diff options
Diffstat (limited to 'security')
-rw-r--r-- | security/afl++/Makefile | 2 | ||||
-rw-r--r-- | security/afl++/distinfo | 6 | ||||
-rw-r--r-- | security/aws-lc/Makefile | 2 | ||||
-rw-r--r-- | security/aws-lc/distinfo | 6 | ||||
-rw-r--r-- | security/nettle/Makefile | 2 | ||||
-rw-r--r-- | security/nettle/distinfo | 6 | ||||
-rw-r--r-- | security/nettle/files/extra-patch-Makefile.in | 4 | ||||
-rw-r--r-- | security/nettle/files/patch-configure | 4 | ||||
-rw-r--r-- | security/nettle/files/patch-examples-nettle-openssl.c | 8 | ||||
-rw-r--r-- | security/nettle/files/patch-powerpc64-p8-aes-decrypt-internal.asm | 2 | ||||
-rw-r--r-- | security/nettle/files/patch-powerpc64-p8-aes-encrypt-internal.asm | 6 | ||||
-rw-r--r-- | security/nettle/pkg-plist | 4 | ||||
-rw-r--r-- | security/sudo/Makefile | 2 | ||||
-rw-r--r-- | security/sudo/distinfo | 6 | ||||
-rw-r--r-- | security/trivy/Makefile | 3 | ||||
-rw-r--r-- | security/trivy/distinfo | 10 | ||||
-rw-r--r-- | security/vuxml/vuln/2025.xml | 181 |
17 files changed, 217 insertions, 37 deletions
diff --git a/security/afl++/Makefile b/security/afl++/Makefile index 41e79b781385..6e45c1ed62e0 100644 --- a/security/afl++/Makefile +++ b/security/afl++/Makefile @@ -1,6 +1,6 @@ PORTNAME= afl DISTVERSIONPREFIX= v -DISTVERSION= 4.32c +DISTVERSION= 4.33c CATEGORIES= security PKGNAMESUFFIX= ++-${FLAVOR} diff --git a/security/afl++/distinfo b/security/afl++/distinfo index 21befac35cea..871fd6e76ebe 100644 --- a/security/afl++/distinfo +++ b/security/afl++/distinfo @@ -1,3 +1,3 @@ -TIMESTAMP = 1746197618 -SHA256 (AFLplusplus-AFLplusplus-v4.32c_GH0.tar.gz) = dc7f59a11ce8cf67a3ed09a5ac78028c6f793b239b21fd83e5b2370cea166926 -SIZE (AFLplusplus-AFLplusplus-v4.32c_GH0.tar.gz) = 3045679 +TIMESTAMP = 1751370940 +SHA256 (AFLplusplus-AFLplusplus-v4.33c_GH0.tar.gz) = 98903c8036282c8908b1d8cc0d60caf3ea259db4339503a76449b47acce58d1d +SIZE (AFLplusplus-AFLplusplus-v4.33c_GH0.tar.gz) = 3058802 diff --git a/security/aws-lc/Makefile b/security/aws-lc/Makefile index 803ea2798817..67c1020ba0f6 100644 --- a/security/aws-lc/Makefile +++ b/security/aws-lc/Makefile @@ -1,5 +1,5 @@ PORTNAME= aws-lc -PORTVERSION= 1.53.1 +PORTVERSION= 1.54.0 DISTVERSIONPREFIX= v CATEGORIES= security diff --git a/security/aws-lc/distinfo b/security/aws-lc/distinfo index 7e178c8c2194..2a7e6ae009f0 100644 --- a/security/aws-lc/distinfo +++ b/security/aws-lc/distinfo @@ -1,3 +1,3 @@ -TIMESTAMP = 1750954130 -SHA256 (aws-aws-lc-v1.53.1_GH0.tar.gz) = 74137613ea4e322600400fdc2e21c83f08f4c68d368ebe006eab264e4e685e01 -SIZE (aws-aws-lc-v1.53.1_GH0.tar.gz) = 127004586 +TIMESTAMP = 1751208136 +SHA256 (aws-aws-lc-v1.54.0_GH0.tar.gz) = d491b6d6b233e88314a15170d435e28259f7cf4f950a427acc80a0e977aa683a +SIZE (aws-aws-lc-v1.54.0_GH0.tar.gz) = 127011221 diff --git a/security/nettle/Makefile b/security/nettle/Makefile index 79573ea82af5..ddea868f1be1 100644 --- a/security/nettle/Makefile +++ b/security/nettle/Makefile @@ -1,5 +1,5 @@ PORTNAME= nettle -PORTVERSION= 3.10.1 +PORTVERSION= 3.10.2 CATEGORIES= security MASTER_SITES= GNU \ https://www.lysator.liu.se/~nisse/archive/ diff --git a/security/nettle/distinfo b/security/nettle/distinfo index 97625f47b80f..ceeab63d0f14 100644 --- a/security/nettle/distinfo +++ b/security/nettle/distinfo @@ -1,3 +1,3 @@ -TIMESTAMP = 1735705131 -SHA256 (nettle-3.10.1.tar.gz) = b0fcdd7fc0cdea6e80dcf1dd85ba794af0d5b4a57e26397eee3bc193272d9132 -SIZE (nettle-3.10.1.tar.gz) = 2643267 +TIMESTAMP = 1751208138 +SHA256 (nettle-3.10.2.tar.gz) = fe9ff51cb1f2abb5e65a6b8c10a92da0ab5ab6eaf26e7fc2b675c45f1fb519b5 +SIZE (nettle-3.10.2.tar.gz) = 2644644 diff --git a/security/nettle/files/extra-patch-Makefile.in b/security/nettle/files/extra-patch-Makefile.in index 2974b822043a..2c1480398adf 100644 --- a/security/nettle/files/extra-patch-Makefile.in +++ b/security/nettle/files/extra-patch-Makefile.in @@ -1,6 +1,6 @@ ---- Makefile.in.orig 2023-06-01 18:40:35 UTC +--- Makefile.in.orig 2025-06-26 18:29:02 UTC +++ Makefile.in -@@ -19,7 +19,7 @@ OPT_NETTLE_SOURCES = @OPT_NETTLE_SOURCES@ +@@ -19,7 +19,7 @@ FAT_TEST_LIST = @FAT_TEST_LIST@ FAT_TEST_LIST = @FAT_TEST_LIST@ diff --git a/security/nettle/files/patch-configure b/security/nettle/files/patch-configure index 1b8f460d9501..d210a2e1be01 100644 --- a/security/nettle/files/patch-configure +++ b/security/nettle/files/patch-configure @@ -1,6 +1,6 @@ ---- configure.orig 2023-06-01 18:40:35 UTC +--- configure.orig 2025-06-26 18:29:02 UTC +++ configure -@@ -6638,7 +6638,7 @@ $as_echo "$as_me: WARNING: Cross compiling for linux. +@@ -7532,7 +7532,7 @@ printf "%s\n" "$as_me: WARNING: Cross compiling for li # and 64-bit in lib. Don't know about "kfreebsd", does # it follow the Linux fhs conventions? *:freebsd*:32) diff --git a/security/nettle/files/patch-examples-nettle-openssl.c b/security/nettle/files/patch-examples-nettle-openssl.c index d7cf037c61c3..006e654aa899 100644 --- a/security/nettle/files/patch-examples-nettle-openssl.c +++ b/security/nettle/files/patch-examples-nettle-openssl.c @@ -1,6 +1,6 @@ ---- examples/nettle-openssl.c.orig 2021-03-21 08:32:25 UTC +--- examples/nettle-openssl.c.orig 2025-06-26 18:29:03 UTC +++ examples/nettle-openssl.c -@@ -374,6 +374,7 @@ openssl_hash_update(void *p, +@@ -291,6 +291,7 @@ openssl_hash_update(void *p, EVP_DigestUpdate(ctx->evp, src, length); } @@ -8,7 +8,7 @@ #define OPENSSL_HASH(NAME, name) \ static void \ openssl_##name##_init(void *p) \ -@@ -404,6 +405,38 @@ nettle_openssl_##name = { \ +@@ -321,6 +322,38 @@ nettle_openssl_##name = { \ openssl_hash_update, \ openssl_##name##_digest \ }; @@ -46,4 +46,4 @@ +#endif OPENSSL_HASH(MD5, md5) - OPENSSL_HASH(SHA, sha1) + OPENSSL_HASH(SHA1, sha1) diff --git a/security/nettle/files/patch-powerpc64-p8-aes-decrypt-internal.asm b/security/nettle/files/patch-powerpc64-p8-aes-decrypt-internal.asm index 67ceabec79c5..e23c8a8f6463 100644 --- a/security/nettle/files/patch-powerpc64-p8-aes-decrypt-internal.asm +++ b/security/nettle/files/patch-powerpc64-p8-aes-decrypt-internal.asm @@ -1,4 +1,4 @@ ---- powerpc64/p8/aes-decrypt-internal.asm.orig 2024-06-16 15:27:54 UTC +--- powerpc64/p8/aes-decrypt-internal.asm.orig 2025-06-26 18:29:03 UTC +++ powerpc64/p8/aes-decrypt-internal.asm @@ -64,7 +64,7 @@ PROLOGUE(_nettle_aes_decrypt) diff --git a/security/nettle/files/patch-powerpc64-p8-aes-encrypt-internal.asm b/security/nettle/files/patch-powerpc64-p8-aes-encrypt-internal.asm index 