Build date: 1769554803 - Tue Jan 27 23:00:03 UTC 2026 Build cvs date: 1769549625 - Tue Jan 27 21:33:45 UTC 2026 Build id: 2026-01-28.1 Build tags: amd64-regress ports sysupgrade Applied the following diff(s): /home/anton/tmp/robsd/src-sys-em.diff /home/anton/tmp/robsd/src-sys-uhidev-sispm.diff /home/anton/tmp/robsd/src-sysupgrade.diff P lib/libcrypto/pkcs12/p12_decr.c P lib/libcrypto/pkcs12/p12_kiss.c P lib/libcrypto/ts/ts_rsp_verify.c P sys/dev/fdt/qccpu.c M sys/dev/usb/uhidev.c P usr.bin/ssh/authfd.h P usr.bin/ssh/ssh-agent.c M usr.sbin/bgpd/session.c P usr.sbin/rpki-client/cert.c P usr.sbin/rpki-client/extern.h P usr.sbin/rpki-client/filemode.c P usr.sbin/rpki-client/parser.c commit mZQCjAzes7tSeVJx Author: kettenis Date: 2026/01/27 21:33:45 Support up to three CPU clusters. ok patrick@ sys/dev/fdt/qccpu.c commit S9brGXTN2q7MpZ5k Author: tb Date: 2026/01/27 14:18:32 Avoid type confusion in the timestamp response parsing A malformed v2 signing cert can lead to a type confusion, and the result is a read from an invalid memory address or NULL, so a crash. Unlike for OpenSSL, v1 signing certs aren't affected since miod fixed this in '14. Reported by Luigino Camastra, fix by Bob Beck, via OpenSSL, CVE 2025-69420. ok jsing lib/libcrypto/ts/ts_rsp_verify.c commit WhVpdHJiXBXvpAxY Author: tb Date: 2026/01/27 14:14:20 Avoid type confusion in PKCS#12 parsing A type confusion can lead to a 1-byte read at address 0x00-0xff, so a crash. Reported by Luigino Camastra, fix by Bob Beck, via OpenSSL, CVE 2025-22795 ok jsing lib/libcrypto/pkcs12/p12_kiss.c commit zEJpilq8WBW3pDxj Author: tb Date: 2026/01/27 14:03:01 Add NULL pointer check to PKCS12_item_decrypt_d2i() Avoids a NULL pointer dereference triggerable by a malformed PCKS#12 file. From Luigino Camastra via OpenSSL (CVE-2025-69421) ok jsing lib/libcrypto/pkcs12/p12_decr.c commit pdT7iWqgUBjdXWNw Author: tb Date: 2026/01/27 09:41:42 rpki-client: update comment. cert_parse_pre() left the building a while ago usr.sbin/rpki-client/parser.c commit koSbezeLBQTkoZzV Author: tb Date: 2026/01/27 08:40:29 rpki-client: add cert_parse_ta() This merges the cert_parse() + ta_parse() dance into a single specialized function responsible for parsing a TA cert. Removes another tricky use of cert_parse() and makes things simpler for the callers. ok claudio job usr.sbin/rpki-client/cert.c usr.sbin/rpki-client/extern.h usr.sbin/rpki-client/filemode.c usr.sbin/rpki-client/parser.c commit 3l6XhovXARftiWfk Author: tb Date: 2026/01/27 08:35:59 rpki-client: add cert_parse_ca_or_brk() This is a specialized cert parser intended for a .cer in a manifest's fileList which therefore only accepts CA and BGPsec certificates. This pulls a check from the parser code into the cert code where it fits a bit better. ok claudio job usr.sbin/rpki-client/cert.c usr.sbin/rpki-client/extern.h usr.sbin/rpki-client/parser.c commit phdSJiZbB0ptNPFy Author: tb Date: 2026/01/27 08:32:19 rpki-client: factor cert_deserialize_and_parse() helper out of cert_parse() cert_parse() is currently a bit too general: it handles TA certs, CA certs and BGPsec router certs to accommodate the needs of file mode. The need to perform additional checks after a call to cert_parse() makes things fragile and led to one of the issues addressed in recent errata. cert_deserialize_and_parse() will become a wrapper for more specialized functions in subsequent commits. While this is not pretty either, it does simplify things on the caller side. ok claudio job usr.sbin/rpki-client/cert.c commit JzqHQPzzXA3WnCjR Author: tb Date: 2026/01/27 08:27:15 rpki-client: split ta_check_validity() out of ta_parse() The check that a TA is currently valid is only done here right now. It should probably be done in cert_check_validity_period() instead. This is left for a later diff. ok claudio job usr.sbin/rpki-client/cert.c commit PL61y20SFMo8FOK0 Author: djm Date: 2026/01/27 06:48:29 Implement "query" extension from draft-ietf-sshm-ssh-agent feedback jsg@, tb@; ok tb@ usr.bin/ssh/authfd.h usr.bin/ssh/ssh-agent.c