FreshPorts - VuXML
This page displays vulnerability information about FreeBSD Ports.
The VUXML data was last processed by FreshPorts on 2025-12-12 18:34:41 UTC
List all Vulnerabilities, by package
List all Vulnerabilities, by date
These are the vulnerabilities relating to the commit you have selected:
| VuXML ID | Description |
| ba02dfb6-ce31-11f0-a327-589cfc01894a | wolfssl -- multiple issues
wolfSSL blog reports:
This release includes multiple fixes across TLS 1.2, TLS 1.3, X25519,
XChaCha20-Poly1305, and PSK processing. Highlights include:
- A timing-side-channel issue in X25519 specifically affecting
Xtensa-based ESP32 devices. Low-memory X25519 implementations are now
the default for Xtensa.
- A medium-severity TLS 1.3 server-side DoS risk from repeated
KeyShareEntry values in malicious ClientHello messages.
- Several TLS 1.3 downgrade-related issues (PFS downgrades, signature
algorithm downgrades, and duplicate extension parsing).
- A memory leak risk in TLS 1.2 certificate digest handling.
- XChaCha20-Poly1305 decryption bounds-check fix and constant-time
improvements in PSK binder verification.
Discovery 2025-11-20 Entry 2025-11-30 wolfssl
< 5.8.4
CVE-2025-12888
CVE-2025-11936
CVE-2025-11935
CVE-2025-11934
CVE-2025-11933
CVE-2025-11932
CVE-2025-11931
CVE-2025-12889
https://github.com/wolfSSL/wolfssl/releases/tag/v5.8.4-stable
|
| 9b9a5f6e-1755-11ed-adef-589cfc01894a | wolfssl -- multiple issues
wolfSSL blog reports:
In release 5.4.0 there were 3 vulnerabilities listed as
fixed in wolfSSL. Two relatively new reports, one dealing with a DTLS
1.0/1.2 denial of service attack and the other a ciphertext attack on
ECC/DH operations. The last vulnerability listed was a public
disclosure of a previous attack on AMD devices fixed since wolfSSL
version 5.1.0. Coordination of the disclosure of the attack was done
responsibly, in cooperation with the researchers, waiting for the
public release of the attack details since it affects multiple
security libraries.
Discovery 2022-07-11 Entry 2022-08-08 wolfssl
< 5.4.0
CVE-2022-34293
CVE-2020-12966
CVE-2021-46744
https://github.com/wolfSSL/wolfssl/releases/tag/v5.4.0-stable
https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1013
https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1033
|