313ba61a4f6b..67218e1caaf4 100644 --- a/security/nettle/files/patch-powerpc64-p8-aes-encrypt-internal.asm +++ b/security/nettle/files/patch-powerpc64-p8-aes-encrypt-internal.asm @@ -1,6 +1,6 @@ ---- powerpc64/p8/aes-encrypt-internal.asm.orig 2022-06-02 17:57:16 UTC +--- powerpc64/p8/aes-encrypt-internal.asm.orig 2025-06-26 18:29:03 UTC +++ powerpc64/p8/aes-encrypt-internal.asm -@@ -63,7 +63,7 @@ define(`S7', `v9') +@@ -64,7 +64,7 @@ PROLOGUE(_nettle_aes_encrypt) define(`FUNC_ALIGN', `5') PROLOGUE(_nettle_aes_encrypt) @@ -9,7 +9,7 @@ subi ROUNDS,ROUNDS,1 srdi LENGTH,LENGTH,4 -@@ -328,6 +328,6 @@ EPILOGUE(_nettle_aes_encrypt) +@@ -269,6 +269,6 @@ EPILOGUE(_nettle_aes_encrypt) .data .align 4 diff --git a/security/nettle/pkg-plist b/security/nettle/pkg-plist index 25ba25f62658..48c756c49b45 100644 --- a/security/nettle/pkg-plist +++ b/security/nettle/pkg-plist @@ -79,11 +79,11 @@ include/nettle/yarrow.h lib/libhogweed.a lib/libhogweed.so lib/libhogweed.so.6 -lib/libhogweed.so.6.10 +lib/libhogweed.so.6.11 lib/libnettle.a lib/libnettle.so lib/libnettle.so.8 -lib/libnettle.so.8.10 +lib/libnettle.so.8.11 libdata/pkgconfig/hogweed.pc libdata/pkgconfig/nettle.pc %%PORTDOCS%%%%DOCSDIR%%/NEWS diff --git a/security/sudo/Makefile b/security/sudo/Makefile index 14466a9e7774..b9bea691da08 100644 --- a/security/sudo/Makefile +++ b/security/sudo/Makefile @@ -1,5 +1,5 @@ PORTNAME= sudo -PORTVERSION= 1.9.17 +PORTVERSION= 1.9.17p1 CATEGORIES= security MASTER_SITES= SUDO diff --git a/security/sudo/distinfo b/security/sudo/distinfo index 9b38cd2b5a6c..a01a900722c6 100644 --- a/security/sudo/distinfo +++ b/security/sudo/distinfo @@ -1,3 +1,3 @@ -TIMESTAMP = 1750523514 -SHA256 (sudo-1.9.17.tar.gz) = 3f212c69d534d5822b492d099abb02a593f91ca99f5afde5cb9bd3e1dcdad069 -SIZE (sudo-1.9.17.tar.gz) = 5447899 +TIMESTAMP = 1751356446 +SHA256 (sudo-1.9.17p1.tar.gz) = ff607ea717072197738a78f778692cd6df9a7e3e404565f51de063ca27455d32 +SIZE (sudo-1.9.17p1.tar.gz) = 5449076 diff --git a/security/trivy/Makefile b/security/trivy/Makefile index 05cfa55f0b39..d208cccbab53 100644 --- a/security/trivy/Makefile +++ b/security/trivy/Makefile @@ -1,7 +1,6 @@ PORTNAME= trivy DISTVERSIONPREFIX= v -DISTVERSION= 0.63.0 -PORTREVISION= 1 +DISTVERSION= 0.64.0 CATEGORIES= security MAINTAINER= mfechner@FreeBSD.org diff --git a/security/trivy/distinfo b/security/trivy/distinfo index 14015874c1c6..24ad8282e01f 100644 --- a/security/trivy/distinfo +++ b/security/trivy/distinfo @@ -1,5 +1,5 @@ -TIMESTAMP = 1748580283 -SHA256 (go/security_trivy/trivy-v0.63.0/v0.63.0.mod) = f0b5b8182a3155cfd22aedd2f1266794a26549664c18b8358a411ba634188fa3 -SIZE (go/security_trivy/trivy-v0.63.0/v0.63.0.mod) = 23467 -SHA256 (go/security_trivy/trivy-v0.63.0/v0.63.0.zip) = 638bc4adc54bf61afc8647c9f4fa5db30e6352dfe033655c30d0af02eca5c14d -SIZE (go/security_trivy/trivy-v0.63.0/v0.63.0.zip) = 58804833 +TIMESTAMP = 1751363247 +SHA256 (go/security_trivy/trivy-v0.64.0/v0.64.0.mod) = 0cdadb981316deab57b0abfdca161b8a907173478b82770c901c8d58ce4a2016 +SIZE (go/security_trivy/trivy-v0.64.0/v0.64.0.mod) = 23200 +SHA256 (go/security_trivy/trivy-v0.64.0/v0.64.0.zip) = f5f0943b22846cd637d140585dd5a318e303cf0fe9f45b5f138153e2a292fc06 +SIZE (go/security_trivy/trivy-v0.64.0/v0.64.0.zip) = 