OpenBSD/ports I0LmH07www/hugo distinfo Makefile

   www/hugo: update to 0.159.2

   Changes:
    - https://github.com/gohugoio/hugo/releases/tag/v0.159.2
VersionDeltaFile
1.92+2-2www/hugo/distinfo
1.100+1-1www/hugo/Makefile
+3-32 files

OpenBSD/src PFEhMDVgnu/usr.bin/perl class.c, gnu/usr.bin/perl/cpan/Compress-Raw-Zlib/zlib-src zlib.h

   Update to perl 5.42.2

   The two main changes are both from 5.42.1, a timezone fix and a
   corner case for auto-vivification.

   The CVE from 5.42.1 we had already patched and the zlib update in
   5.42.2 is in code we don't use because we link against the system
   zlib.

   https://metacpan.org/release/SHAY/perl-5.42.1/view/pod/perldelta.pod
   https://metacpan.org/release/SHAY/perl-5.42.2/view/pod/perldelta.pod

   I'm not concerned -- sthen@
   I think you can just commit this -- naddy@
   good timing -- deraadt@
   OK -- blumh@
VersionDeltaFile
1.2+1,383-683gnu/usr.bin/perl/cpan/Compress-Raw-Zlib/zlib-src/zlib.h
1.1+1,556-0gnu/usr.bin/perl/pod/perl5420delta.pod
1.33+789-749gnu/usr.bin/perl/pod/perlhist.pod
1.30+51-1,481gnu/usr.bin/perl/pod/perldelta.pod
1.19+1,287-1gnu/usr.bin/perl/dist/Module-CoreList/lib/Module/CoreList.pm
1.2+523-194gnu/usr.bin/perl/class.c
+5,589-3,10871 files not shown
+8,030-4,34277 files

OpenBSD/ports pU630qqnet/p5-NetAddr-MAC Makefile distinfo

   update p5-NetAddr-MAC to 1.00
   from maintainer Mikolaj Kucharski
VersionDeltaFile
1.10+4-1net/p5-NetAddr-MAC/Makefile
1.6+2-2net/p5-NetAddr-MAC/distinfo
+6-32 files

OpenBSD/ports wdknkLYaudio/schismtracker Makefile distinfo, audio/schismtracker/patches patch-configure_ac

   schismtracker: switch to upstream provided tarball.

   This removes the need to run autoconf and makes the version number patch
   unnecessary.
VersionDeltaFile
1.65+10-7audio/schismtracker/Makefile
1.47+2-2audio/schismtracker/distinfo
1.47+0-0audio/schismtracker/patches/patch-configure_ac
+12-93 files

OpenBSD/src zTBaiTNregress/sbin/iked/parser common.c, sbin/iked ikev2_pld.c ikev2.c

   Add SA state check for CREATE_CHILD_SA exchange, similar to what we do
   for INFORMATIONAL exchanges. iked currently assumes that IKE_AUTH always
   results in valid child SAs, so IKEV2_STATE_ESTABLISHED means we have
   successfully completed the IKE_AUTH exchange for the SA.

   Independently found by Dirk Loss and Daniel Polak (SYS.nl)
   from tobhe@; ok and discussed with markus@ stsp@

   Add ikev2_validate_ef() to validate fragment payload header size field
   as we do for other IKEv2 payloads.

   Reported by Dirk Loss
   from tobhe@; ok markus@

   iked only ever handles one exchange at a time so we can drop the
   entire fragment queue instead of doing a lookup based on the msgid

   Found by Dirk Loss
   from tobhe@; ok markus@ hshoexer@

    [11 lines not shown]
VersionDeltaFile
1.136.6.1+23-6sbin/iked/ikev2_pld.c
1.391.4.1+8-2sbin/iked/ikev2.c
1.13.12.1+2-3regress/sbin/iked/parser/common.c
+33-113 files

OpenBSD/src hrar06sregress/sbin/iked/parser common.c, sbin/iked ikev2_pld.c ikev2.c

   Add SA state check for CREATE_CHILD_SA exchange, similar to what we do
   for INFORMATIONAL exchanges. iked currently assumes that IKE_AUTH always
   results in valid child SAs, so IKEV2_STATE_ESTABLISHED means we have
   successfully completed the IKE_AUTH exchange for the SA.

