summaryrefslogtreecommitdiff
path: root/security
diff options
context:
space:
mode:
Diffstat (limited to 'security')
-rw-r--r--security/openvpn/Makefile2
-rw-r--r--security/openvpn/files/patch-src_openvpn_dco__freebsd.c14
-rw-r--r--security/openvpn/files/patch-src_openvpn_init.c22
-rw-r--r--security/vuxml/vuln/2025.xml39
4 files changed, 66 insertions, 11 deletions
diff --git a/security/openvpn/Makefile b/security/openvpn/Makefile
index 44f30253b5b2..690ac26738d8 100644
--- a/security/openvpn/Makefile
+++ b/security/openvpn/Makefile
@@ -1,6 +1,6 @@
PORTNAME= openvpn
DISTVERSION= 2.6.14
-PORTREVISION?= 2
+PORTREVISION?= 3
CATEGORIES= security net net-vpn
MASTER_SITES= https://swupdate.openvpn.org/community/releases/ \
https://build.openvpn.net/downloads/releases/ \
diff --git a/security/openvpn/files/patch-src_openvpn_dco__freebsd.c b/security/openvpn/files/patch-src_openvpn_dco__freebsd.c
index 22c24baa9ec3..686fc6584be7 100644
--- a/security/openvpn/files/patch-src_openvpn_dco__freebsd.c
+++ b/security/openvpn/files/patch-src_openvpn_dco__freebsd.c
@@ -1,6 +1,6 @@
--- src/openvpn/dco_freebsd.c.orig 2025-04-02 06:53:10 UTC
+++ src/openvpn/dco_freebsd.c
-@@ -72,6 +72,67 @@ sockaddr_to_nvlist(const struct sockaddr *sa)
+@@ -72,6 +72,61 @@ sockaddr_to_nvlist(const struct sockaddr *sa)
return (nvl);
}
@@ -32,10 +32,7 @@
+
+ in->sin_len = sizeof(*in);
+ data = nvlist_get_binary(nvl, "address", &len);
-+ if (len != sizeof(in->sin_addr))
-+ {
-+ return (false);
-+ }
++ ASSERT(len == sizeof(in->sin_addr));
+ memcpy(&in->sin_addr, data, sizeof(in->sin_addr));
+ in->sin_port = nvlist_get_number(nvl, "port");
+ break;
@@ -49,10 +46,7 @@
+
+ in6->sin6_len = sizeof(*in6);
+ data = nvlist_get_binary(nvl, "address", &len);
-+ if (len != sizeof(in6->sin6_addr))
-+ {
-+ return (false);
-+ }
++ ASSERT(len == sizeof(in6->sin6_addr));
+ memcpy(&in6->sin6_addr, data, sizeof(in6->sin6_addr));
+ in6->sin6_port = nvlist_get_number(nvl, "port");
+ break;
@@ -68,7 +62,7 @@
int
dco_new_peer(dco_context_t *dco, unsigned int peerid, int sd,
struct sockaddr *localaddr, struct sockaddr *remoteaddr,
-@@ -570,6 +631,25 @@ dco_do_read(dco_context_t *dco)
+@@ -570,6 +625,25 @@ dco_do_read(dco_context_t *dco)
case OVPN_NOTIF_ROTATE_KEY:
dco->dco_message_type = OVPN_CMD_SWAP_KEYS;
break;
diff --git a/security/openvpn/files/patch-src_openvpn_init.c b/security/openvpn/files/patch-src_openvpn_init.c
new file mode 100644
index 000000000000..0d09e6050236
--- /dev/null
+++ b/security/openvpn/files/patch-src_openvpn_init.c
@@ -0,0 +1,22 @@
+--- src/openvpn/init.c.orig 2025-04-02 06:53:10 UTC
++++ src/openvpn/init.c
+@@ -330,7 +330,7 @@ management_callback_remote_entry_count(void *arg)
+ static unsigned int
+ management_callback_remote_entry_count(void *arg)
+ {
+- assert(arg);
++ ASSERT(arg);
+ struct context *c = (struct context *) arg;
+ struct connection_list *l = c->options.connection_list;
+
+@@ -340,8 +340,8 @@ management_callback_remote_entry_get(void *arg, unsign
+ static bool
+ management_callback_remote_entry_get(void *arg, unsigned int index, char **remote)
+ {
+- assert(arg);
+- assert(remote);
++ ASSERT(arg);
++ ASSERT(remote);
+
+ struct context *c = (struct context *) arg;
+ struct connection_list *l = c->options.connection_list;
diff --git a/security/vuxml/vuln/2025.xml b/security/vuxml/vuln/2025.xml
index 0a19623ed18f..6a4e1eec9395 100644
--- a/security/vuxml/vuln/2025.xml
+++ b/security/vuxml/vuln/2025.xml
@@ -1,3 +1,42 @@
+ <vuln vid="bda50cf1-8bcf-11f0-b3f7-a8a1599412c6">
+ <topic>chromium -- multiple security fixes</topic>
+ <affects>
+ <package>
+ <name>chromium</name>
+ <range><lt>140.0.7339.80</lt></range>
+ </package>
+ <package>
+ <name>ungoogled-chromium</name>
+ <range><lt>140.0.7339.80</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Chrome Releases reports:</p>
+ <blockquote cite="https://chromereleases.googleblog.com/2025/09/stable-channel-update-for-desktop.html">
+ <p>This update includes 6 security fixes:</p>
+ <ul>
+ <li>[434513380] High CVE-2025-9864: Use after free in V8. Reported by Pavel Kuzmin of Yandex Security Team on 2025-07-28</li>
+ <li>[437147699] Medium CVE-2025-9865: Inappropriate implementation in Toolbar. Reported by Khalil Zhani on 2025-08-07</li>
+ <li>[379337758] Medium CVE-2025-9866: Inappropriate implementation in Extensions. Reported by NDevTK on 2024-11-16</li>
+ <li>[415496161] Medium CVE-2025-9867: Inappropriate implementation in Downloads. Reported by Farras Givari on 2025-05-04</li>
+ </ul>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2025-9864</cvename>
+ <cvename>CVE-2025-9865</cvename>
+ <cvename>CVE-2025-9866</cvename>
+ <cvename>CVE-2025-9867</cvename>
+ <url>https://chromereleases.googleblog.com/2025/09/stable-channel-update-for-desktop.html</url>
+ </references>
+ <dates>
+ <discovery>2025-09-02</discovery>
+ <entry>2025-09-07</entry>
+ </dates>
+ </vuln>
+
<vuln vid="340dc4c1-895a-11f0-b6e5-4ccc6adda413">
<topic>exiv2 -- Denial-of-service</topic>
<affects>