58856559 diff --git a/security/vuxml/vuln/2025.xml b/security/vuxml/vuln/2025.xml index e9e2390a00f0..29b966ccfd90 100644 --- a/security/vuxml/vuln/2025.xml +++ b/security/vuxml/vuln/2025.xml @@ -1,3 +1,184 @@ + <vuln vid="24f4b495-56a1-11f0-9621-93abbef07693"> + <topic>sudo -- privilege escalation vulnerability through host and chroot options</topic> + <affects> + <package> + <name>sudo</name> + <range><lt>1.9.17p1</lt></range> + </package> + <package> + <name>sudo-sssd</name> + <range><lt>1.9.17p1</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>Todd C. Miller reports, crediting Rich Mirch from Stratascale Cyber Research Unit (CRU):</p> + <blockquote cite="https://www.sudo.ws/releases/stable/"> + <p>Sudo 1.9.17p1:</p> + <ul> + <li> + Fixed CVE-2025-32462. Sudo's -h (--host) option could be specified + when running a command or editing a file. This could enable a + local privilege escalation attack if the sudoers file allows the + user to run commands on a different host. For more information, + see Local Privilege Escalation via host option. + </li> + <li> + Fixed CVE-2025-32463. An attacker can leverage sudo's -R + (--chroot) option to run arbitrary commands as root, even if they + are not listed in the sudoers file. The chroot support has been + deprecated an will be removed entirely in a future release. For + more information, see Local Privilege Escalation via chroot + option. + </li> + </ul> + </blockquote> + </body> + </description> + <references> + <cvename>CVE-2025-32462</cvename> + <cvename>CVE-2025-32463</cvename> + <url>https://www.sudo.ws/releases/stable/</url> + <url>https://www.stratascale.com/vulnerability-alert-CVE-2025-32462-sudo-host</url> + <url>https://www.stratascale.com/vulnerability-alert-CVE-2025-32463-sudo-chroot</url> + </references> + <dates> + <discovery>2025-04-01</discovery> + <entry>2025-07-01</entry> + </dates> + </vuln> + + <vuln vid="8df49466-5664-11f0-943a-18c04d5ea3dc"> + <topic>xorg server -- Multiple vulnerabilities</topic> + <affects> + <package> + <name>xorg-server</name> + <name>xephyr</name> + <name>xorg-vfbserver</name> + <range><lt>21.1.18,1</lt></range> + </package> + <package> + <name>xorg-nextserver</name> + <range><lt>21.1.18,2</lt></range> + </package> + <package> + <name>xwayland</name> + <range><lt>24.1.8,1</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>The X.Org project reports:</p> + <blockquote cite="https://lists.x.org/archives/xorg-announce/2025-February/003584.html"> + <ul> + <li> + CVE-2025-49176: Integer overflow in Big Requests Extension + <p>The Big Requests extension allows requests larger than the 16-bit length + limit. + It uses integers for the request length and checks for the size not to + exceed the maxBigRequestSize limit, but does so after translating the + length to integer by multiplying the given size in bytes by 4. + In doing so, it might overflow the integer size limit before actually + checking for the overflow, defeating the purpose of the test.