aboutsummaryrefslogtreecommitdiff
path: root/security
Commit message (Collapse)AuthorAgeFilesLines
* security/intel-ipsec-mb: Update to 1.1Daniel Engberg2022-01-053-11/+36
| | | | | | | | | | | | Changelog: https://github.com/intel/intel-ipsec-mb/releases/tag/v1.1 Backport upstream commit 3a1c8c1c2c24a9d6cb56439c6aa6bea4d4fb1093 to fix compilation Set MAKE_JOBS_UNSAFE to avoid OOM issues Set rpath to avoid requirement of installing port to run test(s) PR: 260961 Reviewed by: Martin Filla <freebsd@sysctl.cz> (maintainer)
* security/boringssl: take maintainershipSergey A. Osokin2022-01-051-1/+1
|
* security/vuxml: document routinator vulnerabilitiesFernando Apesteguía2022-01-051-0/+36
|
* security/vuxml: document www/chromium < 97.0.4692.71Rene Ladan2022-01-053-1/+108
| | | | | | | | While here add definitions for 2022, as this is the first vuxml commit of the year. This cannot be done in its own commit because `make validate` complains in that case (even with a 0-byte vuln-2022.xml). Obtained from: https://chromereleases.googleblog.com/2022/01/stable-channel-update-for-desktop.html
* security/boringssl: update CONFLICTSSergey A. Osokin2022-01-051-1/+7
| | | | Suggested by: ashish
* security/boringssl: remove backup filesSergey A. Osokin2022-01-052-4/+2
|
* security/boringssl: update pkg-plist, bump PORTREVISIONSergey A. Osokin2022-01-052-4/+11
|
* security/authenticator: unbreak build with Meson 0.61.0Jan Beich2022-01-042-0/+3
| | | | | | | | data/meson.build:34:0: ERROR: Function does not take positional arguments. data/meson.build:61:0: ERROR: Function does not take positional arguments. PR: 260943 Regressed by: https://github.com/mesonbuild/meson/commit/61f2866a9fa1
* security/boringssl: update to the recent commit.Sergey A. Osokin2022-01-044-7/+65
| | | | Based on patches submitted by: Ashish SHUKLA <ashish@FreeBSD.org>
* KDE: Update KDE Plasma Desktop to 5.23.5Tobias C. Berner2022-01-043-9/+9
| | | | | | | | | | | | | | | | | | | | | KDE Plasma 5.23.5, Bugfix Release for January Tuesday, 4 January 2022. Today KDE releases a bugfix update to KDE Plasma 5, versioned 5.23.5. Plasma 5.23 was released in October 2021 with many feature refinements and new modules to complete the desktop experience. This release adds a month's worth of new translations and fixes from KDE's contributors. The bugfixes are typically small but important and include: * Save bluetooth status on teardown. * System Monitor: Handle process parent changes in ProcessDataModel. * Fix Klipper Actions content truncation. Full changelog: https://kde.org/announcements/changelogs/plasma/5/5.23.4-5.23.5
* security/bastillion: update to 3.12.02Alexander Leidinger2022-01-044-86/+81
| | | | | Release notes at https://github.com/bastillion-io/Bastillion/releases/tag/v3.12.02
* security/wpa_supplicant-devel: Update to latest GH commitCy Schubert2022-01-042-6/+5
| | | | Update to the latest w1.fi commit, proxied through my GH account.
