summaryrefslogtreecommitdiff
path: root/security
diff options
context:
space:
mode:
Diffstat (limited to 'security')
-rw-r--r--security/gokey/Makefile9
-rw-r--r--security/gokey/distinfo12
-rw-r--r--security/gokey/files/patch-go.mod10
-rw-r--r--security/gokey/files/patch-go.sum11
-rw-r--r--security/gokey/files/patch-vendor_modules.txt14
-rw-r--r--security/libp11/Makefile6
-rw-r--r--security/libp11/distinfo6
-rw-r--r--security/libp11/files/patch-configure.ac4
-rw-r--r--security/libp11/files/patch-src_Makefile.am13
-rw-r--r--security/libp11/pkg-plist7
-rw-r--r--security/py-netbox-secrets/Makefile7
-rw-r--r--security/py-netbox-secrets/distinfo6
-rw-r--r--security/py-pyscard/Makefile3
-rw-r--r--security/py-pyscard/distinfo6
-rw-r--r--security/vuls/Makefile4
-rw-r--r--security/vuls/distinfo10
-rw-r--r--security/vuxml/vuln/2025.xml159
-rw-r--r--security/wolfssl/Makefile5
18 files changed, 214 insertions, 78 deletions
diff --git a/security/gokey/Makefile b/security/gokey/Makefile
index d52063e0f7b9..0bf965c28340 100644
--- a/security/gokey/Makefile
+++ b/security/gokey/Makefile
@@ -1,7 +1,6 @@
PORTNAME= gokey
DISTVERSIONPREFIX= v
-DISTVERSION= 0.1.2
-PORTREVISION= 18
+DISTVERSION= 0.1.3
CATEGORIES= security
MAINTAINER= ports@FreeBSD.org
@@ -12,8 +11,6 @@ LICENSE= BSD3CLAUSE
LICENSE_FILE= ${WRKSRC}/LICENSE
USES= go:modules
-USE_GITHUB= nodefault
-GH_TUPLE= golang:sys:v0.6.0:sys
GO_MODULE= github.com/cloudflare/gokey
GO_TARGET= ./cmd/gokey
@@ -24,10 +21,6 @@ PORTDOCS= README.md
OPTIONS_DEFINE= DOCS
-pre-build:
- ${RM} -r ${WRKSRC}/vendor/golang.org/x/sys
- ${LN} -s ${WRKDIR}/sys-* ${WRKSRC}/vendor/golang.org/x/sys
-
do-install-DOCS-on:
@${MKDIR} ${STAGEDIR}${DOCSDIR}
${INSTALL_DATA} ${WRKSRC}/${PORTDOCS} ${STAGEDIR}${DOCSDIR}
diff --git a/security/gokey/distinfo b/security/gokey/distinfo
index 2c8ae8c5be3d..c73bec521cf1 100644
--- a/security/gokey/distinfo
+++ b/security/gokey/distinfo
@@ -1,7 +1,5 @@
-TIMESTAMP = 1679785309
-SHA256 (go/security_gokey/gokey-v0.1.2/v0.1.2.mod) = 950a88925784603d0a9b5af156afc7233601d33ddc237d01d6978f1c2f53e310
-SIZE (go/security_gokey/gokey-v0.1.2/v0.1.2.mod) = 167
-SHA256 (go/security_gokey/gokey-v0.1.2/v0.1.2.zip) = 44c0e33ce53a39d2c1aadb457478faacc46204e2a60c171d48c4c943d38df639
-SIZE (go/security_gokey/gokey-v0.1.2/v0.1.2.zip) = 25411
-SHA256 (go/security_gokey/gokey-v0.1.2/golang-sys-v0.6.0_GH0.tar.gz) = b4f6d17c7a128f76169964b437cb66b3f2dbf9a33361928ec19dfecf7b03fc54
