FreshPorts - VuXML

This page displays vulnerability information about FreeBSD Ports.

The VUXML data was last processed by FreshPorts on 2025-12-05 19:13:37 UTC

List all Vulnerabilities, by package

List all Vulnerabilities, by date

These are the vulnerabilities relating to the commit you have selected:

VuXML IDDescription
e99a32c8-b8e2-11f0-8510-b42e991fc52eXorg -- multiple vulnerabilities

https://access.redhat.com/errata/RHSA-2025:19432 reports:

CVE-2025-62229: A flaw was found in the X.Org X server and Xwayland when processing X11 Present extension notifications. Improper error handling during notification creation can leave dangling pointers that lead to a use-after-free condition. This can cause memory corruption or a crash, potentially allowing an attacker to execute arbitrary code or cause a denial of service.

CVE-2025-62230: A flaw was discovered in the X.Org X servers X Keyboard (Xkb) extension when handling client resource cleanup. The software frees certain data structures without properly detaching related resources, leading to a use-after-free condition. This can cause memory corruption or a crash when affected clients disconnect.

CVE-2025-62231: A flaw was identified in the X.Org X servers X Keyboard (Xkb) extension where improper bounds checking in the XkbSetCompatMap() function can cause an unsigned short overflow. If an attacker sends specially crafted input data, the value calculation may overflow, leading to memory corruption or a crash.


Discovery 2025-10-30
Entry 2025-11-03
xorg-server
< 21.1.19,1

xwayland
< 24.1.9,1

CVE-2025-62229
CVE-2025-62230
CVE-2025-62231
https://cveawg.mitre.org/api/cve/CVE-2025-62229
8df49466-5664-11f0-943a-18c04d5ea3dcxorg server -- Multiple vulnerabilities

The X.Org project reports:

  • CVE-2025-49176: Integer overflow in Big Requests Extension

    The Big Requests extension allows requests larger than the 16-bit length limit. It uses integers for the request length and checks for the size not to exceed the maxBigRequestSize limit, but does so after translating the length to integer by multiplying the given size in bytes by 4. In doing so, it might overflow the integer size limit before actually checking for the overflow, defeating the purpose of the test.


Discovery 2025-06-17
Entry 2025-07-01
xorg-server
xephyr
xorg-vfbserver
< 21.1.18,1

xorg-nextserver
< 21.1.18,2

xwayland
< 24.1.8,1

CVE-2025-49176
https://lists.x.org/archives/xorg/2025-June/062055.html