OpenBSD/ports Tv46a0tsysutils/diffoscope distinfo Makefile

   Update to diffoscope-317.
VersionDeltaFile
1.73+2-2sysutils/diffoscope/distinfo
1.89+1-1sysutils/diffoscope/Makefile
+3-32 files

OpenBSD/ports IVg4sWHtelephony/py-phonenumbers distinfo Makefile

   Update to py3-phonenumbers-9.0.28.
VersionDeltaFile
1.32+2-2telephony/py-phonenumbers/distinfo
1.44+1-1telephony/py-phonenumbers/Makefile
+3-32 files

OpenBSD/src FFcnP6Bshare/man/man4 pfsync.4

   Fix missing word, that rather changed the meaning, spotted by "schalken" on IRC.
VersionDeltaFile
1.41+3-3share/man/man4/pfsync.4
+3-31 files

OpenBSD/src KyN2LTelib/libtls tls_signer.c tls_ocsp.c

   libtls: consistently handle allocation failures

   Use tls_set_errorx() or tls_error_setx() rather than the versions without
   x for TLS_ERROR_OUT_OF_MEMORY. ENOMEM adds no further info.

   From Michael Forney

   ok bcook
VersionDeltaFile
1.15+4-4lib/libtls/tls_signer.c
1.29+2-2lib/libtls/tls_ocsp.c
+6-62 files

OpenBSD/src otMPdS1lib/libtls tls_config.c

   libtls: use TLS_ERROR_OUT_OF_MEMORY after malloc failure

   tls_config_load_file() hat a spot that used TLS_ERROR_UNKNOWN, so switch
   that to the usual error code. Use tls_error_setx() since strerror(ENOMEM)
   adds nothing.

   From Michael Forney

   ok bcook
VersionDeltaFile
1.73+2-2lib/libtls/tls_config.c
+2-21 files

OpenBSD/src EUZWKsZlib/libtls tls_keypair.c

   libtls: use tls_error_setx() after BIO_new_mem_buf()

   This is the only place where tls_error_set() was used. While the new length
   check now guarantees that the failure is due to ENOMEM, this info does not
   add value.

   From Michael Forney

   ok bcook
VersionDeltaFile
1.12+2-2lib/libtls/tls_keypair.c
+2-21 files

OpenBSD/src QBOAOc0lib/libtls tls_ocsp.c tls_server.c

   libtls: prefer x version of error setting

   If a check fails and errno is not necessarily set by the previous API call
   use tls_set_errorx() or tls_error_setx() since turning an unrelated errno
   into an error string is unhelpful.

   From Michael Forney

   ok bcook
VersionDeltaFile
1.28+5-5lib/libtls/tls_ocsp.c
1.53+5-5lib/libtls/tls_server.c
1.11+3-3lib/libtls/tls_keypair.c
1.105+2-2lib/libtls/tls.c
1.52+2-2lib/libtls/tls_client.c
+17-175 files

OpenBSD/src TetivHnsys/kern kern_sysctl.c

   Similar to sysctl KERN_SYSVIPC_SEMINFO, KERN_SYSVIPC_SHM_INFO also leaks
   the same kernel pointer that shminfo() leaks.
   ok dgl
VersionDeltaFile
1.490+2-1sys/kern/kern_sysctl.c
+2-11 files

OpenBSD/src kzZDrXHsys/kern kern_sysctl.c, usr.bin/ipcs ipcs.c

   sysctl KERN_SYSVIPC_SEM_INFO was leaking the sem_base kernel pointer to userland.

   This was used by ipcs(1), so change to use sem_ctime instead to decide if it
   should show the semaphore.

   Found independently by me and a report from Bruce Dang of Calif.io (minutes apart).
   ok deraadt
VersionDeltaFile
1.28+2-2usr.bin/ipcs/ipcs.c
1.489+2-1sys/kern/kern_sysctl.c
+4-32 files

OpenBSD/ports snKiFkCsysutils/consul-template distinfo modules.inc

   Update to consul-template-0.42.0.
VersionDeltaFile
1.50+120-118sysutils/consul-template/distinfo
1.25+45-44sysutils/consul-template/modules.inc
1.65+1-1sysutils/consul-template/Makefile
+166-1633 files

OpenBSD/ports RarWqwYsecurity/libgcrypt Makefile distinfo, security/libgcrypt/patches patch-config_h_in

   Update to libgcrypt-1.12.2.
VersionDeltaFile
1.102+3-3security/libgcrypt/Makefile
1.51+2-2security/libgcrypt/distinfo
1.5+1-1security/libgcrypt/patches/patch-config_h_in
+6-63 files