-SIZE (go/security_gokey/gokey-v0.1.2/golang-sys-v0.6.0_GH0.tar.gz) = 1434234
+TIMESTAMP = 1747434941
+SHA256 (go/security_gokey/gokey-v0.1.3/v0.1.3.mod) = ad79ff30a189d8bc2b82304a17d2a9f4aa1f40244a806cf52ef851fbb977d722
+SIZE (go/security_gokey/gokey-v0.1.3/v0.1.3.mod) = 113
+SHA256 (go/security_gokey/gokey-v0.1.3/v0.1.3.zip) = e07dd6921bbea368a26b1445f42709837f1df2d9144739b14bb8c9e6fce944e4
+SIZE (go/security_gokey/gokey-v0.1.3/v0.1.3.zip) = 28472
diff --git a/security/gokey/files/patch-go.mod b/security/gokey/files/patch-go.mod
index 5e7868a42b96..99bcac4b32fe 100644
--- a/security/gokey/files/patch-go.mod
+++ b/security/gokey/files/patch-go.mod
@@ -1,14 +1,14 @@
---- go.mod.orig 2023-03-25 23:03:40 UTC
+--- go.mod.orig 1979-11-29 16:00:00 UTC
+++ go.mod
-@@ -1,8 +1,10 @@
+@@ -1,8 +1,10 @@ module github.com/cloudflare/gokey
module github.com/cloudflare/gokey
-go 1.13
+go 1.17
require (
- golang.org/x/crypto v0.0.0-20220622213112-05595931fe9d
- golang.org/x/term v0.0.0-20201126162022-7de9c90e9dd1
+ golang.org/x/crypto v0.17.0
+ golang.org/x/term v0.15.0
)
+
-+require golang.org/x/sys v0.6.0 // indirect
++require golang.org/x/sys v0.15.0 // indirect
diff --git a/security/gokey/files/patch-go.sum b/security/gokey/files/patch-go.sum
deleted file mode 100644
index cff06eac8113..000000000000
--- a/security/gokey/files/patch-go.sum
+++ /dev/null
@@ -1,11 +0,0 @@
---- go.sum.orig 2023-03-25 23:03:43 UTC
-+++ go.sum
-@@ -5,6 +5,8 @@ golang.org/x/sys v0.0.0-20201119102817-f84b799fce68/go
- golang.org/x/sys v0.0.0-20210423082822-04245dca01da/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
- golang.org/x/sys v0.0.0-20210615035016-665e8c7367d1 h1:SrN+KX8Art/Sf4HNj6Zcz06G7VEz+7w9tdXTPOZ7+l4=
- golang.org/x/sys v0.0.0-20210615035016-665e8c7367d1/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
-+golang.org/x/sys v0.6.0 h1:MVltZSvRTcU2ljQOhs94SXPftV6DCNnZViHeQps87pQ=
-+golang.org/x/sys v0.6.0/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
- golang.org/x/term v0.0.0-20201126162022-7de9c90e9dd1 h1:v+OssWQX+hTHEmOBgwxdZxK4zHq3yOs8F9J7mk0PY8E=
- golang.org/x/term v0.0.0-20201126162022-7de9c90e9dd1/go.mod h1:bj7SfCRtBDWHUb9snDiAeCFNEtKQo2Wmx5Cou7ajbmo=
- golang.org/x/text v0.3.6/go.mod h1:5Zoc/QRtKVWzQhOtBMvqHzDpF6irO9z98xDceosuGiQ=
diff --git a/security/gokey/files/patch-vendor_modules.txt b/security/gokey/files/patch-vendor_modules.txt
index e871e87d957c..e169e8c39333 100644
--- a/security/gokey/files/patch-vendor_modules.txt
+++ b/security/gokey/files/patch-vendor_modules.txt