   Independently found by Dirk Loss and Daniel Polak (SYS.nl)
   from tobhe@; ok and discussed with markus@ stsp@

   Add ikev2_validate_ef() to validate fragment payload header size field
   as we do for other IKEv2 payloads.

   Reported by Dirk Loss
   from tobhe@; ok markus@

   iked only ever handles one exchange at a time so we can drop the
   entire fragment queue instead of doing a lookup based on the msgid

   Found by Dirk Loss
   from tobhe@; ok markus@ hshoexer@

    [11 lines not shown]
VersionDeltaFile
1.136.4.1+23-6sbin/iked/ikev2_pld.c
1.394.2.1+8-2sbin/iked/ikev2.c
1.13.10.1+2-3regress/sbin/iked/parser/common.c
+33-113 files

OpenBSD/ports ANBq0alsecurity/openssl-ruby-tests Makefile distinfo

   Update to openssl-ruby-tests 20260401
VersionDeltaFile
1.162+2-2security/openssl-ruby-tests/Makefile
1.142+2-2security/openssl-ruby-tests/distinfo
+4-42 files

OpenBSD/ports q2FGvbKeditors/neovim distinfo Makefile, editors/neovim/patches patch-static-deps_luajit_src_lj_arch_h

   editors/neovim: update to v0.12.0.

   Diff from Laurent Cheylus, thanks!
VersionDeltaFile
1.31+143-68editors/neovim/pkg/PLIST
1.39+16-16editors/neovim/distinfo
1.65+13-11editors/neovim/Makefile
1.6+1-1editors/neovim/patches/patch-static-deps_luajit_src_lj_arch_h
+173-964 files

OpenBSD/ports 9eae1iweditors/emacs Makefile, editors/emacs/patches patch-src_treesit_c

   editors/emacs: patch to fix linkage with tree-sitter-0.26.x

   OK from maintainer, jca@, thanks.
VersionDeltaFile
1.1+96-0editors/emacs/patches/patch-src_treesit_c
1.128+1-1editors/emacs/Makefile
+97-12 files

OpenBSD/ports y2H9QCEtextproc/tree-sitter Makefile distinfo, textproc/tree-sitter/patches patch-Makefile

   textproc/tree-sitter: update to v0.26.8.

   Diff from Laurent Cheylus, thanks!
VersionDeltaFile
1.6+17-17textproc/tree-sitter/patches/patch-Makefile
1.19+2-5textproc/tree-sitter/Makefile
1.11+2-2textproc/tree-sitter/distinfo
+21-243 files

OpenBSD/ports zc5lkrYnet/openvpn distinfo Makefile

   Update to openvpn-2.7.1

   https://github.com/OpenVPN/openvpn/blob/v2.7.1/Changes.rst
VersionDeltaFile
1.73+2-2net/openvpn/distinfo
1.145+1-2net/openvpn/Makefile
+3-42 files

OpenBSD/ports eaVdO0osecurity/mbedtls Makefile distinfo, security/mbedtls/patches patch-include_mbedtls_mbedtls_config_h

   Security update to mbedtls-3.6.6

   Fixes for:
   Client impersonation while resuming a TLS 1.3 session (CVE-2026-34873)
   Entropy on Linux can fall back to /dev/urandom (CVE-2026-34871)
   PSA random generator cloning CVE-2026-25835
   Compiler-induced constant-time violations (CVE-2025-66442)
   Null pointer dereference when setting a distinguished name (CVE-2026-34874)
   Buffer overflow in FFDH public key export (CVE-2026-34875)
   FFDH: lack of contributory behaviour due to improper input validation (CVE-2026-34872)
   Signature Algorithm Injection CVE-2026-25834
   CCM multipart finish tag-length validation bypass (CVE-2026-34876)
   Risk of insufficient protection of serialized session or context data
   leading to potential memory safety issues (CVE-2026-34877)
   Buffer underflow in x509_inet_pton_ipv6() (CVE-2026-25833)
VersionDeltaFile
1.7+3-4security/mbedtls/Makefile
1.2+2-2security/mbedtls/distinfo
1.3+2-2security/mbedtls/patches/patch-include_mbedtls_mbedtls_config_h
+7-83 files

