OpenBSD/ports ZfbPqZssecurity/keepassxc distinfo Makefile, security/keepassxc/pkg PLIST

   Update keepassxc to 2.7.12
VersionDeltaFile
1.38+2-2security/keepassxc/distinfo
1.67+1-1security/keepassxc/Makefile
1.29+1-0security/keepassxc/pkg/PLIST
+4-33 files

OpenBSD/ports vCR0kfqsysutils/exoscale-cli distinfo Makefile

   Update to exoscale-cli-1.94.0.
VersionDeltaFile
1.145+2-2sysutils/exoscale-cli/distinfo
1.148+1-1sysutils/exoscale-cli/Makefile
+3-32 files

OpenBSD/ports SgWSuUesecurity/pinentry Makefile, security/pinentry/patches patch-configure

   Respect PICFLAG to fix pinentry-qt5 build on sparc64 and friends

   The build system wrongfully assumes that -fpic is enough, thereby
   overriding our -fPIE defaults and resulting in relocation overflow.

   ok ajacoutot@ (co-maintainer)
VersionDeltaFile
1.3+21-21security/pinentry/patches/patch-configure
1.44+3-2security/pinentry/Makefile
+24-232 files

OpenBSD/ports Cpbqb8ymisc/hwdata distinfo Makefile

   Update to hwdata-0.406.
VersionDeltaFile
1.130+2-2misc/hwdata/distinfo
1.132+1-1misc/hwdata/Makefile
+3-32 files

OpenBSD/ports 8Rj0uMsgames/vkquake Makefile distinfo, games/vkquake/patches patch-Quake_common_make

   update to vkquake 1.34.1
VersionDeltaFile
1.21+5-2games/vkquake/Makefile
1.7+4-2games/vkquake/patches/patch-Quake_common_make
1.18+2-2games/vkquake/distinfo
+11-63 files

OpenBSD/src ZehpXhFusr.sbin/rpki-client cert.c

   rpki-client: stop aligning variables in cert_parse_extensions()

   While it looks a bit tidier if the variables are aligned with a tab in
   the declarations, this is also a source of churn, so give up on this in
   this function.
VersionDeltaFile
1.231+3-4usr.sbin/rpki-client/cert.c
+3-41 files

OpenBSD/src JENufHqusr.sbin/rpki-client cert.c

   rpki-client: const for ext and OID in cert_parse_extensions()

   This is the last step of sprinkling const for OpenSSL 4. Move the extension
   retrieved via X509_get_ext() to a const. The extension is first passed to
   the simple X509_EXTENSION_get_object() getter and in the extension parsers
   to X509V3_EXT_d2i(). The OID is passed to the const correct OBJ_obj2nid()
   and OBJ_obj2text().

   discussed with claudio
VersionDeltaFile
1.230+2-2usr.sbin/rpki-client/cert.c
+2-21 files

OpenBSD/src skkn81Yusr.sbin/rpki-client cert.c

   rpki-client: cast extension passed to X509_EXTENSION_get_object()

   Again this is currently a noop which is needed since this simple getter
   isn't const correct in OpenSSL < 4 and LibreSSL and because OpenSSL 4
   fixed this.

   discussed with claudio
VersionDeltaFile
1.229+3-2usr.sbin/rpki-client/cert.c
+3-21 files

OpenBSD/src R9gtbJbusr.sbin/rpki-client cert.c

   rpki-client: const correct cert extension handlers

   The only reason the extension passed in wasn't const was X509V3_EXT_d2i(),
   for which we now cast away const.

   discussed with claudio
VersionDeltaFile
1.228+11-11usr.sbin/rpki-client/cert.c
+11-111 files

OpenBSD/src d9Hcppvusr.sbin/rpki-client cert.c

   rpki-client: cast extension passed to X509V3_EXT_d2i()

   This function has never modified the extensions. It only uses the extension's
   object (OID) to retrieve the X509_EXT_METHOD and then calls the appropriate
   d2i handler on the extension's value. OpenSSL 4 correctly added a const
   qualifier to this function.

   The cast is a noop right now, but once we switch the extension handlers'
   signatures to take a const, this will generate a warning due to passing a
   const pointer to a non-const function for OpensSL < 4 and LibreSSL.
   Annotate the cast for our future selves.

   discussed with claudio
VersionDeltaFile
1.227+19-10usr.sbin/rpki-client/cert.c
+19-101 files

OpenBSD/src OCsCQAfusr.sbin/rpki-client cert.c

   rpki-client: rename certificate_policies() into cert_policies()

   This is slightly more consistent with the remainder of the file.
   All other extension handlers except those for ipAddrBlocks and
   autonomousSysIds, which start with sbgp_ for historical reasons,
   have a cert_ prefix.

   discussed with claudio
VersionDeltaFile
1.226+3-3usr.sbin/rpki-client/cert.c
+3-31 files