@@ -1,18 +1,16 @@
---- vendor/modules.txt.orig 2023-03-25 23:04:26 UTC
+--- vendor/modules.txt.orig 2025-05-16 22:37:27 UTC
+++ vendor/modules.txt
-@@ -1,11 +1,14 @@
- # golang.org/x/crypto v0.0.0-20220622213112-05595931fe9d
+@@ -1,10 +1,13 @@
+ # golang.org/x/crypto v0.17.0
+## explicit; go 1.17
golang.org/x/crypto/ed25519
golang.org/x/crypto/hkdf
golang.org/x/crypto/pbkdf2
--# golang.org/x/sys v0.0.0-20210615035016-665e8c7367d1
-+# golang.org/x/sys v0.6.0
+ # golang.org/x/sys v0.15.0
+## explicit; go 1.17
- golang.org/x/sys/internal/unsafeheader
golang.org/x/sys/plan9
golang.org/x/sys/unix
golang.org/x/sys/windows
- # golang.org/x/term v0.0.0-20201126162022-7de9c90e9dd1
-+## explicit; go 1.11
+ # golang.org/x/term v0.15.0
++## explicit; go 1.17
golang.org/x/term
diff --git a/security/libp11/Makefile b/security/libp11/Makefile
index 1ac2909bf055..7575e9c2ed49 100644
--- a/security/libp11/Makefile
+++ b/security/libp11/Makefile
@@ -1,5 +1,5 @@
PORTNAME= libp11
-PORTVERSION= 0.4.13
+PORTVERSION= 0.4.14
DISTVERSIONPREFIX= ${PORTNAME}-
CATEGORIES= security devel
@@ -35,7 +35,9 @@ CONFIGURE_ENV= LTLIB_CFLAGS="-I${LOCALBASE}/include" \
OPENSSL_CFLAGS="-I${OPENSSLINC}" \
OPENSSL_LIBS="-L${OPENSSLLIB} -lssl -lcrypto"
-CONFIGURE_ARGS= --with-enginesdir=${PREFIX}/lib/engines
+CONFIGURE_ARGS= --with-enginesdir=${PREFIX}/lib/engines \
+ --with-modulesdir=${PREFIX}/lib/ossl-modules \
+ --enable-static-engine
INSTALL_TARGET= install-strip
diff --git a/security/libp11/distinfo b/security/libp11/distinfo
index def41ebc82a5..15ac552b5724 100644
--- a/security/libp11/distinfo
+++ b/security/libp11/distinfo
@@ -1,3 +1,3 @@
-TIMESTAMP = 1734366816
-SHA256 (OpenSC-libp11-libp11-0.4.13_GH0.tar.gz) = 5e8e258c6a8e33155c3a2bd2bd7d12a758f82b7bda1f92e8b77075d16edc9889
-SIZE (OpenSC-libp11-libp11-0.4.13_GH0.tar.gz) = 148443
+TIMESTAMP = 1747212917
+SHA256 (OpenSC-libp11-libp11-0.4.14_GH0.tar.gz) = 99405d1b46bf48a990892676b7bc5597692adc53fc50f7bb19e83d03bd394b94
+SIZE (OpenSC-libp11-libp11-0.4.14_GH0.tar.gz) = 172631
diff --git a/security/libp11/files/patch-configure.ac b/security/libp11/files/patch-configure.ac
index 42b316830aa1..d427d911cbc4 100644
--- a/security/libp11/files/patch-configure.ac
+++ b/security/libp11/files/patch-configure.ac
@@ -1,6 +1,6 @@
---- configure.ac.orig 2024-12-13 18:13:57 UTC
+--- configure.ac.orig 2025-05-13 21:17:57 UTC
+++ configure.ac
-@@ -208,7 +208,7 @@ fi
+@@ -246,7 +246,7 @@ fi
[Default PKCS#11 module.])
