summaryrefslogtreecommitdiff
path: root/security
diff options
context:
space:
mode:
Diffstat (limited to 'security')
-rw-r--r--security/afl++/Makefile2
-rw-r--r--security/afl++/distinfo6
-rw-r--r--security/aws-lc/Makefile2
-rw-r--r--security/aws-lc/distinfo6
-rw-r--r--security/nettle/Makefile2
-rw-r--r--security/nettle/distinfo6
-rw-r--r--security/nettle/files/extra-patch-Makefile.in4
-rw-r--r--security/nettle/files/patch-configure4
-rw-r--r--security/nettle/files/patch-examples-nettle-openssl.c8
-rw-r--r--security/nettle/files/patch-powerpc64-p8-aes-decrypt-internal.asm2
-rw-r--r--security/nettle/files/patch-powerpc64-p8-aes-encrypt-internal.asm6
-rw-r--r--security/nettle/pkg-plist4
-rw-r--r--security/sudo/Makefile2
-rw-r--r--security/sudo/distinfo6
-rw-r--r--security/trivy/Makefile3
-rw-r--r--security/trivy/distinfo10
-rw-r--r--security/vuxml/vuln/2025.xml181
17 files changed, 217 insertions, 37 deletions
diff --git a/security/afl++/Makefile b/security/afl++/Makefile
index 41e79b781385..6e45c1ed62e0 100644
--- a/security/afl++/Makefile
+++ b/security/afl++/Makefile
@@ -1,6 +1,6 @@
PORTNAME= afl
DISTVERSIONPREFIX= v
-DISTVERSION= 4.32c
+DISTVERSION= 4.33c
CATEGORIES= security
PKGNAMESUFFIX= ++-${FLAVOR}
diff --git a/security/afl++/distinfo b/security/afl++/distinfo
index 21befac35cea..871fd6e76ebe 100644
--- a/security/afl++/distinfo
+++ b/security/afl++/distinfo
@@ -1,3 +1,3 @@
-TIMESTAMP = 1746197618
-SHA256 (AFLplusplus-AFLplusplus-v4.32c_GH0.tar.gz) = dc7f59a11ce8cf67a3ed09a5ac78028c6f793b239b21fd83e5b2370cea166926
-SIZE (AFLplusplus-AFLplusplus-v4.32c_GH0.tar.gz) = 3045679
+TIMESTAMP = 1751370940
+SHA256 (AFLplusplus-AFLplusplus-v4.33c_GH0.tar.gz) = 98903c8036282c8908b1d8cc0d60caf3ea259db4339503a76449b47acce58d1d
+SIZE (AFLplusplus-AFLplusplus-v4.33c_GH0.tar.gz) = 3058802
diff --git a/security/aws-lc/Makefile b/security/aws-lc/Makefile
index 803ea2798817..67c1020ba0f6 100644
--- a/security/aws-lc/Makefile
+++ b/security/aws-lc/Makefile
@@ -1,5 +1,5 @@
PORTNAME= aws-lc
-PORTVERSION= 1.53.1
+PORTVERSION= 1.54.0
DISTVERSIONPREFIX= v
CATEGORIES= security
diff --git a/security/aws-lc/distinfo b/security/aws-lc/distinfo
index 7e178c8c2194..2a7e6ae009f0 100644
--- a/security/aws-lc/distinfo
+++ b/security/aws-lc/distinfo
@@ -1,3 +1,3 @@
-TIMESTAMP = 1750954130
-SHA256 (aws-aws-lc-v1.53.1_GH0.tar.gz) = 74137613ea4e322600400fdc2e21c83f08f4c68d368ebe006eab264e4e685e01
-SIZE (aws-aws-lc-v1.53.1_GH0.tar.gz) = 127004586
+TIMESTAMP = 1751208136
+SHA256 (aws-aws-lc-v1.54.0_GH0.tar.gz) = d491b6d6b233e88314a15170d435e28259f7cf4f950a427acc80a0e977aa683a
+SIZE (aws-aws-lc-v1.54.0_GH0.tar.gz) = 127011221
diff --git a/security/nettle/Makefile b/security/nettle/Makefile
index 79573ea82af5..ddea868f1be1 100644
--- a/security/nettle/Makefile
+++ b/security/nettle/Makefile
@@ -1,5 +1,5 @@
PORTNAME= nettle
-PORTVERSION= 3.10.1
+PORTVERSION= 3.10.2
CATEGORIES= security
MASTER_SITES= GNU \
https://www.lysator.liu.se/~nisse/archive/
diff --git a/security/nettle/distinfo b/security/nettle/distinfo