OpenBSD/ports UOkOKMjprint/py-pypdf distinfo Makefile

   Update to py3-pypdf-6.10.1.
VersionDeltaFile
1.64+2-2print/py-pypdf/distinfo
1.70+1-1print/py-pypdf/Makefile
+3-32 files

OpenBSD/src plggQbhlib/libtls tls_signer.c tls_keypair.c

   libtls: add missing length checks before BIO_new_mem_buf()

   Like all proper libcrypto APIs, BIO_new_mem_buf() takes an int as a length
   argument. Check the size_t passed in to be at most INT_MAX to avoid issues
   with truncation and overflow like it's done everywhere else. After release
   this should probably be clamped down further since legitimate files (certs
   and keys) are nowhere near this large.

   Prompted by a diff by Michael Forney

   ok jsing
VersionDeltaFile
1.14+11-1lib/libtls/tls_signer.c
1.10+6-1lib/libtls/tls_keypair.c
+17-22 files

OpenBSD/src UTM01t4sys/kern sysv_shm.c

   shmctl IPC_STAT was leaking the shm_internal kernel malloc pointer into userland
   The manual page calls this "sysv stupidity", .h calls it 'implementation
   specific data". It is surprising we didn't fix this before.
   Found by tsg@, ok millert
VersionDeltaFile
1.82+9-7sys/kern/sysv_shm.c
+9-71 files

OpenBSD/ports 0ulO9Csnet/czds distinfo Makefile

   Update czds to 1.4.0.
VersionDeltaFile
1.4+2-2net/czds/distinfo
1.4+1-1net/czds/Makefile
+3-32 files

OpenBSD/ports pqIkG9bconverters/bdf2psf Makefile distinfo

   Update bdf2psf to 1.247.
VersionDeltaFile
1.52+2-2converters/bdf2psf/Makefile
1.47+2-2converters/bdf2psf/distinfo
+4-42 files

OpenBSD/ports VWOT2fnsysutils/firmware Makefile

   +riscv64-spacemit-dtb
VersionDeltaFile
1.31+1-0sysutils/firmware/Makefile
+1-01 files

OpenBSD/ports TivJ8Z6sysutils/firmware/riscv64-spacemit-dtb Makefile distinfo, sysutils/firmware/riscv64-spacemit-dtb/patches patch-src_riscv_spacemit_k1-milkv-jupiter_dts patch-src_riscv_spacemit_k1-orangepi-rv2_dts

   Import firmware that provides dtbs for SpacemiT riscv64 SoCs

   ok sthen@
VersionDeltaFile
1.1+273-0sysutils/firmware/riscv64-spacemit-dtb/patches/patch-src_riscv_spacemit_k1-milkv-jupiter_dts
1.1+244-0sysutils/firmware/riscv64-spacemit-dtb/patches/patch-src_riscv_spacemit_k1-orangepi-rv2_dts
1.1+144-0sysutils/firmware/riscv64-spacemit-dtb/patches/patch-src_riscv_spacemit_k1-bananapi-f3_dts
1.1+36-0sysutils/firmware/riscv64-spacemit-dtb/Makefile
1.1+5-0sysutils/firmware/riscv64-spacemit-dtb/pkg/PLIST
1.1+2-0sysutils/firmware/riscv64-spacemit-dtb/distinfo
+704-08 files not shown
+705-014 files

OpenBSD/src RGzRbxBsys/arch/riscv64/dev smtcomphy.c

   Calibrate the PHY if the firmware didn't do so already.

   ok jsing@ (who came up with a very similar diff)
VersionDeltaFile
1.3+35-3sys/arch/riscv64/dev/smtcomphy.c
+35-31 files

OpenBSD/ports 2wPRboVsysutils/node_exporter distinfo Makefile

   Update to node_exporter-1.11.1
VersionDeltaFile
1.18+2-2sysutils/node_exporter/distinfo
1.28+1-1sysutils/node_exporter/Makefile
+3-32 files

OpenBSD/src geMWFxMsys/arch/riscv64/riscv64 pmap.c

   The riscv64 pmap implementation copies the kernel l1 page table entries
   into all other pmaps to allow access to KVA when running in kernel mode.
   Unfortunately when pmap_growkernel() creates new kernel l1 page table
   entries, existing pmaps are not updated.  This causes unexpected kernel
   page faults when KVAs that depend on those new kernel l1 page table
   entries are used.  Fix this by fully populating the kernel l1 page tables
   in pmap_bootstrap().

   ok mlarkin@, jca@
VersionDeltaFile
1.49+13-10sys/arch/riscv64/riscv64/pmap.c
+13-101 files

OpenBSD/ports tbMPc3Jwww/minify distinfo Makefile

   Update to minify-2.24.12

   From Igor Zornik (maintainer)
VersionDeltaFile
1.4+2-2www/minify/distinfo
1.4+1-1www/minify/Makefile
+3-32 files

OpenBSD/src vWnz7Clregress/lib/libtls/keypair keypairtest.c

   keypairtest: zero out tls_error before running tests

   Otherwise tls_error_clear() (called e.g. via tls_error_vset()) will
   free the bad error->msg pointer.