fi
diff --git a/security/libp11/files/patch-src_Makefile.am b/security/libp11/files/patch-src_Makefile.am
new file mode 100644
index 000000000000..f8e9be42f65a
--- /dev/null
+++ b/security/libp11/files/patch-src_Makefile.am
@@ -0,0 +1,13 @@
+--- src/Makefile.am.orig 2025-05-14 13:58:16 UTC
++++ src/Makefile.am
+@@ -4,8 +4,8 @@ EXTRA_DIST = Makefile.mak libp11.rc.in pkcs11.rc.in
+ CLEANFILES = libp11.pc
+ EXTRA_DIST = Makefile.mak libp11.rc.in pkcs11.rc.in
+
+-noinst_HEADERS= libp11-int.h pkcs11.h p11_pthread.h
+-include_HEADERS= libp11.h p11_err.h util.h
++noinst_HEADERS= libp11-int.h pkcs11.h p11_pthread.h util.h
++include_HEADERS= libp11.h p11_err.h
+ if ENABLE_STATIC_ENGINE
+ lib_LTLIBRARIES = libp11.la libpkcs11.la
+ else
diff --git a/security/libp11/pkg-plist b/security/libp11/pkg-plist
index 73bea38f97d3..79526fa0f30a 100644
--- a/security/libp11/pkg-plist
+++ b/security/libp11/pkg-plist
@@ -2,10 +2,12 @@ include/libp11.h
include/p11_err.h
lib/engines/libpkcs11.so
lib/engines/pkcs11.so
+lib/ossl-modules/libpkcs11.so
+lib/ossl-modules/pkcs11prov.so
lib/libp11.a
lib/libp11.so
lib/libp11.so.3
-lib/libp11.so.3.6.0
+lib/libp11.so.3.7.0
lib/libpkcs11.a
lib/libpkcs11.so
lib/libpkcs11.so.0
@@ -15,6 +17,9 @@ libdata/pkgconfig/libp11.pc
%%PORTEXAMPLES%%%%EXAMPLESDIR%%/README
%%PORTEXAMPLES%%%%EXAMPLESDIR%%/auth.c
%%PORTEXAMPLES%%%%EXAMPLESDIR%%/decrypt.c
+%%PORTEXAMPLES%%%%EXAMPLESDIR%%/eckeygen.c
%%PORTEXAMPLES%%%%EXAMPLESDIR%%/getrandom.c
%%PORTEXAMPLES%%%%EXAMPLESDIR%%/listkeys.c
%%PORTEXAMPLES%%%%EXAMPLESDIR%%/listkeys_ext.c
+%%PORTEXAMPLES%%%%EXAMPLESDIR%%/rsakeygen.c
+%%PORTEXAMPLES%%%%EXAMPLESDIR%%/storecert.c
diff --git a/security/py-netbox-secrets/Makefile b/security/py-netbox-secrets/Makefile
index 72e83b741b37..79466b639c92 100644
--- a/security/py-netbox-secrets/Makefile
+++ b/security/py-netbox-secrets/Makefile
@@ -1,6 +1,5 @@
PORTNAME= netbox-secrets
-DISTVERSION= 2.2.0
-PORTREVISION= 1
+DISTVERSION= 2.2.1
CATEGORIES= security python
MASTER_SITES= PYPI
PKGNAMEPREFIX= ${PYTHON_PKGNAMEPREFIX}
@@ -13,10 +12,12 @@ WWW= https://github.com/Onemind-Services-LLC/netbox-secrets
LICENSE= APACHE20
LICENSE_FILE= ${WRKSRC}/LICENSE.md
+BUILD_DEPENDS= ${PY_SETUPTOOLS} \
+ ${PYTHON_PKGNAMEPREFIX}wheel>0:devel/py-wheel@${PY_FLAVOR}
RUN_DEPENDS= ${PYTHON_PKGNAMEPREFIX}pycryptodome>0:security/py-pycryptodome@${PY_FLAVOR}
USES= python
-USE_PYTHON= autoplist distutils
+USE_PYTHON= autoplist pep517
NO_ARCH= yes
diff --git a/security/py-netbox-secrets/distinfo b/security/py-netbox-secrets/distinfo
index 2a6f2505f573..25c5b104549d 100644
--- a/security/py-netbox-secrets/distinfo
+++ b/security/py-netbox-secrets/distinfo
@@ -1,3 +1,3 @@
-TIMESTAMP = 1738929151
-SHA256 (netbox_secrets-2.2.0.tar.gz) = 6140dd46981c65a96bc174ac07905ae7355bdbdc3d144fc281a0cde0f6e096c8
-SIZE (netbox_secrets-2.2.0.tar.gz) = 57503
+TIMESTAMP = 1747310577
+SHA256 (netbox_secrets-2.2.1.tar.gz) = 26f817f9a9c03dcd34aaaa89d4744b2d15408d0e38f584aa6f2cb73bdd48958f