index 97625f47b80f..ceeab63d0f14 100644
--- a/security/nettle/distinfo
+++ b/security/nettle/distinfo
@@ -1,3 +1,3 @@
-TIMESTAMP = 1735705131
-SHA256 (nettle-3.10.1.tar.gz) = b0fcdd7fc0cdea6e80dcf1dd85ba794af0d5b4a57e26397eee3bc193272d9132
-SIZE (nettle-3.10.1.tar.gz) = 2643267
+TIMESTAMP = 1751208138
+SHA256 (nettle-3.10.2.tar.gz) = fe9ff51cb1f2abb5e65a6b8c10a92da0ab5ab6eaf26e7fc2b675c45f1fb519b5
+SIZE (nettle-3.10.2.tar.gz) = 2644644
diff --git a/security/nettle/files/extra-patch-Makefile.in b/security/nettle/files/extra-patch-Makefile.in
index 2974b822043a..2c1480398adf 100644
--- a/security/nettle/files/extra-patch-Makefile.in
+++ b/security/nettle/files/extra-patch-Makefile.in
@@ -1,6 +1,6 @@
---- Makefile.in.orig 2023-06-01 18:40:35 UTC
+--- Makefile.in.orig 2025-06-26 18:29:02 UTC
+++ Makefile.in
-@@ -19,7 +19,7 @@ OPT_NETTLE_SOURCES = @OPT_NETTLE_SOURCES@
+@@ -19,7 +19,7 @@ FAT_TEST_LIST = @FAT_TEST_LIST@
FAT_TEST_LIST = @FAT_TEST_LIST@
diff --git a/security/nettle/files/patch-configure b/security/nettle/files/patch-configure
index 1b8f460d9501..d210a2e1be01 100644
--- a/security/nettle/files/patch-configure
+++ b/security/nettle/files/patch-configure
@@ -1,6 +1,6 @@
---- configure.orig 2023-06-01 18:40:35 UTC
+--- configure.orig 2025-06-26 18:29:02 UTC
+++ configure
-@@ -6638,7 +6638,7 @@ $as_echo "$as_me: WARNING: Cross compiling for linux.
+@@ -7532,7 +7532,7 @@ printf "%s\n" "$as_me: WARNING: Cross compiling for li
# and 64-bit in lib. Don't know about "kfreebsd", does
# it follow the Linux fhs conventions?
*:freebsd*:32)
diff --git a/security/nettle/files/patch-examples-nettle-openssl.c b/security/nettle/files/patch-examples-nettle-openssl.c
index d7cf037c61c3..006e654aa899 100644
--- a/security/nettle/files/patch-examples-nettle-openssl.c
+++ b/security/nettle/files/patch-examples-nettle-openssl.c
@@ -1,6 +1,6 @@
---- examples/nettle-openssl.c.orig 2021-03-21 08:32:25 UTC
+--- examples/nettle-openssl.c.orig 2025-06-26 18:29:03 UTC
+++ examples/nettle-openssl.c
-@@ -374,6 +374,7 @@ openssl_hash_update(void *p,
+@@ -291,6 +291,7 @@ openssl_hash_update(void *p,
EVP_DigestUpdate(ctx->evp, src, length);
}
@@ -8,7 +8,7 @@
#define OPENSSL_HASH(NAME, name) \
static void \
openssl_##name##_init(void *p) \
-@@ -404,6 +405,38 @@ nettle_openssl_##name = { \
+@@ -321,6 +322,38 @@ nettle_openssl_##name = { \
openssl_hash_update, \
openssl_##name##_digest \
};
@@ -46,4 +46,4 @@
+#endif
OPENSSL_HASH(MD5, md5)
- OPENSSL_HASH(SHA, sha1)
+ OPENSSL_HASH(SHA1, sha1)
diff --git a/security/nettle/files/patch-powerpc64-p8-aes-decrypt-internal.asm b/security/nettle/files/patch-powerpc64-p8-aes-decrypt-internal.asm
index 67ceabec79c5..e23c8a8f6463 100644
--- a/security/nettle/files/patch-powerpc64-p8-aes-decrypt-internal.asm
+++ b/security/nettle/files/patch-powerpc64-p8-aes-decrypt-internal.asm
@@ -1,4 +1,4 @@
---- powerpc64/p8/aes-decrypt-internal.asm.orig 2024-06-16 15:27:54 UTC
+--- powerpc64/p8/aes-decrypt-internal.asm.orig 2025-06-26 18:29:03 UTC
+++ powerpc64/p8/aes-decrypt-internal.asm
