OpenBSD/src VUOLvaIsbin/slaacd engine.c

   Prevent buffer overflow by checking the correct counter.

   An attacker on the same layer 2 network can send rogue router
   advertisements, potentially crashing slaacd.

   From Maurice Hieronymus (mhi AT mailbox.org), thanks!

   OK deraadt
VersionDeltaFile
1.101+2-2sbin/slaacd/engine.c
+2-21 files

OpenBSD/ports ufhhcuJmisc/ietf-cli Makefile distinfo, misc/ietf-cli/patches patch-ietf

   Update ietf-cli 1.31pre0, ok job kn sthen (with a tweak)

   This updates the tool to the latest commit which includes version 1.31,
   but isn't tagged: https://github.com/paulehoffman/ietf-cli/issues/8

   1.30 adds an index subcommand for bcp and std (just like for rfc)
   1.31 prints the current document status on exit
VersionDeltaFile
1.21+3-2misc/ietf-cli/Makefile
1.8+2-2misc/ietf-cli/distinfo
1.9+1-1misc/ietf-cli/patches/patch-ietf
+6-53 files

OpenBSD/src nAw443Psys/arch/octeon/dev octciu.c

   sys/octeon: cleanup all interrupts

   octciu_next_irq() operates on a uint64_t pending interrupt bitmap, and
   irq spans the full 0..63 range. Using 1u << irq therefore builds a 32
   bit mask for a 64 bit word; once irq >= 32, the selected pending bit is
   no longer cleared correctly.

   The immediate consequence is loss of forward progress in the dispatcher
   loop: the same interrupt can remain logically pending in the local copy
   of isr, the loop can revisit it indefinitely, and the CPU can remain
   trapped in interrupt handling.

   OK: kettenis@, jca@, deraadt@
VersionDeltaFile
1.21+2-2sys/arch/octeon/dev/octciu.c
+2-21 files

OpenBSD/src 80a4oBxsys/netinet tcp_input.c

   Properly handle the FIN flag in tcp_flush_queue.

   Once a FIN packet is received all following data should simply be
   discarded.  Normally this is done in tcp_input but once traffic
   needs reassembly the FIN handling in the reassembly queue was not
   quite correct. Data directly following the FIN packet was also
   reassembled and the FIN was actually lost. The check if packets
   should be dropped only checked for SS_CANTRCVMORE which is only
   set after tcp_flush_queue returned TH_FIN.

   Reported by Xint Code
   OK sashan@ deraadt@
VersionDeltaFile
1.466+4-4sys/netinet/tcp_input.c
+4-41 files

OpenBSD/src peGTkwdsys/netinet ip_input.c

   Don't mix heap and stack pointers in offset calculation

   OK canacar@ claudio@ deraadt@
VersionDeltaFile
1.427+2-4sys/netinet/ip_input.c
+2-41 files

OpenBSD/src d4iMxv0usr.sbin/fw_update patterns.c

   Add pattern for riscv64-spacemit-dtb that matches smtgpio(4).

   ok deraadt@, jca@
VersionDeltaFile
1.20+2-1usr.sbin/fw_update/patterns.c
+2-11 files

OpenBSD/src J8gtX54sys/kern tty.c

   For sysctl({CTL_KERN, KERN_TTY, KERN_TTY_INFO), only export the
   t_session kernel address pointer if the caller is root.
   Reported by Bruce Dang of Calif.io
   ok claudio
VersionDeltaFile
1.183+4-2sys/kern/tty.c
+4-21 files

OpenBSD/src HRYmeG1sys/sys sysctl.h

   do not expose p_addr kernel address unless root
   from Bruce Dang of Calif.io
   ok claudio kettenis
VersionDeltaFile
1.248+4-3sys/sys/sysctl.h
+4-31 files

OpenBSD/ports jJwMTCtsecurity/py-omemo-dr Makefile distinfo

   update security/py-omemo-dr to 1.2.0
   This fixes an issue with OMEMO encrypted group chats in gajim

   ok martijn@ sthen@
VersionDeltaFile
1.8+2-3security/py-omemo-dr/Makefile
1.3+2-2security/py-omemo-dr/distinfo
+4-52 files

OpenBSD/ports RcsH6f8security/pcsc-tools distinfo Makefile

   update to pcsc-tools-1.7.4
VersionDeltaFile
1.13+2-2security/pcsc-tools/distinfo
1.18+1-1security/pcsc-tools/Makefile
+3-32 files