   From Michael Forney
VersionDeltaFile
1.8+2-2regress/lib/libtls/keypair/keypairtest.c
+2-21 files

OpenBSD/src utmGg9zsys/kern kern_sysctl.c

   sysctl skips processes with pr->ps_pgrp == NULL.  comment said this
   was dying processes.  actually it is also brand new processes now.
VersionDeltaFile
1.488+2-2sys/kern/kern_sysctl.c
+2-21 files

OpenBSD/src obB9sbDsys/kern kern_fork.c

   During early stages of fork in process_new(), since the ps_pgrp field is
   in the process copy region the child gets this pointer.  Before fork1()
   completes the process creation, it is possible for other processes to change
   the pgrp in an attacker controlled way, such that the pointer becomes stagnant.
   A very complicated AI-generated attack chaining many methods (which a experienced
   human could generate given sufficent time) suceeds at racing this stagnant pgrp
   object in the pool cache and can do things it should not.
   We need to start the children without a pgrp (ie. NULL), and update the
   pgrp pointer late.
   from deraadt@; Found by Nicholas Carlini at Anthropic

   this is errata/7.7/037_pgrp.patch.sig
VersionDeltaFile
1.269.4.1+3-1sys/kern/kern_fork.c
+3-11 files

OpenBSD/src F5EyyRHsys/kern kern_fork.c

   During early stages of fork in process_new(), since the ps_pgrp field is
   in the process copy region the child gets this pointer.  Before fork1()
   completes the process creation, it is possible for other processes to change
   the pgrp in an attacker controlled way, such that the pointer becomes stagnant.
   A very complicated AI-generated attack chaining many methods (which a experienced
   human could generate given sufficent time) suceeds at racing this stagnant pgrp
   object in the pool cache and can do things it should not.
   We need to start the children without a pgrp (ie. NULL), and update the
   pgrp pointer late.
   from deraadt@; Found by Nicholas Carlini at Anthropic

   this is errata/7.8/031_pgrp.patch.sig
VersionDeltaFile
1.278.2.1+3-1sys/kern/kern_fork.c
+3-11 files

OpenBSD/src p8OiI4rsys/kern kern_fork.c

   During early stages of fork in process_new(), since the ps_pgrp field is
   in the process copy region the child gets this pointer.  Before fork1()
   completes the process creation, it is possible for other processes to change
   the pgrp in an attacker controlled way, such that the pointer becomes stagnant.
   A very complicated AI-generated attack chaining many methods (which a experienced
   human could generate given sufficent time) suceeds at racing this stagnant pgrp
   object in the pool cache and can do things it should not.
   We need to start the children without a pgrp (ie. NULL), and update the
   pgrp pointer late.
   Found by Nicholas Carlini at Anthropic
   this is security errata 7.7/037_pgrp.patch.sig and 7.8/031_pgrp.patch.sig
VersionDeltaFile
1.279+3-1sys/kern/kern_fork.c
+3-11 files

OpenBSD/ports putfzq3editors/neovim distinfo Makefile

   editors/neovim: update to bugfix release v0.12.1.

   Diff from Laurent Cheylus. Additional testing from Laurence Tratt and tb@.

   OK tb@, thanks!
VersionDeltaFile
1.40+2-2editors/neovim/distinfo
1.66+1-1editors/neovim/Makefile
+3-32 files

OpenBSD/ports ML9gg3Gdevel/sdl3-image distinfo Makefile

   Update to 3.4.2, a stable bugfix release. Includes:
   * Fixed potential buffer overflow in tRNS handling
   * Fixed out of bounds read in XCF image loader (CVE-2026-35444)
VersionDeltaFile
1.2+2-2devel/sdl3-image/distinfo
1.2+1-1devel/sdl3-image/Makefile
+3-32 files

OpenBSD/ports 1Z2CNTOdevel/sdl2-image distinfo Makefile

   MFC: Update to stable bugfix release 2.8.10. Includes:
   Fixed out of bounds read in XCF image loader (CVE-2026-35444)
VersionDeltaFile
1.11.2.1+2-2devel/sdl2-image/distinfo
1.25.2.1+1-1devel/sdl2-image/Makefile
+3-32 files