Skip site navigation (1)Skip section navigation (2)
Date:      Fri, 10 Apr 2026 16:45:32 +0000
From:      Yusuf Yaman <nxjoseph@FreeBSD.org>
To:        ports-committers@FreeBSD.org, dev-commits-ports-all@FreeBSD.org, dev-commits-ports-main@FreeBSD.org
Subject:   git: 1a38d8fb7aef - main - security/vuxml: Add MbedTLS vulnerabilities
Message-ID:  <69d9292c.24cc5.64d84136@gitrepo.freebsd.org>

index | next in thread | raw e-mail

The branch main has been updated by nxjoseph:

URL: https://cgit.FreeBSD.org/ports/commit/?id=1a38d8fb7aefaafa50ce7f39a7de7b721785c2ab

commit 1a38d8fb7aefaafa50ce7f39a7de7b721785c2ab
Author:     Yusuf Yaman <nxjoseph@FreeBSD.org>
AuthorDate: 2026-04-10 15:41:29 +0000
Commit:     Yusuf Yaman <nxjoseph@FreeBSD.org>
CommitDate: 2026-04-10 16:39:52 +0000

    security/vuxml: Add MbedTLS vulnerabilities
    
    Reviewed by:    osa, vvd (mentors)
    Approved by:    osa (mentor)
    Differential Revision: https://reviews.freebsd.org/D56344
---
 security/vuxml/vuln/2026.xml | 52 ++++++++++++++++++++++++++++++++++++++++++++
 1 file changed, 52 insertions(+)

diff --git a/security/vuxml/vuln/2026.xml b/security/vuxml/vuln/2026.xml
index 85c1c149bcc4..c6256911035d 100644
--- a/security/vuxml/vuln/2026.xml
+++ b/security/vuxml/vuln/2026.xml
@@ -1,3 +1,55 @@
+  <vuln vid="d77bd2f5-34f0-11f1-bc6d-3c7c3fba4204">
+    <topic>Mbed TLS -- vulnerabilities</topic>
+    <affects>
+    <package>
+	<name>mbedtls3</name>
+	<range><lt>3.6.6</lt></range>
+    </package>
+    <package>
+	<name>mbedtls4</name>
+	<range><lt>4.1.0</lt></range>
+    </package>
+    </affects>
+    <description>
+	<body xmlns="http://www.w3.org/1999/xhtml">;
+	<p>https://mbed-tls.readthedocs.io/en/latest/security-advisories/ reports:</p>
+	<blockquote cite="https://mbed-tls.readthedocs.io/en/latest/security-advisories/">;
+	  <ul>
+	    <li>Client impersonation while resuming a TLS 1.3 session (CVE-2026-34873)</li>
+	    <li>Entropy on Linux can fall back to /dev/urandom (CVE-2026-34871)</li>
+	    <li>PSA random generator cloning (CVE-2026-25835)</li>
+	    <li>Compiler-induced constant-time violations (CVE-2025-66442)</li>
+	    <li>Null pointer dereference when setting a distinguished name (CVE-2026-34874)</li>
+	    <li>Buffer overflow in FFDH public key export (CVE-2026-34875)</li>
+	    <li>FFDH: lack of contributory behaviour due to improper input validation (CVE-2026-34872)</li>
+	    <li>Signature Algorithm Injection (CVE-2026-25834)</li>
+	    <li>CCM multipart finish tag-length validation bypass (CVE-2026-34876)</li>
+	    <li>Risk of insufficient protection of serialized session or context data leading to potential memory safety issues (CVE-2026-34877)</li>
+	    <li>Buffer underflow in x509_inet_pton_ipv6() (CVE-2026-25833)</li>
+	  </ul>
+	</blockquote>
+	</body>
+    </description>
+    <references>
+      <cvename>CVE-2026-34873</cvename>
+      <cvename>CVE-2026-34871</cvename>
+      <cvename>CVE-2026-25835</cvename>
+      <cvename>CVE-2025-66442</cvename>
+      <cvename>CVE-2026-34874</cvename>
+      <cvename>CVE-2026-34875</cvename>
+      <cvename>CVE-2026-34872</cvename>
+      <cvename>CVE-2026-25834</cvename>
+      <cvename>CVE-2026-34876</cvename>
+      <cvename>CVE-2026-34877</cvename>
+      <cvename>CVE-2026-25833</cvename>
+      <url>https://mbed-tls.readthedocs.io/en/latest/security-advisories/</url>;
+    </references>
+    <dates>
+      <discovery>2026-03-31</discovery>
+      <entry>2026-04-10</entry>
+    </dates>
+  </vuln>
+
   <vuln vid="4b727a1a-5034-42b4-b29b-2289389f4ba8">
     <topic>chromium -- security fixes</topic>
     <affects>


home | help

Want to link to this message? Use this
URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?69d9292c.24cc5.64d84136>