OpenBSD/src UJqu9Desbin/iked ikev2.c

   If we receive a response it must have the exact same msgid as the last
   request we sent, so make sure they match exactly rather than allowing
   higher msgids.
   We can't handle out of order responses and if we don't receive a response
   in time we retransmit our request until we get one or run into a timeout.

   Found by Dirk Loss
   ok markus@ hshoexer@
VersionDeltaFile
1.397+2-2sbin/iked/ikev2.c
+2-21 files

OpenBSD/src Q2VkoCOregress/sbin/iked/parser common.c, sbin/iked ikev2_pld.c

   iked only ever handles one exchange at a time so we can drop the
   entire fragment queue instead of doing a lookup based on the msgid

   Found by Dirk Loss
   ok markus@ hshoexer@
VersionDeltaFile
1.138+2-4sbin/iked/ikev2_pld.c
1.14+2-3regress/sbin/iked/parser/common.c
+4-72 files

OpenBSD/src KivBzLLsbin/iked ikev2_pld.c

   Add ikev2_validate_ef() to validate fragment payload header size field
   as we do for other IKEv2 payloads.

   Reported by Dirk Loss
   ok markus@
VersionDeltaFile
1.137+22-3sbin/iked/ikev2_pld.c
+22-31 files

OpenBSD/src ylTxbOTsbin/iked ikev2.c

   Add SA state check for CREATE_CHILD_SA exchange, similar to what we do
   for INFORMATIONAL exchanges. iked currently assumes that IKE_AUTH always
   results in valid child SAs, so IKEV2_STATE_ESTABLISHED means we have
   successfully completed the IKE_AUTH exchange for the SA.

   Independently found by Dirk Loss and Daniel Polak (SYS.nl)
   ok and discussed with markus@ stsp@
VersionDeltaFile
1.396+7-1sbin/iked/ikev2.c
+7-11 files

OpenBSD/ports H8JCleHdevel/p5-Devel-NYTProf distinfo Makefile

   update p5-Devel-NYTProf to 6.15
VersionDeltaFile
1.30+2-2devel/p5-Devel-NYTProf/distinfo
1.46+2-1devel/p5-Devel-NYTProf/Makefile
+4-32 files

OpenBSD/src SGcoVBJusr.bin/deroff deroff.c

   chars[] array needs to be sized 256 because it is indexed at many places
   by (unsigned char) from input data.
   from Renaud Allard
VersionDeltaFile
1.19+2-2usr.bin/deroff/deroff.c
+2-21 files

OpenBSD/src sLBa7Arusr.bin/diff diffreg.c

   Use an unsigned sum value to provide deterministic overflow behaviour,
   for input to the hash.
   from Renaud Allard
VersionDeltaFile
1.96+2-2usr.bin/diff/diffreg.c
+2-21 files

OpenBSD/src Gp01f0tusr.bin/gprof elf.c

   Range-check fields inside the file to ensure they don't exceed the size
   of the file and cause later crashes.
   from renaud allard
VersionDeltaFile
1.7+10-0usr.bin/gprof/elf.c
+10-01 files

OpenBSD/src 23RyaX2libexec/rpc.rusersd rusersd.c

   Do the unveil() after the daemon() call, because otherwise we wouldneed
   "/dev/null" "rw" and "/" "r", in particular the second is ugly.
   pointed out by bluhm, discussion also with dgl.
VersionDeltaFile
1.25+10-10libexec/rpc.rusersd/rusersd.c
+10-101 files