OpenBSD/ports cj0UYHMtextproc/py-icecream Makefile distinfo

   update to py3-icecream-2.2.0
VersionDeltaFile
1.12+1-4textproc/py-icecream/Makefile
1.9+2-2textproc/py-icecream/distinfo
+3-62 files

OpenBSD/ports jsQ39Xrinfrastructure/db user.list

   Comment out _exim

   ok sthen
VersionDeltaFile
1.487+2-2infrastructure/db/user.list
+2-21 files

OpenBSD/ports YMy8jQYwww/iridium distinfo, www/iridium/patches patch-chrome_browser_about_flags_cc patch-third_party_blink_renderer_platform_runtime_enabled_features_json5

   update to 2026.04.147.1
VersionDeltaFile
1.74+50-50www/iridium/patches/patch-chrome_browser_about_flags_cc
1.41+9-9www/iridium/patches/patch-third_party_blink_renderer_platform_runtime_enabled_features_json5
1.19+8-8www/iridium/patches/patch-chrome_browser_ui_startup_startup_browser_creator_impl_cc
1.13+2-2www/iridium/patches/patch-components_password_manager_core_browser_password_manual_fallback_flow_cc
1.115+2-2www/iridium/distinfo
1.10+2-2www/iridium/patches/patch-chrome_browser_renderer_context_menu_render_view_context_menu_cc
+73-738 files not shown
+84-8514 files

OpenBSD/ports DXu1ZrNwww/firefox-esr Makefile, www/firefox-esr/pkg README

   Make ffmpeg a RUN_DEPENDS so firefox-esr can play html5 audio and video
   right after install.

   Previously, users had to read the README and install ffmpeg themselves
   or else wonder why firefox-esr wouldn't play video.

   ok landry, tb, rsadowski, phessler
VersionDeltaFile
1.13+0-7www/firefox-esr/pkg/README
1.269+4-0www/firefox-esr/Makefile
+4-72 files

OpenBSD/ports uXlvDd9www/mozilla-firefox Makefile, www/mozilla-firefox/pkg README

   Make ffmpeg a RUN_DEPENDS so firefox can play html5 audio and video
   right after install.

   Previously, users had to read the README and install ffmpeg themselves
   or else wonder why firefox wouldn't play video.

   ok landry, tb, rsadowski, phessler
VersionDeltaFile
1.40+0-7www/mozilla-firefox/pkg/README
1.679+4-0www/mozilla-firefox/Makefile
+4-72 files

OpenBSD/ports dFLtObzwww/chromium distinfo, www/chromium/patches patch-chrome_browser_about_flags_cc patch-third_party_blink_renderer_platform_runtime_enabled_features_json5

   update to 147.0.7727.101
VersionDeltaFile
1.150+50-50www/chromium/patches/patch-chrome_browser_about_flags_cc
1.62+9-9www/chromium/patches/patch-third_party_blink_renderer_platform_runtime_enabled_features_json5
1.26+8-8www/chromium/patches/patch-chrome_browser_ui_startup_startup_browser_creator_impl_cc
1.468+6-6www/chromium/distinfo
1.99+2-2www/chromium/patches/patch-chrome_common_chrome_features_cc
1.95+2-2www/chromium/patches/patch-chrome_common_chrome_features_h
+77-778 files not shown
+88-8914 files

OpenBSD/ports rglItbAnet/tdesktop Makefile distinfo

   update to tdesktop 6.7.6
VersionDeltaFile
1.217+2-5net/tdesktop/Makefile
1.162+2-2net/tdesktop/distinfo
+4-72 files

OpenBSD/ports CnPExn5graphics/p5-Image-ExifTool Makefile distinfo, graphics/p5-Image-ExifTool/pkg PLIST

   Update to p5-Image-ExifTool-13.56.
VersionDeltaFile
1.107+7-7graphics/p5-Image-ExifTool/Makefile
1.96+2-2graphics/p5-Image-ExifTool/distinfo
1.56+2-0graphics/p5-Image-ExifTool/pkg/PLIST
+11-93 files

OpenBSD/ports JpFlB6unet/tg_owt Makefile distinfo

   update to latest tg_owt
VersionDeltaFile
1.64+5-4net/tg_owt/Makefile
1.33+2-2net/tg_owt/distinfo
+7-62 files

OpenBSD/ports Tv46a0tsysutils/diffoscope distinfo Makefile

   Update to diffoscope-317.
VersionDeltaFile
1.73+2-2sysutils/diffoscope/distinfo
1.89+1-1sysutils/diffoscope/Makefile
+3-32 files

