458,713 commits found in 62 milliseconds
OpenBSD /ports io7L54G — lang/verilator Makefile distinfo, lang/verilator/patches patch-bin_verilator patch-test_regress_driver_py Update to Verilator 5.044
Correctness from sthen@
ok sthen@
Reuse an unused field in uvmexp, and introduce swpskip. In the near
future, this will count how many times pages are not sent to swap
because the pagedaemon detects the swap system won't be able to deliver
results (and toss the cluster of pages back)
ok beck
The uvm display abuses the FLD subsystem with a set of empty labels,
which results in an extra blank line. Work around this by noticing all
the labels are empty and not doing a newline.
Fix up distinfo size mismatch in lang/ghc (sha256 was OK)
Noted by naddy@
remove duplicate includes; ok dtucker@
correct bounds check on number of memory segments
found with smatch, feedback and ok stsp@
update extern for renamed variable
EncapContentInfo_it was renamed to ContentInfo_it in ccr.c rev 1.31
ok claudio@
OpenBSD /ports BTuGds6 — productivity/khal Makefile distinfo, productivity/khal/patches patch-khal_ui_calendarwidget_py patch-khal_ui_editor_py update to khal-0.13.0, ok jung@
drop jung as maintainer as he requested
update p5-Net-DNS-SEC to 1.27
OpenBSD /ports bmXcI8Y — security/polarssl Makefile distinfo, security/polarssl/patches patch-library_timing_c patch-CMakeLists_txt MFC: SECURITY update to mbedtls-2.28.10
Update to the last release in the now unsupported 2.28 LTS branch.
- Buffer overread in TLS stream cipher suites
https://mbed-tls.readthedocs.io/en/latest/security-advisories/mbedtls-security-advisory-2023-10-1/
- Timing side channel in private key RSA operations.
https://mbed-tls.readthedocs.io/en/latest/security-advisories/mbedtls-security-advisory-2024-01-1/
- Buffer overflow in mbedtls_x509_set_extension()
https://mbed-tls.readthedocs.io/en/latest/security-advisories/mbedtls-security-advisory-2024-01-2/
- Insecure handling of shared memory in PSA Crypto APIs
https://github.com/Mbed-TLS/mbedtls-docs/blob/main/security-advisories/mbedtls-security-advisory-2024-03.md
- CTR_DRBG prioritized over HMAC_DRBG as the PSA DRBG
https://mbed-tls.readthedocs.io/en/latest/security-advisories/mbedtls-security-advisory-2024-08-1/
- Potential authentication bypass in TLS handshake
https://mbed-tls.readthedocs.io/en/latest/security-advisories/mbedtls-security-advisory-2025-03-2/
- TLS clients may unwittingly skip server authentication
https://mbed-tls.readthedocs.io/en/latest/security-advisories/mbedtls-security-advisory-2025-03-1/
OpenBSD /ports MCjsnBJ — security/polarssl Makefile distinfo, security/polarssl/patches patch-library_timing_c patch-include_mbedtls_config_h SECURITY update to mbedtls-2.28.10
Update to the last release in the now unsupported 2.28 LTS branch.
- Buffer overread in TLS stream cipher suites
https://mbed-tls.readthedocs.io/en/latest/security-advisories/mbedtls-security-advisory-2023-10-1/
- Timing side channel in private key RSA operations.
https://mbed-tls.readthedocs.io/en/latest/security-advisories/mbedtls-security-advisory-2024-01-1/
- Buffer overflow in mbedtls_x509_set_extension()
https://mbed-tls.readthedocs.io/en/latest/security-advisories/mbedtls-security-advisory-2024-01-2/
- Insecure handling of shared memory in PSA Crypto APIs
https://github.com/Mbed-TLS/mbedtls-docs/blob/main/security-advisories/mbedtls-security-advisory-2024-03.md
- CTR_DRBG prioritized over HMAC_DRBG as the PSA DRBG
https://mbed-tls.readthedocs.io/en/latest/security-advisories/mbedtls-security-advisory-2024-08-1/
- Potential authentication bypass in TLS handshake
https://mbed-tls.readthedocs.io/en/latest/security-advisories/mbedtls-security-advisory-2025-03-2/
- TLS clients may unwittingly skip server authentication
https://mbed-tls.readthedocs.io/en/latest/security-advisories/mbedtls-security-advisory-2025-03-1/
update p5-Net-DNS-1.54
misc/llama.cpp: update to b8067
OK: volker@
OpenBSD /ports p5Yyi8h — devel/libggml Makefile distinfo, devel/libggml/patches patch-src_ggml-backend-reg_cpp patch-CMakeLists_txt devel/libggml: update to 0.9.7
OK: volker@
Update zpaqfranz to 64.5
From maintainer tux0r, thanks!
