210,033 commits found in 41 milliseconds
put MODPHP_VERSION back
fix copy-and-pasto, noticed by Leo Unglaub
update to py3-webcolors-25.10.0
update to py3-tifffile-2026.2.16
update to py3-country-26.2.16
update to py3-wcwidth-0.6.0
update to py3-virtualenv-20.37.0
update to py3-werkzeug-3.1.5
OpenBSD /ports zMqYUNE — net/librenms distinfo Makefile, net/librenms/patches patch-LibreNMS___init___py patch-resources_definitions_config_definitions_json update to librenms-26.2.0
Allow rcctl reload for php-fpm (it uses a non-standard signal)
Mention that large opcache may delay shutdown in pkg-readme and suggest
"rcctl set phpXX_fpm timeout"
Following mails and slightly different diffs from Leo Unglaub
Allow rcctl reload for php-fpm (it uses a non-standard signal)
Mention that large opcache may delay shutdown in pkg-readme and suggest
"rcctl set phpXX_fpm timeout"
Following mails and slightly different diffs from Leo Unglaub
add a comment explaining why this is sticking at 10.0
(10.1 nags to move to unifi os, and removes backups)
update to uv-0.10.3, from Laurent Cheylus (maintainer)
update to maturin-1.12.2
update to py3-cloudpickle-3.1.2
Update to spidermonkey140-140.7.1.
Update to gemini-cli-0.28.2.
Update to ibus-typing-booster-2.30.4.
Update to openjph-0.26.3.
Set MODCMAKE_POLICY_VERSION_OVERRIDE.
OpenBSD /ports io7L54G — lang/verilator Makefile distinfo, lang/verilator/patches patch-test_regress_driver_py patch-bin_verilator Update to Verilator 5.044
Correctness from sthen@
ok sthen@
Fix up distinfo size mismatch in lang/ghc (sha256 was OK)
Noted by naddy@
OpenBSD /ports BTuGds6 — productivity/khal Makefile distinfo, productivity/khal/patches patch-khal_ui_calendarwidget_py patch-khal_ui_editor_py update to khal-0.13.0, ok jung@
drop jung as maintainer as he requested
update p5-Net-DNS-SEC to 1.27
OpenBSD /ports bmXcI8Y — security/polarssl Makefile distinfo, security/polarssl/patches patch-library_timing_c patch-CMakeLists_txt MFC: SECURITY update to mbedtls-2.28.10
Update to the last release in the now unsupported 2.28 LTS branch.
- Buffer overread in TLS stream cipher suites
https://mbed-tls.readthedocs.io/en/latest/security-advisories/mbedtls-security-advisory-2023-10-1/
- Timing side channel in private key RSA operations.
https://mbed-tls.readthedocs.io/en/latest/security-advisories/mbedtls-security-advisory-2024-01-1/
- Buffer overflow in mbedtls_x509_set_extension()
https://mbed-tls.readthedocs.io/en/latest/security-advisories/mbedtls-security-advisory-2024-01-2/
- Insecure handling of shared memory in PSA Crypto APIs
https://github.com/Mbed-TLS/mbedtls-docs/blob/main/security-advisories/mbedtls-security-advisory-2024-03.md
- CTR_DRBG prioritized over HMAC_DRBG as the PSA DRBG
https://mbed-tls.readthedocs.io/en/latest/security-advisories/mbedtls-security-advisory-2024-08-1/
- Potential authentication bypass in TLS handshake
https://mbed-tls.readthedocs.io/en/latest/security-advisories/mbedtls-security-advisory-2025-03-2/
- TLS clients may unwittingly skip server authentication
https://mbed-tls.readthedocs.io/en/latest/security-advisories/mbedtls-security-advisory-2025-03-1/
OpenBSD /ports MCjsnBJ — security/polarssl Makefile distinfo, security/polarssl/patches patch-library_timing_c patch-CMakeLists_txt SECURITY update to mbedtls-2.28.10
Update to the last release in the now unsupported 2.28 LTS branch.
- Buffer overread in TLS stream cipher suites
https://mbed-tls.readthedocs.io/en/latest/security-advisories/mbedtls-security-advisory-2023-10-1/
- Timing side channel in private key RSA operations.
https://mbed-tls.readthedocs.io/en/latest/security-advisories/mbedtls-security-advisory-2024-01-1/
- Buffer overflow in mbedtls_x509_set_extension()
https://mbed-tls.readthedocs.io/en/latest/security-advisories/mbedtls-security-advisory-2024-01-2/
- Insecure handling of shared memory in PSA Crypto APIs
https://github.com/Mbed-TLS/mbedtls-docs/blob/main/security-advisories/mbedtls-security-advisory-2024-03.md
- CTR_DRBG prioritized over HMAC_DRBG as the PSA DRBG
https://mbed-tls.readthedocs.io/en/latest/security-advisories/mbedtls-security-advisory-2024-08-1/
- Potential authentication bypass in TLS handshake
https://mbed-tls.readthedocs.io/en/latest/security-advisories/mbedtls-security-advisory-2025-03-2/
- TLS clients may unwittingly skip server authentication
https://mbed-tls.readthedocs.io/en/latest/security-advisories/mbedtls-security-advisory-2025-03-1/
update p5-Net-DNS-1.54
misc/llama.cpp: update to b8067
OK: volker@
OpenBSD /ports p5Yyi8h — devel/libggml Makefile distinfo, devel/libggml/patches patch-CMakeLists_txt patch-src_ggml-backend-reg_cpp devel/libggml: update to 0.9.7
OK: volker@
Update zpaqfranz to 64.5
From maintainer tux0r, thanks!