@@ -64,7 +64,7 @@ PROLOGUE(_nettle_aes_decrypt)
diff --git a/security/nettle/files/patch-powerpc64-p8-aes-encrypt-internal.asm b/security/nettle/files/patch-powerpc64-p8-aes-encrypt-internal.asm
index 313ba61a4f6b..67218e1caaf4 100644
--- a/security/nettle/files/patch-powerpc64-p8-aes-encrypt-internal.asm
+++ b/security/nettle/files/patch-powerpc64-p8-aes-encrypt-internal.asm
@@ -1,6 +1,6 @@
---- powerpc64/p8/aes-encrypt-internal.asm.orig 2022-06-02 17:57:16 UTC
+--- powerpc64/p8/aes-encrypt-internal.asm.orig 2025-06-26 18:29:03 UTC
+++ powerpc64/p8/aes-encrypt-internal.asm
-@@ -63,7 +63,7 @@ define(`S7', `v9')
+@@ -64,7 +64,7 @@ PROLOGUE(_nettle_aes_encrypt)
define(`FUNC_ALIGN', `5')
PROLOGUE(_nettle_aes_encrypt)
@@ -9,7 +9,7 @@
subi ROUNDS,ROUNDS,1
srdi LENGTH,LENGTH,4
-@@ -328,6 +328,6 @@ EPILOGUE(_nettle_aes_encrypt)
+@@ -269,6 +269,6 @@ EPILOGUE(_nettle_aes_encrypt)
.data
.align 4
diff --git a/security/nettle/pkg-plist b/security/nettle/pkg-plist
index 25ba25f62658..48c756c49b45 100644
--- a/security/nettle/pkg-plist
+++ b/security/nettle/pkg-plist
@@ -79,11 +79,11 @@ include/nettle/yarrow.h
lib/libhogweed.a
lib/libhogweed.so
lib/libhogweed.so.6
-lib/libhogweed.so.6.10
+lib/libhogweed.so.6.11
lib/libnettle.a
lib/libnettle.so
lib/libnettle.so.8
-lib/libnettle.so.8.10
+lib/libnettle.so.8.11
libdata/pkgconfig/hogweed.pc
libdata/pkgconfig/nettle.pc
%%PORTDOCS%%%%DOCSDIR%%/NEWS
diff --git a/security/sudo/Makefile b/security/sudo/Makefile
index 14466a9e7774..b9bea691da08 100644
--- a/security/sudo/Makefile
+++ b/security/sudo/Makefile
@@ -1,5 +1,5 @@
PORTNAME= sudo
-PORTVERSION= 1.9.17
+PORTVERSION= 1.9.17p1
CATEGORIES= security
MASTER_SITES= SUDO
diff --git a/security/sudo/distinfo b/security/sudo/distinfo
index 9b38cd2b5a6c..a01a900722c6 100644
--- a/security/sudo/distinfo
+++ b/security/sudo/distinfo
@@ -1,3 +1,3 @@
-TIMESTAMP = 1750523514
-SHA256 (sudo-1.9.17.tar.gz) = 3f212c69d534d5822b492d099abb02a593f91ca99f5afde5cb9bd3e1dcdad069
-SIZE (sudo-1.9.17.tar.gz) = 5447899
+TIMESTAMP = 1751356446
+SHA256 (sudo-1.9.17p1.tar.gz) = ff607ea717072197738a78f778692cd6df9a7e3e404565f51de063ca27455d32
+SIZE (sudo-1.9.17p1.tar.gz) = 5449076
diff --git a/security/trivy/Makefile b/security/trivy/Makefile
index 05cfa55f0b39..d208cccbab53 100644
--- a/security/trivy/Makefile
+++ b/security/trivy/Makefile
@@ -1,7 +1,6 @@
PORTNAME= trivy
DISTVERSIONPREFIX= v
-DISTVERSION= 0.63.0
-PORTREVISION= 1
+DISTVERSION= 0.64.0
CATEGORIES= security
MAINTAINER= mfechner@FreeBSD.org
diff --git a/security/trivy/distinfo b/security/trivy/distinfo
index 14015874c1c6..24ad8282e01f 100644
--- a/security/trivy/distinfo
+++ b/security/trivy/distinfo
@@ -1,5 +1,5 @@
-TIMESTAMP = 1748580283
-SHA256 (go/security_trivy/trivy-v0.63.0/v0.63.0.mod) = f0b5b8182a3155cfd22aedd2f1266794a26549664c18b8358a411ba634188fa3
-SIZE (go/security_trivy/trivy-v0.63.0/v0.63.0.mod) = 23467
-SHA256 (go/security_trivy/trivy-v0.63.0/v0.63.0.zip) = 638bc4adc54bf61afc8647c9f4fa5db30e6352dfe033655c30d0af02eca5c14d
-SIZE (go/security_trivy/trivy-v0.63.0/v0.63.0.zip) = 58804833