* security/krb5-devel: update to the latest MIT/KRB5 github commitCy Schubert2022-01-042-5/+5
|
* security/py-scrypt: Update 0.8.18 -> 0.8.19Yuri Victorovich2022-01-032-4/+4
| | | | Reported by: portscout
* security/fizz: Update 2021.12.27.00 -> 2022.01.03.00Yuri Victorovich2022-01-032-4/+4
|
* security/libpwquality: Add CPE informationBernhard Froehlich2022-01-031-1/+2
| | | | Approved by: portmgr (blanket)
* security/openssl-quictls: Update to 3.0.1Bernard Spil2022-01-032-5/+5
|
* security/py-oauthlib: Use newer version of pyjwtDanilo G. Baio2022-01-021-3/+3
| | | | | | It is needed to avoid conflicts when using azure-cli ports. Approved by: portmgr (blanket)
* */*: Bump PORTREVISION on *-sbcl ports after lang/sbcl upgrade.Kirill Ponomarev2022-01-021-1/+1
|
* security/py-azure-keyvault-keys: Update to 4.5.0b4Danilo G. Baio2022-01-012-5/+5
| | | | | PR: 259978 Approved by: maintainer timeout
* security/stunnel: Update MASTER_SITES and do minor tweakingDaniel Engberg2022-01-012-16/+5
| | | | | | | | | | Rework MASTER_SITES, remove old/dead/unofficial mirrors and use upstream's primary site as fallback Replace PORTVERSION with DISTVERSION Replace @unexec with @preunexec PR: 260855 Approved by: zi (maintainer), mentors (implicit)
* security/stunnel: Update to 5.61Ryan Steinmetz2022-01-012-4/+4
|
* cleanup: Remove expired ports:Rene Ladan2021-12-3114-323/+0
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | 2021-10-31 devel/sdl_sge: Upstream no longer maintained 2021-12-31 net/appkonference: Outdated, depends on unsupported version of net/asterisk 2021-12-31 dns/bind911: End of life, please migrate to a newer version of BIND9 2021-12-31 net/zebra: Abandoned upstream, last release in 2005. Consider migrating to net/frr7 or net/bird2 2021-12-31 audio/osalp: Abandoned upstream, listed as beta and no new release since 2008 2021-12-31 games/stransball2: Depends on expired devel/sdl_sge 2021-12-31 devel/rubygem-ruby-sdl-ffi: Depends on expired devel/sdl_sge 2021-12-31 devel/rubygem-rubygame: Depends on expired devel/sdl_sge 2021-12-31 devel/ruby-sdl: Depends on expired devel/sdl_sge 2021-12-31 games/magicmaze: Depends on expired devel/sdl_sge 2021-12-31 games/trophy: Depends on expired devel/clanlib1 2021-12-31 devel/clanlib1: Older than expired and removed devel/clanlib 2021-12-31 www/py-django31: Upgrade to Django 3.2+. Mainstream support ended (April 6, 2021). Extended support ends December 2021. See https://www.djangoproject.com/download/ 2021-12-31 www/py-dj31-django-prometheus: Extended support of Django 3.1 ends December 2021, upgrade to the Django 3.2+ version of this port. See https://www.djangoproject.com/download/ 2021-12-31 databases/postgis24: Deprecated in favour of databases/postgis3x 2021-12-31 net-im/ekiga: Last release in 2013, not actively maintained 2021-12-31 sysutils/sample: abandoned upstream, incompatible with newer kernels 2021-12-31 www/mediawiki131: Upstream EOL 2021-12-31 www/py-dj31-django-mptt: Extended support of Django 3.1 ends December 2021, upgrade to the Django 3.2+ version of this port. See https://www.djangoproject.com/download/ 2021-12-31 net/py-flask-xml-rpc: No longer maintained upstream 2021-12-31 audio/libaacplus: Abandoned upstream, no new release since 2011 2021-12-31 security/obfsclient: https://github.com/Yawning/obfsclient/issues/37 2021-12-31 devel/eric6: Uses EOL Python 2.7 via www/py-qt5-webengine 2021-12-31 www/grafana: No longer maintained upstream, use www/grafana8 2021-12-31 www/py-dj31-django-auth-ldap: Extended support of Django 3.1 ends December 2021, upgrade to the Django 3.2+ version of this port. See https://www.djangoproject.com/download/ 2021-12-31 www/py-dj31-django-filter: Extended support of Django 3.1 ends December 2021, upgrade to the Django 3.2+ version of this port. See https://www.djangoproject.com/download/ 2021-12-31 www/py-dj31-drf-yasg: Extended support of Django 3.1 ends December 2021, upgrade to the Django 3.2+ version of this port. See https://www.djangoproject.com/download/ 2021-12-31 www/py-dj31-django-js-asset: Extended support of Django 3.1 ends December 