OpenBSD/ports n9mPqzKinfrastructure/mk bsd.port.mk dist-tuple.port.mk

   Revert the WRKDIST diff. This breaks at least some of the ports that
   use DIST_TUPLE and set DISTNAME and needs a bit more work.
VersionDeltaFile
1.1649+3-3infrastructure/mk/bsd.port.mk
1.22+0-4infrastructure/mk/dist-tuple.port.mk
+3-72 files

OpenBSD/src TKRDYSKregress/lib/libcrypto/x509 verify.c

   Adjust depth check to match change in verifier.
VersionDeltaFile
1.14+2-2regress/lib/libcrypto/x509/verify.c
+2-21 files

OpenBSD/src G2cDZ8Slib/libcrypto/x509 x509_verify.c

   Restore the previous behaviour with maximum verification depth.

   The maximum depth is not expected to include the leaf certificate - restore
   the decrement prior to checking, which means the previous behaviour is
   retained for the callback depth and the maximum depth. Reduce the maximum
   depth by one in order to avoid the overwrite that could previously occur.

   Thanks to anton@ for flagging the rust-openssl failure in regress.

   ok tb@
VersionDeltaFile
1.75+7-7lib/libcrypto/x509/x509_verify.c
+7-71 files

OpenBSD/ports jdnhUXBtextproc/p5-XML-Parser distinfo Makefile

   update p5-XML-Parser to 2.54
VersionDeltaFile
1.15+2-2textproc/p5-XML-Parser/distinfo
1.40+1-1textproc/p5-XML-Parser/Makefile
+3-32 files

OpenBSD/ports EpzjWUcwww/chromium distinfo, www/chromium/patches patch-chrome_browser_about_flags_cc patch-third_party_blink_renderer_platform_runtime_enabled_features_json5

   update to 146.0.7680.177
VersionDeltaFile
1.148+55-55www/chromium/patches/patch-chrome_browser_about_flags_cc
1.60+10-10www/chromium/patches/patch-third_party_blink_renderer_platform_runtime_enabled_features_json5
1.466+6-6www/chromium/distinfo
1.6+3-3www/chromium/patches/patch-chrome_browser_ui_tabs_public_tab_features_h
1.97+3-3www/chromium/patches/patch-chrome_common_chrome_features_cc
1.93+2-2www/chromium/patches/patch-chrome_common_chrome_features_h
+79-7910 files not shown
+93-9516 files

OpenBSD/ports UPJRHeZnet/dbip Makefile.inc, net/dbip/asn distinfo

   Update dbip to 2026.04.
VersionDeltaFile
1.67+2-2net/dbip/asn/distinfo
1.69+2-2net/dbip/city/distinfo
1.69+2-2net/dbip/country/distinfo
1.72+1-1net/dbip/Makefile.inc
+7-74 files

OpenBSD/src Flxk00Gusr.sbin/smtpd to.c

   fix possible out of bound in text_to_netaddr

   diff from Renaud Allard (renaud at allard.it), thanks!
   ok deraadt
VersionDeltaFile
1.51+2-2usr.sbin/smtpd/to.c
+2-21 files

OpenBSD/src fTVh8obusr.sbin/smtpd unpack_dns.c

   fix possible out of bound access in dname_expand()

   spotted by Renaud Allard (thanks!), diff tweaked by me.

   ok deraadt@
VersionDeltaFile
1.4+6-5usr.sbin/smtpd/unpack_dns.c
+6-51 files

OpenBSD/ports wPVFEXueditors/vim-classic Makefile distinfo, editors/vim-classic/patches patch-src_configure_ac

   update vim-classic to newer checkout, use new vim-classic.org HOMEPAGE,
   update AUTOCONF_VERSION now that warnings are gone
VersionDeltaFile
1.9+9-5editors/vim-classic/Makefile
1.4+2-2editors/vim-classic/distinfo
1.3+1-1editors/vim-classic/patches/patch-src_configure_ac
+12-83 files