+TIMESTAMP = 1751363247
+SHA256 (go/security_trivy/trivy-v0.64.0/v0.64.0.mod) = 0cdadb981316deab57b0abfdca161b8a907173478b82770c901c8d58ce4a2016
+SIZE (go/security_trivy/trivy-v0.64.0/v0.64.0.mod) = 23200
+SHA256 (go/security_trivy/trivy-v0.64.0/v0.64.0.zip) = f5f0943b22846cd637d140585dd5a318e303cf0fe9f45b5f138153e2a292fc06
+SIZE (go/security_trivy/trivy-v0.64.0/v0.64.0.zip) = 58856559
diff --git a/security/vuxml/vuln/2025.xml b/security/vuxml/vuln/2025.xml
index e9e2390a00f0..29b966ccfd90 100644
--- a/security/vuxml/vuln/2025.xml
+++ b/security/vuxml/vuln/2025.xml
@@ -1,3 +1,184 @@
+ <vuln vid="24f4b495-56a1-11f0-9621-93abbef07693">
+ <topic>sudo -- privilege escalation vulnerability through host and chroot options</topic>
+ <affects>
+ <package>
+ <name>sudo</name>
+ <range><lt>1.9.17p1</lt></range>
+ </package>
+ <package>
+ <name>sudo-sssd</name>
+ <range><lt>1.9.17p1</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Todd C. Miller reports, crediting Rich Mirch from Stratascale Cyber Research Unit (CRU):</p>
+ <blockquote cite="https://www.sudo.ws/releases/stable/">
+ <p>Sudo 1.9.17p1:</p>
+ <ul>
+ <li>
+ Fixed CVE-2025-32462. Sudo's -h (--host) option could be specified
+ when running a command or editing a file. This could enable a
+ local privilege escalation attack if the sudoers file allows the
+ user to run commands on a different host. For more information,
+ see Local Privilege Escalation via host option.
+ </li>
+ <li>
+ Fixed CVE-2025-32463. An attacker can leverage sudo's -R
+ (--chroot) option to run arbitrary commands as root, even if they
+ are not listed in the sudoers file. The chroot support has been
+ deprecated an will be removed entirely in a future release. For
+ more information, see Local Privilege Escalation via chroot
+ option.
+ </li>
+ </ul>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2025-32462</cvename>
+ <cvename>CVE-2025-32463</cvename>
+ <url>https://www.sudo.ws/releases/stable/</url>
+ <url>https://www.stratascale.com/vulnerability-alert-CVE-2025-32462-sudo-host</url>
+ <url>https://www.stratascale.com/vulnerability-alert-CVE-2025-32463-sudo-chroot</url>
+ </references>
+ <dates>
+ <discovery>2025-04-01</discovery>
+ <entry>2025-07-01</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="8df49466-5664-11f0-943a-18c04d5ea3dc">
+ <topic>xorg server -- Multiple vulnerabilities</topic>
+ <affects>
+ <package>
+ <name>xorg-server</name>
+ <name>xephyr</name>
+ <name>xorg-vfbserver</name>
+ <range><lt>21.1.18,1</lt></range>
+ </package>
+ <package>
+ <name>xorg-nextserver</name>
+ <range><lt>21.1.18,2</lt></range>
+ </package>
+ <package>
+ <name>xwayland</name>
+ <range><lt>24.1.8,1</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>The X.Org project reports:</p>
+ <blockquote cite="https://lists.x.org/archives/xorg-announce/2025-February/003584.html">
+ <ul>
+ <li>
+ CVE-2025-49176: Integer overflow in Big Requests Extension
+ <p>The Big Requests extension allows requests larger than the 16-bit length
+ limit.