OpenBSD/ports alCAEBtgames/freeciv21 distinfo Makefile

   MFC: Update to freeciv21 3.1.1, contains a security fix. Release notes
   and more info:

   https://github.com/longturn/freeciv21/releases/tag/v3.1.1
   https://github.com/longturn/freeciv21/security/advisories/GHSA-f76g-6w3f-f6r3

   From the security advisory, fixes the following issue:

   "Freeciv21 crashes with a stack overflow when receiving specially-crafted
   packets. A remote attacker can use this to take down any public server. A
   malicious server can use this to crash the game on the player's machine.
   Authentication is not needed and, by default, logs do not contain any
   useful information."
VersionDeltaFile
1.3.2.1+2-2games/freeciv21/distinfo
1.4.2.1+1-2games/freeciv21/Makefile
+3-42 files

OpenBSD/src fqj3JWIusr.sbin/rpki-client cert.c

   rpki-client: cast away const for X509_get_X509_PUBKEY()

   In cert_check_spki() the pubkey is a libcrypto-internal pointer hanging
   off cert->x509, which is then passed to the very const-incorrect getter
   X509_PUBKEY_get0_param(): that's a piece of art which hands back pointers
   to things deeper down in the x509 - some of them const, some non-const.
   OpenSSL 3 made its X509_PUBKEY argument const, but their X509_ALGOR **
   still isn't. I don't believe they thought about this in #11894 as they
   had a more important _cmp() vs _eq() bikeshed to sort out.

   discussed with claudio
VersionDeltaFile
1.225+7-3usr.sbin/rpki-client/cert.c
+7-31 files

OpenBSD/ports wQuxcOJgames/freeciv21 distinfo Makefile

   Update to freeciv21, contains a security fix. Release notes and more
   info:

   https://github.com/longturn/freeciv21/releases/tag/v3.1.1
   https://github.com/longturn/freeciv21/security/advisories/GHSA-f76g-6w3f-f6r3

   From the security advisory, fixes the following issue:

   "Freeciv21 crashes with a stack overflow when receiving specially-crafted
   packets. A remote attacker can use this to take down any public server. A
   malicious server can use this to crash the game on the player's machine.
   Authentication is not needed and, by default, logs do not contain any
   useful information."
VersionDeltaFile
1.4+2-2games/freeciv21/distinfo
1.5+1-2games/freeciv21/Makefile
+3-42 files

OpenBSD/src w55PhNPusr.sbin/rpki-client print.c

   rpki-client: make the X509_NAME *xissuer const

   X509_get_issuer_name() isn't const correct in LibreSSL and OpenSSL < 4
   and it returns a modifiable X509_NAME *. The xissuer is only passed to
   X509_NAME_oneline() which takes a const X509_NAME, so it can be const.

   discussed with claudio
VersionDeltaFile
1.75+2-2usr.sbin/rpki-client/print.c
+2-21 files

OpenBSD/ports e0QIQmegames/fna Makefile.inc, games/fna/faudio distinfo Makefile

   Update to FNA 26.04. Release notes:

   https://github.com/FNA-XNA/FNA/releases/tag/26.04
   https://github.com/FNA-XNA/FNA3D/releases/tag/26.04
   https://github.com/FNA-XNA/FAudio/releases/tag/26.04
VersionDeltaFile
1.8+2-2games/fna/fna/distinfo
1.8+2-2games/fna/faudio/distinfo
1.8+2-2games/fna/fna3d/distinfo
1.7+1-1games/fna/faudio/Makefile
1.8+1-1games/fna/Makefile.inc
+8-85 files

OpenBSD/ports ofzTIuzgames/openjazz Makefile distinfo, games/openjazz/patches patch-CMakeLists_txt patch-src_io_network_cpp

   Update to latest version 20260301 and take maintainer. ok fcambus@
VersionDeltaFile
1.2+6-32games/openjazz/patches/patch-CMakeLists_txt
1.7+4-2games/openjazz/Makefile
1.3+2-2games/openjazz/distinfo
1.4+1-1games/openjazz/patches/patch-src_io_network_cpp
1.3+0-0games/openjazz/patches/patch-ext_psmplug_stdafx_h
+13-375 files

OpenBSD/src 8BtvI1Rusr.sbin/npppd/npppd parse.y

   Fix a memory leak in handling radius configuration.  Diff from iij.
VersionDeltaFile
1.33+2-2usr.sbin/npppd/npppd/parse.y
+2-21 files

OpenBSD/ports mgeOHrcsysutils/firmware/qwz distinfo Makefile

   sysutils/firmware/qwz: update to 20260309

   OK: kettenis@, phessler@
VersionDeltaFile
1.5+2-2sysutils/firmware/qwz/distinfo
1.5+1-1sysutils/firmware/qwz/Makefile
+3-32 files

OpenBSD/ports cowOuMgarchivers/xz distinfo Makefile

   archivers/xz: update to 5.8.3

   Includes a fix for
   CVE-2026-34743: Buffer overflow in lzma_index_append()
VersionDeltaFile
1.29+2-2archivers/xz/distinfo
1.57+2-2archivers/xz/Makefile
+4-42 files