2021, upgrade to the Django 3.2+ version of this port. See https://www.djangoproject.com/download/ 2021-12-31 www/py-dj31-django-timezone-field: Extended support of Django 3.1 ends December 2021, upgrade to the Django 3.2+ version of this port. See https://www.djangoproject.com/download/ 2021-12-31 www/py-dj31-django-tables2: Extended support of Django 3.1 ends December 2021, upgrade to the Django 3.2+ version of this port. See https://www.djangoproject.com/download/ 2021-12-31 www/py-dj31-django-taggit: Extended support of Django 3.1 ends December 2021, upgrade to the Django 3.2+ version of this port. See https://www.djangoproject.com/download/ 2021-12-31 graphics/librasterlite: Deprecated in favour of graphics/librasterlite2 2021-12-31 www/py-dj31-django-cacheops: Extended support of Django 3.1 ends December 2021, upgrade to the Django 3.2+ version of this port. See https://www.djangoproject.com/download/ 2021-12-31 net-mgmt/p0f2: newer version available in net-mgmt/p0f 2021-12-31 devel/libhash: Abandoned upstream 2021-12-31 www/py-dj31-django-debug-toolbar: Extended support of Django 3.1 ends December 2021, upgrade to the Django 3.2+ version of this port. See https://www.djangoproject.com/download/ 2021-12-31 www/py-dj31-django-cors-headers: Extended support of Django 3.1 ends December 2021, upgrade to the Django 3.2+ version of this port. See https://www.djangoproject.com/download/ 2021-12-31 audio/flake: Abandoned upstream, no new release since 2007 2021-12-31 audio/ifp-line: Abandoned upstream, no new release since 2005 2021-12-31 audio/libnjb: Abandoned upstream, no new release since 2011 2021-12-31 audio/lpac: Abandoned upstream in 2003 2021-12-31 multimedia/mmsclient: Abandoned upstream, Microsoft deprecated MMS in 2003 2021-12-31 www/plugger: Uses incompatible plugin interface NPAPI 2021-12-31 audio/mpiosh: Abandoned upstream, no new release since 2004 2021-12-31 audio/rplay: Abandoned upstream, no new releases since 1999 2021-12-31 audio/celt: Deprecated and considered obsolete by upstream in 2016 in favour of (lib)opus 2021-12-31 security/nacl: Unmaintained by upstream, use libsodium instead 2021-12-31 net-mgmt/unifi-poller: Now called unpoller by upstream 2021-12-31 lang/nml: Abandoned upstream, last release 2004-04-19 2021-12-31 audio/mp32ogg: Abandoned upstream and unfetchable from upstream 2021-12-31 net/libstorj: Deprecated in favour of net/storj due to v3 rearchitecture 2021-12-31 devel/yasm-devel: No need to keep the -devel version due to upstream inactivity 2021-12-31 www/py-dj31-django-redis: Extended support of Django 3.1 ends December 2021, upgrade to the Django 3.2+ version of this port. See https://www.djangoproject.com/download/ 2021-12-31 devel/py-dj31-django-rq: Extended support of Django 3.1 ends December 2021, upgrade to the Django 3.2+ version of this port. See https://www.djangoproject.com/download/ 2021-12-31 graphics/libreatlas: Abandoned upstream, no new release since 2012 2021-12-31 www/py-dj31-djangorestframework: Extended support of Django 3.1 ends December 2021, upgrade to the Django 3.2+ version of this port. See https://www.djangoproject.com/download/
* security/vuxml: Document Roundcube vulnerabilityBernard Spil2021-12-311-0/+26
|
* security/vuxml: Document Mbed TLS advisory 2021-12Tijl Coosemans2021-12-301-0/+35
| | | | Security: https://tls.mbed.org/tech-updates/security-advisories/mbedtls-security-advisory-2021-12
* security/mbedtls: Update to 2.16.12Tijl Coosemans2021-12-303-4/+5
| | | | Security: https://tls.mbed.org/tech-updates/security-advisories/mbedtls-security-advisory-2021-12
* security/libtasn1: remove clang workaroundRoman Bogorodskiy2021-12-301-9/+2
| | | | | | | | | The previously applied clang 10+ workaround which lowered -O optimization to -O1 appears to be no longer needed according to the upstream issue https://gitlab.com/gnutls/libtasn1/-/issues/30. PR: 252548 Reported by: Brad Smith
* security/vuxml: OpenDMARC 1.4.1 vulnerabilityDan Mahoney2021-12-301-0/+25
| | | | PR: 260594
* security/vuxml: OpenDMARC 1.3.2 vulnerabilitiesDan Mahoney2021-12-301-0/+47
| | | | PR: 240505