+ It uses integers for the request length and checks for the size not to
+ exceed the maxBigRequestSize limit, but does so after translating the
+ length to integer by multiplying the given size in bytes by 4.
+ In doing so, it might overflow the integer size limit before actually
+ checking for the overflow, defeating the purpose of the test.</p>
+ </li>
+ </ul>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2025-49176</cvename>
+ <url>https://lists.x.org/archives/xorg/2025-June/062055.html</url>
+ </references>
+ <dates>
+ <discovery>2025-06-17</discovery>
+ <entry>2025-07-01</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="b14cabf7-5663-11f0-943a-18c04d5ea3dc">
+ <topic>xorg server -- Multiple vulnerabilities</topic>
+ <affects>
+ <package>
+ <name>xorg-server</name>
+ <name>xephyr</name>
+ <name>xorg-vfbserver</name>
+ <range><lt>21.1.17,1</lt></range>
+ </package>
+ <package>
+ <name>xorg-nextserver</name>
+ <range><lt>21.1.17,2</lt></range>
+ </package>
+ <package>
+ <name>xwayland</name>
+ <range><lt>24.1.7,1</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>The X.Org project reports:</p>
+ <blockquote cite="https://lists.x.org/archives/xorg-announce/2025-February/003584.html">
+ <ul>
+ <li>
+ CVE-2025-49175: Out-of-bounds access in X Rendering extension (Animated cursors)
+ <p>The X Rendering extension allows creating animated cursors providing a
+ list of cursors.
+ By default, the Xserver assumes at least one cursor is provided while a
+ client may actually pass no cursor at all, which causes an out-of-bound
+ read creating the animated cursor and a crash of the Xserver.</p>
+ </li>
+ <li>
+ CVE-2025-49177: Data leak in XFIXES Extension 6 (XFixesSetClientDisconnectMode)
+
+ <p>The handler of XFixesSetClientDisconnectMode does not check the client
+ request length.
+ A client could send a shorter request and read data from a former
+ request.</p>
+ </li>
+ <li>
+ CVE-2025-49178: Unprocessed client request via bytes to ignore
+
+ <p>When reading requests from the clients, the input buffer might be shared
+ and used between different clients.
+ If a given client sends a full request with non-zero bytes to ignore,
+ the bytes to ignore may still be non-zero even though the request is
+ full, in which case the buffer could be shared with another client who's
+ request will not be processed because of those bytes to ignore, leading
+ to a possible hang of the other client request.</p>
+ </li>
+ <li>
+ CVE-2025-49179: Integer overflow in X Record extension
+
+ <p>The RecordSanityCheckRegisterClients() function in the X Record extension
+ implementation of the Xserver checks for the request length, but does not
+ check for integer overflow.
+ A client might send a very large value for either the number of clients
+ or the number of protocol ranges that will cause an integer overflow in
+ the request length computation, defeating the check for request length.</p>
+ </li>
+ <li>
+ CVE-2025-49180: Integer overflow in RandR extension (RRChangeProviderProperty)
+
+ <p>A client might send a request causing an integer overflow when computing
+ the total size to allocate in RRChangeProviderProperty().</p>
+ </li>
+ </ul>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2025-49175</cvename>
+ <cvename>CVE-2025-49177</cvename>
+ <cvename>CVE-2025-49178</cvename>
+ <cvename>CVE-2025-49179</cvename>
+ <cvename>CVE-2025-49180</cvename>
+ <url>https://lists.x.org/archives/xorg/2025-June/062055.html</url>
+ </references>
+ <dates>
+ <discovery>2025-06-17</discovery>
+ <entry>2025-07-01</entry>
+ </dates>
+ </vuln>
+
<vuln vid="6b1b8989-55b0-11f0-ac64-589cfc10a551">
<topic>podman -- TLS connection used to pull VM images was not validated</topic>
<affects>