+SIZE (netbox_secrets-2.2.1.tar.gz) = 57852
diff --git a/security/py-pyscard/Makefile b/security/py-pyscard/Makefile
index 567e54d49654..5b28b62cce6a 100644
--- a/security/py-pyscard/Makefile
+++ b/security/py-pyscard/Makefile
@@ -1,6 +1,5 @@
PORTNAME= pyscard
-PORTVERSION= 2.2.0
-PORTREVISION= 1
+PORTVERSION= 2.2.2
CATEGORIES= security python
MASTER_SITES= PYPI
PKGNAMEPREFIX= ${PYTHON_PKGNAMEPREFIX}
diff --git a/security/py-pyscard/distinfo b/security/py-pyscard/distinfo
index f91b3fcf8330..dda449dfffbe 100644
--- a/security/py-pyscard/distinfo
+++ b/security/py-pyscard/distinfo
@@ -1,3 +1,3 @@
-TIMESTAMP = 1736166332
-SHA256 (pyscard-2.2.0.tar.gz) = 6aa194d4bb295e78a97056dd1d32273cc69ddbe3c852aad60a8578f04017a1bf
-SIZE (pyscard-2.2.0.tar.gz) = 154847
+TIMESTAMP = 1747500433
+SHA256 (pyscard-2.2.2.tar.gz) = c77481fb86f4a17bc441d7b36551c1d36a9d3a48c4bb30ab8118886e6f275081
+SIZE (pyscard-2.2.2.tar.gz) = 156637
diff --git a/security/vuls/Makefile b/security/vuls/Makefile
index a202c3f5fe81..1ade7a45b4e5 100644
--- a/security/vuls/Makefile
+++ b/security/vuls/Makefile
@@ -1,6 +1,6 @@
PORTNAME= vuls
DISTVERSIONPREFIX=v
-DISTVERSION= 0.31.1
+DISTVERSION= 0.32.0
CATEGORIES= security
MAINTAINER= girgen@FreeBSD.org
@@ -10,7 +10,7 @@ WWW= https://vuls.io
LICENSE= GPLv3+
LICENSE_FILE= ${WRKSRC}/LICENSE
-USES= go:1.23,modules
+USES= go:1.24,modules
GO_MODULE= github.com/future-architect/vuls
GO_TARGET= ./cmd/${PORTNAME}
diff --git a/security/vuls/distinfo b/security/vuls/distinfo
index a567c9ed0f6c..171f6cc2ca7b 100644
--- a/security/vuls/distinfo
+++ b/security/vuls/distinfo
@@ -1,5 +1,5 @@
-TIMESTAMP = 1746696143
-SHA256 (go/security_vuls/vuls-v0.31.1/v0.31.1.mod) = 5b19a8a2789f1f93369c7bf24d38df8b345a7a871b2b229aec6349b9db98027e
-SIZE (go/security_vuls/vuls-v0.31.1/v0.31.1.mod) = 20796
-SHA256 (go/security_vuls/vuls-v0.31.1/v0.31.1.zip) = 40312da1c3021023a0bee1822b8622713e48137b3ca29f14f4347c79a88ec425
-SIZE (go/security_vuls/vuls-v0.31.1/v0.31.1.zip) = 1376467
+TIMESTAMP = 1747479508
+SHA256 (go/security_vuls/vuls-v0.32.0/v0.32.0.mod) = e3091e79324dcdd3e3c2959a3b9fa4ab03fc4d53a0ce41a76fc793a68b57302e
+SIZE (go/security_vuls/vuls-v0.32.0/v0.32.0.mod) = 20795
+SHA256 (go/security_vuls/vuls-v0.32.0/v0.32.0.zip) = 1eed06de6c88de618a25184d843010c76b30b77a8e554f028a2700a5e267266b
+SIZE (go/security_vuls/vuls-v0.32.0/v0.32.0.zip) = 1389053
diff --git a/security/vuxml/vuln/2025.xml b/security/vuxml/vuln/2025.xml
index 81b5b6be2522..10fce3138813 100644
--- a/security/vuxml/vuln/2025.xml
+++ b/security/vuxml/vuln/2025.xml
@@ -1,3 +1,134 @@
+ <vuln vid="46594aa3-32f7-11f0-a116-8447094a420f">
+ <topic>WeeChat -- Multiple vulnerabilities</topic>
+ <affects>
+ <package>
+ <name>weechat</name>
+ <range><lt>4.6.3</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>The Weechat project reports:</p>
+ <blockquote cite="https://weechat.org/doc/weechat/security/">