OpenBSD/ports IVg4sWHtelephony/py-phonenumbers distinfo Makefile

   Update to py3-phonenumbers-9.0.28.
VersionDeltaFile
1.32+2-2telephony/py-phonenumbers/distinfo
1.44+1-1telephony/py-phonenumbers/Makefile
+3-32 files

OpenBSD/src FFcnP6Bshare/man/man4 pfsync.4

   Fix missing word, that rather changed the meaning, spotted by "schalken" on IRC.
VersionDeltaFile
1.41+3-3share/man/man4/pfsync.4
+3-31 files

OpenBSD/src KyN2LTelib/libtls tls_signer.c tls_ocsp.c

   libtls: consistently handle allocation failures

   Use tls_set_errorx() or tls_error_setx() rather than the versions without
   x for TLS_ERROR_OUT_OF_MEMORY. ENOMEM adds no further info.

   From Michael Forney

   ok bcook
VersionDeltaFile
1.15+4-4lib/libtls/tls_signer.c
1.29+2-2lib/libtls/tls_ocsp.c
+6-62 files

OpenBSD/src otMPdS1lib/libtls tls_config.c

   libtls: use TLS_ERROR_OUT_OF_MEMORY after malloc failure

   tls_config_load_file() hat a spot that used TLS_ERROR_UNKNOWN, so switch
   that to the usual error code. Use tls_error_setx() since strerror(ENOMEM)
   adds nothing.

   From Michael Forney

   ok bcook
VersionDeltaFile
1.73+2-2lib/libtls/tls_config.c
+2-21 files

OpenBSD/src EUZWKsZlib/libtls tls_keypair.c

   libtls: use tls_error_setx() after BIO_new_mem_buf()

   This is the only place where tls_error_set() was used. While the new length
   check now guarantees that the failure is due to ENOMEM, this info does not
   add value.

   From Michael Forney

   ok bcook
VersionDeltaFile
1.12+2-2lib/libtls/tls_keypair.c
+2-21 files

OpenBSD/src QBOAOc0lib/libtls tls_ocsp.c tls_server.c

   libtls: prefer x version of error setting

   If a check fails and errno is not necessarily set by the previous API call
   use tls_set_errorx() or tls_error_setx() since turning an unrelated errno
   into an error string is unhelpful.

   From Michael Forney

   ok bcook
VersionDeltaFile
1.28+5-5lib/libtls/tls_ocsp.c
1.53+5-5lib/libtls/tls_server.c
1.11+3-3lib/libtls/tls_keypair.c
1.105+2-2lib/libtls/tls.c
1.52+2-2lib/libtls/tls_client.c
+17-175 files

OpenBSD/src TetivHnsys/kern kern_sysctl.c

   Similar to sysctl KERN_SYSVIPC_SEMINFO, KERN_SYSVIPC_SHM_INFO also leaks
   the same kernel pointer that shminfo() leaks.
   ok dgl
VersionDeltaFile
1.490+2-1sys/kern/kern_sysctl.c
+2-11 files

OpenBSD/src kzZDrXHsys/kern kern_sysctl.c, usr.bin/ipcs ipcs.c

   sysctl KERN_SYSVIPC_SEM_INFO was leaking the sem_base kernel pointer to userland.

   This was used by ipcs(1), so change to use sem_ctime instead to decide if it
   should show the semaphore.

   Found independently by me and a report from Bruce Dang of Calif.io (minutes apart).
   ok deraadt
VersionDeltaFile
1.28+2-2usr.bin/ipcs/ipcs.c
1.489+2-1sys/kern/kern_sysctl.c
+4-32 files

OpenBSD/ports snKiFkCsysutils/consul-template distinfo modules.inc

   Update to consul-template-0.42.0.
VersionDeltaFile
1.50+120-118sysutils/consul-template/distinfo
1.25+45-44sysutils/consul-template/modules.inc
1.65+1-1sysutils/consul-template/Makefile
+166-1633 files

OpenBSD/ports RarWqwYsecurity/libgcrypt Makefile distinfo, security/libgcrypt/patches patch-config_h_in

   Update to libgcrypt-1.12.2.
VersionDeltaFile
1.102+3-3security/libgcrypt/Makefile
1.51+2-2security/libgcrypt/distinfo
1.5+1-1security/libgcrypt/patches/patch-config_h_in
+6-63 files