textproc/pastel: Update to 0.12.0
textproc/hexyl: Update to 0.17.0
OpenBSD /ports cPRhwJB — x11/kde-applications/audiocd-kio Makefile, x11/kde-applications/audiocd-kio/pkg PLIST Regen PLIST to unbreak.
Move MODCMAKE_POLICY_VERSION_OVERRIDE where it belongs.
security/nss: update to 3.120.1
Bug 2009552 - avoid integer overflow in platform-independent ghash
OpenBSD /ports lvLy66Z — wayland/wf-recorder distinfo Makefile, wayland/wf-recorder/patches patch-src_main_cpp patch-src_frame-writer_cpp wayland/wf-recorder: update to 0.6.0
see https://github.com/ammen99/wf-recorder/releases/tag/v0.6.0
devel/visualvm: remove deployed with precompiled rubbish
noticed by ian@
+gemini-cli
OpenBSD /ports iV9JAGH — sysutils/gemini-cli Makefile distinfo, sysutils/gemini-cli/pkg PLIST DESCR Initial revision
Handle VMMCALL in vctrap()
When SEV guest userland issues a vmmcall instruction, a #VC exception
with code SVM_VMEXIT_VMMCALL will be raised in the guest kernel.
For now we do not allow vmmcalls from guest userland, thus terminate
the userland process with SIGILL.
This is similar to the non-SEV case.
ok mlarkin@
vmm(4) : Ignore VMGEXIT request and inject #UD
SEV guest userland processes are allowed to issue the vmgexit
instruction. However, guest userland has no access to the GHCB.
VMEXITs with exit reason SVM_VMEXIT_VMGEXIT initiated by the guest
kernel will always provide a valid GHCB request.
Moreover, as the guest kernel makes sure, that the GHCB contains
no request when guest userland is running, a rouge guest userland
process can only force repeated VMEXITs with an empty GHCB.
Therefore, in vmm(4) 's vmgexit handler inject #UD when the exit
reason is not updated with data from the GHCB and stays on
SVM_VMEXIT_VMGEXIT.
ok mlarkin@
OpenBSD /src JrRbDu1 — sys/arch/amd64/amd64 ghcb.c vmm_machdep.c, sys/arch/amd64/include ghcb.h vmm(4) : Check for and allow empty GHCB; only clear valid bitmap
The GHCB valid bitmap indicates wether the GHCB contains a request
or not. When no bits are set, ignore the GHCB and do not sync with
vCPU state.
To clear/invalidate the GHCB just zero out the valid bitmap instead
of the full GHCB.
ok mlarkin@
mail/mozilla-thunderbird: MFC security update to 140.7.2.
see https://www.thunderbird.net/en-US/thunderbird/140.7.2esr/releasenotes/
fixes https://www.mozilla.org/en-US/security/advisories/mfsa2026-10/
CVE-2026-2447 : Heap buffer overflow in libvpx
www/mozilla-firefox: security update to 147.0.4
see https://www.firefox.com/en-US/firefox/147.0.4/releasenotes/
fixes https://www.mozilla.org/en-US/security/advisories/mfsa2026-10/
CVE-2026-2447 : Heap buffer overflow in libvpx
OpenBSD /ports FdIGYeN — www/firefox-i18n distinfo Makefile.inc, www/mozilla-firefox distinfo Makefile www/mozilla-firefox: security update to 147.0.4.
see https://www.firefox.com/en-US/firefox/147.0.4/releasenotes/
fixes https://www.mozilla.org/en-US/security/advisories/mfsa2026-10/
CVE-2026-2447 : Heap buffer overflow in libvpx