+ <p>Multiple integer and buffer overflows in WeeChat core.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://weechat.org/doc/weechat/security/</url>
+ </references>
+ <dates>
+ <discovery>2025-05-11</discovery>
+ <entry>2025-05-17</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="79400d31-3166-11f0-8cb5-a8a1599412c6">
+ <topic>chromium -- multiple security fixes</topic>
+ <affects>
+ <package>
+ <name>chromium</name>
+ <range><lt>136.0.7103.113</lt></range>
+ </package>
+ <package>
+ <name>ungoogled-chromium</name>
+ <range><lt>136.0.7103.113</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Chrome Releases reports:</p>
+ <blockquote cite="https://chromereleases.googleblog.com/2025/05/stable-channel-update-for-desktop_14.html">
+ <p>This update includes 4 security fixes:</p>
+ <ul>
+ <li>[415810136] High CVE-2025-4664: Insufficient policy enforcement in Loader. Source: X post from @slonser_ on 2025-05-05</li>
+ <li>[412578726] High CVE-2025-4609: Incorrect handle provided in unspecified circumstances in Mojo. Reported by Micky on 2025-04-22</li>
+ </ul>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2025-4664</cvename>
+ <cvename>CVE-2025-4609</cvename>
+ <url>https://chromereleases.googleblog.com/2025/05/stable-channel-update-for-desktop_14.html</url>
+ </references>
+ <dates>
+ <discovery>2025-05-14</discovery>
+ <entry>2025-05-15</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="52efdd56-30bd-11f0-81be-b42e991fc52e">
+ <topic>Mozilla -- memory safety bugs</topic>
+ <affects>
+ <package>
+ <name>firefox</name>
+ <range><lt>138.0,2</lt></range>
+ </package>
+ <package>
+ <name>firefox-esr</name>
+ <range><lt>128.10</lt></range>
+ </package>
+ <package>
+ <name>thunderbird</name>
+ <range><lt>138.0</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>security@mozilla.org reports:</p>
+ <blockquote cite="https://bugzilla.mozilla.org/buglist.cgi?bug_id=1951161%2C1952105">
+ <p>Memory safety bugs present in Firefox 137, Thunderbird 137,
+ Firefox ESR 128.9, and Thunderbird 128.9. Some of these bugs
+ showed evidence of memory corruption and we presume that
+ with enough effort some of these could have been exploited
+ to run arbitrary code.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2025-4091</cvename>
+ <url>https://nvd.nist.gov/vuln/detail/CVE-2025-4091</url>
+ </references>
+ <dates>
+ <discovery>2025-04-29</discovery>
+ <entry>2025-05-14</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="4f17db64-30bd-11f0-81be-b42e991fc52e">
+ <topic>Mozilla -- memory corruption</topic>
+ <affects>
+ <package>
+ <name>firefox-esr</name>
+ <range><lt>128.10</lt></range>
+ </package>
+ <package>
+ <name>thunderbird</name>
+ <range><lt>128.10</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>security@mozilla.org reports:</p>
+ <blockquote cite="https://bugzilla.mozilla.org/show_bug.cgi?id=1894100">
+ <p>Memory safety bug present in Firefox ESR 128.9, and
+ Thunderbird 128.9. This bug showed evidence of memory
+ corruption and we presume that with enough effort this could