* security/wolfssl: Update to v5.1.0Santhosh Raju2021-12-303-5/+8
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Changes since v5.0.0: wolfSSL Release 5.1.0 (Dec 27, 2021) Release 5.1.0 of wolfSSL embedded TLS has bug fixes and new features including: Vulnerabilities * [Low] Potential for DoS attack on a wolfSSL client due to processing hello packets of the incorrect side. This affects only connections using TLS v1.2 or less that have also been compromised by a man in the middle attack. Thanks to James Henderson, Mathy Vanhoef, Chris M. Stone, Sam L. Thomas, Nicolas Bailleut, and Tom Chothia (University of Birmingham, KU Leuven, ENS Rennes for the report. * [Low] Client side session resumption issue once the session resumption cache has been filled up. The hijacking of a session resumption has been demonstrated so far with only non verified peer connections. That is where the client is not verifying the server’s CA that it is connecting to. There is the potential though for other cases involving proxies that are verifying the server to be at risk, if using wolfSSL in a case involving proxies use wolfSSL_get1_session and then wolfSSL_SESSION_free when done where possible. If not adding in the session get/free function calls we recommend that users of wolfSSL that are resuming sessions update to the latest version (wolfSSL version 5.1.0 or later). Thanks to the UK's National Cyber Security Centre (NCSC) for the report. New Feature Additions Ports * Curve25519 support with NXP SE050 added * Renesas RA6M4 support with SCE Protected Mode and FSP 3.5.0 * Renesas TSIP 1.14 support for RX65N/RX72N Post Quantum * Post quantum resistant algorithms used with Apache port * NIST round 3 FALCON Signature Scheme support added to TLS 1.3 connections * FALCON added to the benchmarking application * Testing of cURL with wolfSSL post quantum resistant build Compatibility Layer Additions * Updated NGINX port to NGINX version 1.21.4 * Updated Apache port to Apache version 2.4.51 * Add support for SSL_OP_NO_TLSv1_2 flag with wolfSSL_CTX_set_options function * Support added for the functions - SSL_CTX_get_max_early_data - SSL_CTX_set_max_early_data - SSL_set_max_early_data - SSL_get_max_early_data - SSL_CTX_clear_mode - SSL_CONF_cmd_value_type - SSL_read_early_data - SSL_write_early_data Misc. * Crypto callback support for AES-CCM added. A callback function can be registered and used instead of the default AES-CCM implementation in wolfSSL. * Added AES-OFB to the FIPS boundary for future FIPS validations. * Add support for custom OIDs used with CSR (certificate signing request) generation using the macro WOLFSSL_CUSTOM_OID * Added HKDF extract callback function for use with TLS 1.3 * Add variant from RFC6979 of deterministic ECC signing that can be enabled using the macro WOLFSSL_ECDSA_DETERMINISTIC_K_VARIANT * Added the function wc_GetPubKeyDerFromCert to get the public key from a DecodedCert structure * Added the functions wc_InitDecodedCert, wc_ParseCert and wc_FreeDecodedCert for access to decoding a certificate into a DecodedCert structure * Added the macro WOLFSSL_ECC_NO_SMALL_STACK for hybrid builds where the numerous malloc/free with ECC is undesired but small stack use is desired throughout the rest of the library * Added the function wc_d2i_PKCS12_fp for reading a PKCS12 file and parsing it Fixes PORT Fixes * Building with Android wpa_supplicant and KeyStore * Setting initial value of CA certificate with TSIP enabled * Cryptocell ECC build fix and fix with RSA disabled * IoT-SAFE improvement for Key/File slot ID size, fix for C++ compile, and fixes for retrieving the public key after key generation Math Library Fixes * Check return values on TFM library montgomery function in case the system runs out of memory. This resolves an edge case of invalid ECC signatures being created. * SP math library sanity check on size of values passed to sp_gcd. * SP math library sanity check on exponentiation by 0 with mod_exp * Update base ECC mp_sqrtmod_prime function to handle an edge case of zero * TFM math library with Intel MULX multiply fix for carry