OpenBSD/ports E5LKwPddevel/py-python-discovery distinfo Makefile

   Update py-python-discovery 1.1.2 -> 1.2.1
   Changelogs: https://github.com/tox-dev/python-discovery/releases
VersionDeltaFile
1.2+2-2devel/py-python-discovery/distinfo
1.2+2-1devel/py-python-discovery/Makefile
+4-32 files

OpenBSD/ports nGW20VTsysutils/ansible distinfo Makefile, sysutils/ansible/pkg PLIST

   Update ansible 13.4.0 -> 13.5.0
   Changelog: https://github.com/ansible-community/ansible-build-data/blob/13.5.0/13/CHANGELOG-v13.md#v13-5-0
VersionDeltaFile
1.104+596-3sysutils/ansible/pkg/PLIST
1.162+2-2sysutils/ansible/distinfo
1.219+1-1sysutils/ansible/Makefile
+599-63 files

OpenBSD/ports C6pEzQ2sysutils/ansible-core distinfo Makefile, sysutils/ansible-core/patches patch-pyproject_toml

   Update ansible-core -> 2.20.3 -> 2.20.4
   Changelog: https://github.com/ansible/ansible/blob/stable-2.20/changelogs/CHANGELOG-v2.20.rst#v2-20-4
VersionDeltaFile
1.23+6-0sysutils/ansible-core/pkg/PLIST
1.57+2-2sysutils/ansible-core/distinfo
1.7+2-2sysutils/ansible-core/patches/patch-pyproject_toml
1.64+1-1sysutils/ansible-core/Makefile
+11-54 files

OpenBSD/ports llBX5Codevel/py-identify distinfo Makefile

   Update py-identify 2.6.17 -> 2.6.18
VersionDeltaFile
1.27+2-2devel/py-identify/distinfo
1.30+1-1devel/py-identify/Makefile
+3-32 files

OpenBSD/ports lj7qnaHsecurity/p5-Crypt-LE Makefile, security/p5-Crypt-LE/patches patch-lib_Crypt_LE_pm

   p5-Crypt-OpenSSL-RSA no longer supports PKCS #1 v1.5 padding.
   p5-Crypt-LE has to replace it with PSS padding.
VersionDeltaFile
1.1+15-0security/p5-Crypt-LE/patches/patch-lib_Crypt_LE_pm
1.8+1-0security/p5-Crypt-LE/Makefile
+16-02 files

OpenBSD/src 7bqriJKusr.bin/newsyslog newsyslog.c

   Fix leap year detection.

   Found and initial diff from Alvar Penning, shorter diff from me (I
   guess it's a matter of taste).

   ok jca@, who would do it the same way.
VersionDeltaFile
1.120+3-3usr.bin/newsyslog/newsyslog.c
+3-31 files

OpenBSD/ports H37Yw7mdevel/p5-IO-Tty Makefile distinfo, devel/p5-IO-Tty/patches patch-Makefile_PL patch-Tty_xs

   update p5-IO-Tty to 1.25
   fixes tests of devel/p5-IPC-Run
   improve detection of openpty and strlcpy with gcc
   take maintainer
VersionDeltaFile
1.6+33-8devel/p5-IO-Tty/patches/patch-Makefile_PL
1.35+4-4devel/p5-IO-Tty/Makefile
1.15+2-2devel/p5-IO-Tty/distinfo
1.8+0-0devel/p5-IO-Tty/patches/patch-Tty_xs
+39-144 files

OpenBSD/src G568vBQlibexec/spamd spamd.c

   If a fd satisfies both POLLIN and POLLOUT in the same cycle, but the
   POLLIN resulted in a file close, the POLLOUT runs incorrectly which
   matters in the TLS context which attempts to read after free.
   from James J. Lippard
   ok millert
VersionDeltaFile
1.164+4-2libexec/spamd/spamd.c
+4-21 files

OpenBSD/ports LSuYmFsmail/rspamd Makefile distinfo, mail/rspamd/patches patch-CMakeLists_txt

   backout to rspamd 3.14.3 for now, I'm hitting some fairly heavy FD leak
   on the milter socket on my postfix+rspamd setup (noticed when it hit 4k
   FDs and bumped into limits) and not in a good position to attempt debug
   atm.
VersionDeltaFile
1.68+0-17mail/rspamd/pkg/PLIST
1.158+3-1mail/rspamd/Makefile
1.87+2-2mail/rspamd/distinfo
1.42+2-2mail/rspamd/patches/patch-CMakeLists_txt
+7-224 files

OpenBSD/src Kbl4sKGusr.bin/awk b.c

   Prevent integer overflow in regex repetition count

   Limit the repetition count to 255 like POSIX does.  Also avoid a
   crash when the repetition is the first atom parsed.

   From Renaud Allard.
VersionDeltaFile
1.56+7-1usr.bin/awk/b.c
+7-11 files