ <cvename>CVE-2025-6432</cvename>
+ <url>https://nvd.nist.gov/vuln/detail/CVE-2025-6432</url>
+ <cvename>CVE-2025-6433</cvename>
+ <url>https://nvd.nist.gov/vuln/detail/CVE-2025-6433</url>
+ <cvename>CVE-2025-6434</cvename>
+ <url>https://nvd.nist.gov/vuln/detail/CVE-2025-6434</url>
+ <cvename>CVE-2025-6435</cvename>
+ <url>https://nvd.nist.gov/vuln/detail/CVE-2025-6435</url>
+ <cvename>CVE-2025-6436</cvename>
+ <url>https://nvd.nist.gov/vuln/detail/CVE-2025-6436</url>
+ </references>
+ <dates>
+ <discovery>2025-06-24</discovery>
+ <entry>2025-07-04</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="9bad6f79-58cf-11f0-b4ad-b42e991fc52e">
+ <topic>firefox -- multiple vulnerabilities</topic>
+ <affects>
+ <package>
+ <name>firefox</name>
+ <range><lt>128.12.0,2</lt></range>
+ <range><lt>140.0,2</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>security@mozilla.org reports:</p>
+ <blockquote cite="https://bugzilla.mozilla.org/show_bug.cgi?id=1971140">
+ <p>Firefox could have incorrectly parsed a URL and rewritten
+ it to the youtube.com domain when parsing the URL specified
+ in an `embed` tag. This could have bypassed website security
+ checks that restricted which domains users were allowed to
+ embed.</p>
+ <p>When a file download is specified via the
+ `Content-Disposition` header, that directive would be ignored
+ if the file was included via a `&amp;lt;embed&amp;gt;` or
+ `&amp;lt;object&amp;gt;` tag, potentially making a website
+ vulnerable to a cross-site scripting attack.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2025-6429</cvename>
+ <url>https://nvd.nist.gov/vuln/detail/CVE-2025-6429</url>
+ <cvename>CVE-2025-6430</cvename>
+ <url>https://nvd.nist.gov/vuln/detail/CVE-2025-6430</url>
+ </references>
+ <dates>
+ <discovery>2025-06-24</discovery>
+ <entry>2025-07-04</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="9320590b-58cf-11f0-b4ad-b42e991fc52e">
+ <topic>Mozilla -- persistent UUID that identifies browser</topic>
+ <affects>
+ <package>
+ <name>firefox</name>
+ <range><lt>140.0,2</lt></range>
+ </package>
+ <package>
+ <name>firefox-esr</name>
+ <range><lt>115.25.0</lt></range>
+ <range><lt>128.12</lt></range>
+ </package>
+ <package>
+ <name>thunderbird</name>
+ <range><lt>140.0</lt></range>
+ </package>
+ <package>
+ <name>thunderbird</name>
+ <range><lt>128.12</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>security@mozilla.org reports:</p>
+ <blockquote cite="https://bugzilla.mozilla.org/show_bug.cgi?id=1717672">
+ <p>An attacker who enumerated resources from the WebCompat extension
+ could have obtained a persistent UUID that identified the browser,
+ and persisted between containers and normal/private browsing mode,
+ but not profiles. This vulnerability affects Firefox &lt; 140,
+ Firefox ESR &lt; 115.25, Firefox ESR &lt; 128.12, Thunderbird &lt;
+ 140, and Thunderbird &lt; 128.12.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2025-6425</cvename>
+ <url>https://nvd.nist.gov/vuln/detail/CVE-2025-6425</url>
+ </references>
+ <dates>
+ <discovery>2025-06-24</discovery>
+ <entry>2025-07-04</entry>
+ </dates>
+ </vuln>
+
<vuln vid="d607b12c-5821-11f0-ab92-f02f7497ecda">
<topic>php -- Multiple vulnerabilities</topic>
<affects>