in assembly code Misc. * Fix for potential heap buffer overflow with compatibility layer PEM parsing * Fix for edge memory leak case with an error encountered during TLS resumption * Fix for length on inner sequence created with wc_DhKeyToDer when handling small DH keys * Fix for sanity check on input argument to DSA sign and verify * Fix for setting of the return value with ASN1 integer get on an i386 device * Fix for BER to DER size checks with PKCS7 decryption * Fix for memory leak with PrintPubKeyEC function in compatibility layer * Edge case with deterministic ECC key generation when the private key has leading 0’s * Fix for build with OPENSSL_EXTRA and NO_WOLFSSL_STUB both defined * Use page aligned memory with ECDSA signing and KCAPI * Skip expired sessions for TLS 1.3 rather than turning off the resume behavior * Fix for DTLS handling dropped or retransmitted messages Improvements/Optimizations Build Options and Warnings * Bugfix: could not build with liboqs and without DH enabled * Build with macro NO_ECC_KEY_EXPORT fixed * Fix for building with the macro HAVE_ENCRYPT_THEN_MAC when session export is enabled * Building with wolfSentry and HAVE_EX_DATA macro set Math Libraries * Improvement for performance with SP C implementation of montgomery reduction for ECC (P256 and P384) and SP ARM64 implementation for ECC (P384) * With SP math handle case of dividing by length of dividend * SP math improvement for lo/hi register names to be used with older GCC compilers Misc. * ASN name constraints checking code refactor for better efficiency and readability * Refactor of compatibility layer stack free’ing calls to simplify and reduce code * Scrubbed code for trailing spaces, hard tabs, and any control characters * Explicit check that leaf certificate's public key type match cipher suite signature algorithm * Additional NULL sanity checks on WOLFSSL struct internally and improve switch statement fallthrough * Retain OCSP error value when CRL is enabled with certificate parsing * Update to NATIVE LwIP support for TCP use * Sanity check on PEM size when parsing a PEM with OpenSSL compatibility layer API. * SWIG wrapper was removed from the codebase in favor of dedicated Java and Python wrappers. * Updates to bundled example client for when to load the CA, handling print out of IP alt names, and printing out the peers certificate in PEM format * Handling BER encoded inner content type with PKCS7 verify * Checking for SOCKET_EPIPE errors from low level socket * Improvements to cleanup in the case that wolfSSL_Init fails * Update test and example certificates expiration dates
* security/vuxml: document minio issueSteve Wills2021-12-291-0/+28
|
* security/apg: update 0.3.2 to 0.4.0Vinícius Zavam2021-12-292-4/+10
| | | | | * https://github.com/wneessen/apg-go/releases/tag/v0.4.0 * https://github.com/wneessen/apg-go/compare/v0.3.2...v0.4.0
* Add php81 to the treeMuhammad Moinur Rahman2021-12-294-0/+24
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Core: Fixed inclusion order for phpize builds on Windows. Added missing hashtable insertion APIs for arr/obj/ref. Implemented FR #77372 (Relative file path is removed from uploaded file). Fixed bug #81607 (CE_CACHE allocation with concurrent access). Fixed bug #81507 (Fiber does not compile on AIX). Fixed bug #78647 (SEGFAULT in zend_do_perform_implementation_check). Fixed bug #81518 (Header injection via default_mimetype / default_charset). Fixed bug #75941 (Fix compile failure on Solaris with clang). Fixed bug #81380 (Observer may not be initialized properly). Fixed bug #81514 (Using Enum as key in WeakMap triggers GC + SegFault). Fixed bug #81520 (TEST_PHP_CGI_EXECUTABLE badly set in run-tests.php). Fixed bug #81377 (unset() of $GLOBALS sub-key yields warning). Fixed bug #81342 (New ampersand token parsing depends on new line after it). Fixed bug #81280 (Unicode characters in cli.prompt causes segfault). Fixed bug #81192 ("Declaration should be compatible with" gives incorrect line number with traits). Fixed bug #78919 (CLI server: insufficient cleanup if request startup fails). Fixed bug #81303 (match error message improvements). Fixed bug #81238 (Fiber support missing for Solaris Sparc). Fixed bug #81237 (Comparison of fake closures doesn't work). Fixed bug #81202 (powerpc64 build fails on fibers). Fixed bug #80072 (Cyclic unserialize in TMPVAR operand may leak). Fixed bug #81163 (__sleep allowed to return non-array). Fixed bug #75474 (function scope static variables are not bound to a unique function). Fixed bug #53826 (__callStatic fired in base class through a parent call if the method is private). Fixed bug #81076 (incorrect debug info on Closures with implicit binds). CLI: Fixed bug #81496 (Server logs incorrect request method). COM: Dispatch using LANG_NEUTRAL instead of LOCALE_SYSTEM_DEFAULT. Curl: Fixed bug #81085 (Support CURLOPT_SSLCERT_BLOB for cert strings). Date: Fixed bug #81458 (Regression Incorrect difference after timezone change). Fixed bug #81500 (Interval serialization regression since 7.3.14 / 7.4.2). Fixed bug #81504 (Incorrect timezone transition details for POSIX data). Fixed bug #80998 (Missing second with inverted interval). Speed up finding timezone offset information. Fixed bug #79580 (date_create_from_format misses leap year). Fixed bug #80963 (DateTimeZone::getTransitions() truncated). Fixed bug #80974 (Wrong diff between 2 dates in different timezones). Fixed bug #80998 (Missing second with inverted interval). Fixed bug #81097 (DateTimeZone silently falls back to UTC when providing an offset with seconds). Fixed bug #81106 (Regression in 8.1: add() now truncate ->f). Fixed bug #81273 (Date interval calculation not correct). Fixed bug #52480 (Incorrect difference using DateInterval). Fixed bug #62326 (date_diff() function returns false result). Fixed bug #64992 (dst not handled past 2038). Fixed bug #65003 (Wrong date diff). Fixed bug #66545 (DateTime. diff returns negative values). Fixed bug #68503 (date_diff on two dates with timezone set localised returns wrong results). Fixed bug #69806 (Incorrect date from timestamp). Fixed bug #71700 (Extra day on diff between begin and end of march 2016). Fixed bug #71826 (DateTime::diff confuse on timezone 'Asia/Tokyo'). Fixed bug #73460 (Datetime add not realising it already applied DST change). Fixed bug #74173 (DateTimeImmutable::getTimestamp() triggers DST switch in incorrect time). Fixed bug #74274 (Handling DST transitions correctly). Fixed bug #74524 (Date diff is bad calculated, in same time zone). Fixed bug #75167 (DateTime::add does only care about backward DST transition, not forward). Fixed bug #76032 (DateTime->diff having issues with leap days for timezones ahead of UTC). Fixed bug #76374 (Date difference varies according day time). Fixed bug #77571 (DateTime's diff DateInterval incorrect in timezones from UTC+01:00 to UTC+12:00). Fixed bug #78452 (diff makes wrong in hour for Asia/Tehran). Fixed bug #79452 (DateTime::diff() generates months differently between time zones). Fixed bug #79698 (timelib mishandles future timestamps (triggered by 'zic -b slim')). Fixed bug #79716 (Invalid date time created (with day "00")). Fixed bug #80610 (DateTime calculate wrong with DateInterval). Fixed bug #80664 (DateTime objects behave incorrectly around DST transition). Fixed bug #80913 (DateTime(Immutable)::sub around DST yield incorrect time). DBA: Fixed bug #81588 (TokyoCabinet driver leaks memory). DOM: Fixed bug #81433 (DOMElement::setIdAttribute() called twice may remove ID). FFI: Fixed bug #79576 ("TYPE *" shows unhelpful message when type is not defined). Filter: Fixed bug #61700 (FILTER_FLAG_IPV6/FILTER_FLAG_NO_PRIV|RES_RANGE failing). FPM: Fixed bug #81513 (Future possibility for heap overflow in FPM zlog). Fixed bug #81026 (PHP-FPM oob R/W in root process leading to privilege escalation) (CVE-2021-21703). Added openmetrics status format. Enable process renaming on macOS. Added pm.max_spawn_rate option to configure max spawn child processes rate. Fixed bug #65800 (Events port mechanism). FTP: Convert resource<ftp> to object \FTP\Connection. GD: Fixed bug #71316 (libpng warning from imagecreatefromstring). Convert resource<gd font> to