</p> + </li> + </ul> + </blockquote> + </body> + </description> + <references> + <cvename>CVE-2025-49176</cvename> + <url>https://lists.x.org/archives/xorg/2025-June/062055.html</url> + </references> + <dates> + <discovery>2025-06-17</discovery> + <entry>2025-07-01</entry> + </dates> + </vuln> + + <vuln vid="b14cabf7-5663-11f0-943a-18c04d5ea3dc"> + <topic>xorg server -- Multiple vulnerabilities</topic> + <affects> + <package> + <name>xorg-server</name> + <name>xephyr</name> + <name>xorg-vfbserver</name> + <range><lt>21.1.17,1</lt></range> + </package> + <package> + <name>xorg-nextserver</name> + <range><lt>21.1.17,2</lt></range> + </package> + <package> + <name>xwayland</name> + <range><lt>24.1.7,1</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>The X.Org project reports:</p> + <blockquote cite="https://lists.x.org/archives/xorg-announce/2025-February/003584.html"> + <ul> + <li> + CVE-2025-49175: Out-of-bounds access in X Rendering extension (Animated cursors) + <p>The X Rendering extension allows creating animated cursors providing a + list of cursors. + By default, the Xserver assumes at least one cursor is provided while a + client may actually pass no cursor at all, which causes an out-of-bound + read creating the animated cursor and a crash of the Xserver.</p> + </li> + <li> + CVE-2025-49177: Data leak in XFIXES Extension 6 (XFixesSetClientDisconnectMode) + + <p>The handler of XFixesSetClientDisconnectMode does not check the client + request length. + A client could send a shorter request and read data from a former + request.</p> + </li> + <li> + CVE-2025-49178: Unprocessed client request via bytes to ignore + + <p>When reading requests from the clients, the input buffer might be shared + and used between different clients. + If a given client sends a full request with non-zero bytes to ignore, + the bytes to ignore may still be non-zero even though the request is + full, in which case the buffer could be shared with another client who's + request will not be processed because of those bytes to ignore, leading + to a possible hang of the other client request.</p> + </li> + <li> + CVE-2025-49179: Integer overflow in X Record extension + + <p>The RecordSanityCheckRegisterClients() function in the X Record extension + implementation of the Xserver checks for the request length, but does not + check for integer overflow. + A client might send a very large value for either the number of clients + or the number of protocol ranges that will cause an integer overflow in + the request length computation, defeating the check for request length.</p> + </li> + <li> + CVE-2025-49180: Integer overflow in RandR extension (RRChangeProviderProperty) + + <p>A client might send a request causing an integer overflow when computing + the total size to allocate in RRChangeProviderProperty().</p> + </li> + </ul> + </blockquote> + </body> + </description> + <references> + <cvename>CVE-2025-49175</cvename> + <cvename>CVE-2025-49177</cvename> + <cvename>CVE-2025-49178</cvename> + <cvename>CVE-2025-49179</cvename> + <cvename>CVE-2025-49180</cvename> + <url>https://lists.x.org/archives/xorg/2025-June/062055.html</url> + </references> + <dates> + <discovery>2025-06-17</discovery> + <entry>2025-07-01</entry> + </dates> + </vuln> + <vuln vid="6b1b8989-55b0-11f0-ac64-589cfc10a551"> <topic>podman -- TLS connection used to pull VM images was not validated</topic> <affects> |