+ have been exploited to run arbitrary code.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2025-4093</cvename>
+ <url>https://nvd.nist.gov/vuln/detail/CVE-2025-4093</url>
+ </references>
+ <dates>
+ <discovery>2025-04-29</discovery>
+ <entry>2025-05-14</entry>
+ </dates>
+ </vuln>
+
<vuln vid="6f10b49d-07b1-4be4-8abf-edf880b16ad2">
<topic>vscode -- security feature bypass vulnerability</topic>
<affects>
@@ -29,21 +160,25 @@
<topic>libxslt -- multiple vulnerabilities</topic>
<affects>
<package>
- <name>libxslt</name>
- <range><lt>1.1.43</lt></range>
+ <name>libxslt</name>
+ <range><lt>1.1.43</lt></range>
</package>
</affects>
<description>
- <body xmlns="http://www.w3.org/1999/xhtml">
- <h1>[CVE-2024-55549] Fix UAF related to excluded namespaces</h1>
- <blockquote cite="https://gitlab.gnome.org/GNOME/libxslt/-/issues/127">
- <p>xsltGetInheritedNsList in libxslt before 1.1.43 has a use-after-free issue related to exclusion of result prefixes.</p>
- </blockquote>
- <h1>[CVE-2025-24855] Fix use-after-free of XPath context node</h1>
- <blockquote cite="https://gitlab.gnome.org/GNOME/libxslt/-/issues/128">
- <p>numbers.c in libxslt before 1.1.43 has a use-after-free because, in nested XPath evaluations, an XPath context node can be modified but never restored. This is related to xsltNumberFormatGetValue, xsltEvalXPathPredicate, xsltEvalXPathStringNs, and xsltComputeSortResultInternal.</p>
- </blockquote>
- </body>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <h1>[CVE-2024-55549] Fix UAF related to excluded namespaces</h1>
+ <blockquote cite="https://gitlab.gnome.org/GNOME/libxslt/-/issues/127">
+ <p>xsltGetInheritedNsList in libxslt before 1.1.43 has a use-after-free issue related to exclusion of result prefixes.</p>
+ </blockquote>
+ <h1>[CVE-2025-24855] Fix use-after-free of XPath context node</h1>
+ <blockquote cite="https://gitlab.gnome.org/GNOME/libxslt/-/issues/128">
+ <p>numbers.c in libxslt before 1.1.43 has a use-after-free because
+ , in nested XPath evaluations, an XPath context node can be
+ modified but never restored. This is related to
+ xsltNumberFormatGetValue, xsltEvalXPathPredicate,
+ xsltEvalXPathStringNs, and xsltComputeSortResultInternal.</p>
+ </blockquote>
+ </body>
</description>
<references>
<cvename>CVE-2024-55549</cvename>
diff --git a/security/wolfssl/Makefile b/security/wolfssl/Makefile
index 837bebd08315..87fa1c88c8d7 100644
--- a/security/wolfssl/Makefile
+++ b/security/wolfssl/Makefile
@@ -1,5 +1,6 @@
PORTNAME= wolfssl
PORTVERSION= 5.8.0
+PORTREVISION= 1
CATEGORIES= security devel
MASTER_SITES= https://www.wolfssl.com/ \
LOCAL/fox
@@ -35,9 +36,11 @@ CONFIGURE_ARGS= --disable-dependency-tracking \
--enable-static \
--enable-tls13 \
--enable-tls13-draft18 \
+ --enable-haproxy \
+ --enable-quic \
--enable-context-extra-user-data
TEST_TARGET= check
-CFLAGS+= -DWOLFSSL_ALT_NAMES
+CFLAGS+= -DWOLFSSL_ALT_NAMES -DWOLFSSL_GETRANDOM=1
OPTIONS_DEFINE= DEBUG DOCS