object \GdFont. Added support for Avif images hash: Implemented FR #68109 (Add MurmurHash V3). Implemented FR #73385 (Add xxHash support). JSON: Fixed bug #81532 (Change of $depth behaviour in json_encode() on PHP 8.1). LDAP: Convert resource<ldap link> to object \LDAP\Connection. Convert resource<ldap result> to object \LDAP\Result. Convert resource<ldap result entry> to object \LDAP\ResultEntry. MBString: Fixed bug #76167 (mbstring may use pointer from some previous request). Fixed bug #81390 (mb_detect_encoding() regression). Fixed bug #81349 (mb_detect_encoding misdetcts ASCII in some cases). Fixed bug #81298 (mb_detect_encoding() segfaults when 7bit encoding is specified). MySQLi: Fixed bug #70372 (Emulate mysqli_fetch_all() for libmysqlclient). Fixed bug #80330 (Replace language in APIs and source code/docs). Fixed bug #80329 (Add option to specify LOAD DATA LOCAL white list folder (including libmysql)). MySQLnd: Fixed bug #63327 (Crash (Bus Error) in mysqlnd due to wrong alignment). Fixed bug #80761 (PDO uses too much memory). Opcache: Fixed bug #81409 (Incorrect JIT code for ADD with a reference to array). Fixed bug #81255 (Memory leak in PHPUnit with functional JIT). Fixed bug #80959 (infinite loop in building cfg during JIT compilation). Fixed bug #81225 (Wrong result with pow operator with JIT enabled). Fixed bug #81249 (Intermittent property assignment failure with JIT enabled). Fixed bug #81256 (Assertion `zv != ((void *)0)' failed for "preload" with JIT). Fixed bug #81133 (building opcache with phpize fails). Fixed bug #81136 (opcache header not installed). Added inheritance cache. OpenSSL: Fixed bug #81502 ($tag argument of openssl_decrypt() should accept null/empty string). Bump minimal OpenSSL version to 1.0.2. PCRE: Fixed bug #81424 (PCRE2 10.35 JIT performance regression). Bundled PCRE2 is 10.37. PDO: Fixed bug #40913 (PDO_MYSQL: PDO::PARAM_LOB does not bind to a stream for fetching a BLOB). PDO MySQL: Fixed bug #80908 (PDO::lastInsertId() return wrong). Fixed bug #81037 (PDO discards error message text from prepared statement). PDO OCI: Fixed bug #77120 (Support 'success with info' at connection). PDO ODBC: Implement PDO_ATTR_SERVER_VERSION and PDO_ATTR_SERVER_INFO for PDO::getAttribute(). PDO PgSQL: Fixed bug #81343 (pdo_pgsql: Inconsitent boolean conversion after calling closeCursor()). PDO SQLite: Fixed bug #38334 (Proper data-type support for PDO_SQLITE). PgSQL: Fixed bug #81509 (pg_end_copy still expects a resource). Convert resource<pgsql link> to object \PgSql\Connection. Convert resource<pgsql result> to object \PgSql\Result. Convert resource<pgsql large object> to object \PgSql\Lob. Phar: Use SHA256 by default for signature. Add support for OpenSSL_SHA256 and OpenSSL_SHA512 signature. phpdbg: Fixed bug #81135 (unknown help topic causes assertion failure). PSpell: Convert resource<pspell> to object \PSpell\Dictionary. Convert resource<pspell config> to object \PSpell\Config. readline: Fixed bug #72998 (invalid read in readline completion). Reflection: Fixed bug #81611 (ArgumentCountError when getting default value from ReflectionParameter with new). Fixed bug #81630 (PHP 8.1: ReflectionClass->getTraitAliases() crashes with Internal error). Fixed bug #81457 (Enum: ReflectionMethod->getDeclaringClass() return a ReflectionClass). Fixed bug #81474 (Make ReflectionEnum and related class non-final). Fixed bug #80821 (ReflectionProperty::getDefaultValue() returns current value for statics). Fixed bug #80564 (ReflectionProperty::__toString() renders current value, not default value). Fixed bug #80097 (ReflectionAttribute is not a Reflector). Fixed bug #81200 (no way to determine if Closure is static). Implement ReflectionFunctionAbstract::getClosureUsedVariables. Shmop: Fixed bug #81407 (shmop_open won't attach and causes php to crash). SimpleXML: Fixed bug #81325 (Segfault in zif_simplexml_import_dom). SNMP: Implement SHA256 and SHA512 for security protocol. Sodium: Added the XChaCha20 stream cipher functions. Added the Ristretto255 functions, which are available in libsodium 1.0.18. SPL: Fixed bug #66588 (SplFileObject::fgetcsv incorrectly returns a row on premature EOF). Fixed bug #80663 (Recursive SplFixedArray::setSize() may cause double-free). Fixed bug #81477 (LimitIterator + SplFileObject regression in 8.0.1). Fixed bug #81112 (Special json_encode behavior for SplFixedArray). Fixed bug #80945 ("Notice: Undefined index" on unset() ArrayObject non-existing key). Fixed bug #80724 (FilesystemIterator::FOLLOW_SYMLINKS remove KEY_AS_FILE from bitmask). Standard: Fixed bug #81441 (gethostbyaddr('::1') returns ip instead of name after calling some other method). Fixed bug #81491 (Incorrectly using libsodium for argon2 hashing). Fixed bug #81142 (PHP 7.3+ memory leak when unserialize() is used on an associative array). Fixed bug #81111 (Serialization is unexpectedly allowed on anonymous classes with __serialize()). Fixed bug #81137 (hrtime breaks build on OSX before Sierra). Fixed bug #77627 (method_exists on Closure::__invoke inconsistency). Streams: Fixed bug #81475 (stream_isatty emits warning with attached stream wrapper). XML: Fixed bug #79971 (special character is breaking the path in xml function) (CVE-2021-21707). Fixed bug #70962 (XML_OPTION_SKIP_WHITE strips embedded whitespace). Zip: Fixed bug #81490 (ZipArchive::extractTo() may leak memory). Fixed bug #77978 (Dirname ending in colon unzips to wrong dir). Fixed bug #81420 (ZipArchive::extractTo extracts outside of destination) (CVE-2021-21706). Fixed bug #80833 (ZipArchive::getStream doesn't use setPassword). FLAVORS won't be available untill it is added to the Uses framework which can be followed up : https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=260774 Relnotes: https://www.php.net/ChangeLog-8.php#8.1.1 Sponsored by: Bounce Experts
* security/authenticator: sort distfiles after 8259bf7a5decJan Beich2021-12-281-6/+6
|
* security/fizz: Update 2021.12.20.00 -> 2021.12.27.00Yuri Victorovich2021-12-282-4/+4
|
* Remove references to defunct php72Muhammad Moinur Rahman2021-12-281-1/+1
| | | | Approved by: portmgr (blanlet infrastructure cleanup)
* security/vuxml: add an entrey for ReDoS in graphics/py-pillowThierry Thomas2021-12-271-0/+37
| | | | Security: CVE-2021-23437
* security/openssl-devel: add BSD-riscv64 target supportPiotr Kubaj2021-12-272-5/+9
| | | | While here, remove checking for powerpc, it's detected automatically.
* security/vuxml: Document more Log4Shell vulnerabilitiesRomain Tartière2021-12-271-0/+52
| | | | With hat: opensearch
* security/xray-core: Update to 1.5.0Neel Chauhan2021-12-272-4/+4
|
* security/p5-CryptX: update to 0.075.Vanilla I. Shu2021-12-272-4/+4
|
* security/py-coincurve: Update 15.0.1 -> 16.0.0Yuri Victorovich2021-12-262-4/+4
| | | | Reported by: portscout
* Bump PORTREVISION after www/libmicrohttpd updatedLi-Wen Hsu2021-12-261-1/+1
| | | | PR: 260603
* security/maltrail: Update to 0.40Michael2021-12-263-4/+22
| | | | | | Changes: https://github.com/stamparm/maltrail/compare/0.39...0.40 PR: 260638
* security/keepass: Update to 2.49Michael2021-12-262-4/+4
| | | | | | Release Note: https://keepass.info/news/n210910_2.49.html PR: 260677
* fasl ports: Chase 888bfec23a with PORTREVISION bumpJoseph Mingrone2021-12-251-1/+1
| | | | | | | | These packages must be rebuilt when so much as a bit changes in lang/sbcl. Without the rebuild, problems such as StumpWM not loading will occur. Sponsored by: The FreeBSD Foundation
* security/p5-IO-Socket-SSL: update to 2.073Sergei Vyshenski2021-12-252-4/+4
| | | | | | | Changelog: https://metacpan.org/dist/IO-Socket-SSL/changes PR: 260649 Reported by: Sergei Vyshenski <svysh.fbsd@gmail.com> (maintainer)
* security/archlinux-keyring: new portCharlie Li2021-12-245-0/+36
| | | | | | | Arch Linux PGP keyring, used with sysutils/pacman Approved by: arrowd, fluffy (mentors) Differential Revision: https://reviews.freebsd.org/D33621
* security/solana: Update 1.8.5 -> 1.9.2Yuri Victorovich2021-12-233-853/+933
| | | | Reported by: portscout
* security/bastillion: update to 3.12.00Alexander Leidinger2021-12-234-37/+99
| | | | | This update contains an incompatible DB change, please read UPDATING *before* updating.