Skip site navigation (1)Skip section navigation (2)
Date:      Sun, 2 Nov 2025 17:26:10 GMT
From:      Fernando =?utf-8?Q?Apestegu=C3=ADa?= <fernape@FreeBSD.org>
To:        ports-committers@FreeBSD.org, dev-commits-ports-all@FreeBSD.org, dev-commits-ports-main@FreeBSD.org
Subject:   git: 62b9836d615e - main - security/vuxml: Add Mozilla vulnerabilities
Message-ID:  <202511021726.5A2HQAvP099410@gitrepo.freebsd.org>

index | next in thread | raw e-mail

The branch main has been updated by fernape:

URL: https://cgit.FreeBSD.org/ports/commit/?id=62b9836d615ea107e49921ea35d194bd1d383514

commit 62b9836d615ea107e49921ea35d194bd1d383514
Author:     Fernando ApesteguĂ­a <fernape@FreeBSD.org>
AuthorDate: 2025-11-02 17:24:43 +0000
Commit:     Fernando ApesteguĂ­a <fernape@FreeBSD.org>
CommitDate: 2025-11-02 17:25:54 +0000

    security/vuxml: Add Mozilla vulnerabilities
    
     * CVE-2025-9182
     * CVE-2025-9180
     * CVE-2025-11152
     * CVE-2025-10536
     * CVE-2025-10534
     * CVE-2025-10533
     * CVE-2025-10532
     * CVE-2025-10531
     * CVE-2025-10529
     * CVE-2025-10528
     * CVE-2025-10527
---
 security/vuxml/vuln/2025.xml | 378 +++++++++++++++++++++++++++++++++++++++++++
 1 file changed, 378 insertions(+)

diff --git a/security/vuxml/vuln/2025.xml b/security/vuxml/vuln/2025.xml
index 033747a96dd5..22355dc41be2 100644
--- a/security/vuxml/vuln/2025.xml
+++ b/security/vuxml/vuln/2025.xml
@@ -1,3 +1,381 @@
+  <vuln vid="1ba0b62b-b80a-11f0-8016-b42e991fc52e">
+    <topic>Mozilla -- Denial-of-service due to out-of-memory</topic>
+    <affects>
+    <package>
+	<name>firefox</name>
+	<range><lt>142.0.0,2</lt></range>
+    </package>
+    <package>
+	<name>firefox-esr</name>
+	<range><lt>140.2.0</lt></range>
+    </package>
+    <package>
+	<name>thunderbird</name>
+	<range><lt>142.0.0</lt></range>
+    </package>
+    </affects>
+    <description>
+	<body xmlns="http://www.w3.org/1999/xhtml">;
+	<p>https://bugzilla.mozilla.org/show_bug.cgi?id=1975837 reports:</p>
+	<blockquote cite="https://bugzilla.mozilla.org/show_bug.cgi?id=1975837">;
+	  <p>Denial-of-service due to out-of-memory in the Graphics:
+	  WebRender component.</p>
+	</blockquote>
+	</body>
+    </description>
+    <references>
+      <cvename>CVE-2025-9182</cvename>
+      <url>https://cveawg.mitre.org/api/cve/CVE-2025-9182</url>;
+    </references>
+    <dates>
+      <discovery>2025-08-19</discovery>
+      <entry>2025-11-02</entry>
+    </dates>
+  </vuln>
+
+  <vuln vid="0723a60e-b80a-11f0-8016-b42e991fc52e">
+    <topic>Mozilla -- Same-origin policy bypass in the Graphics: Canvas2D component</topic>
+    <affects>
+    <package>
+	<name>firefox</name>
+	<range><lt>142.0.0,2</lt></range>
+    </package>
+    <package>
+	<name>firefox-esr</name>
+	<range><lt>140.2.0</lt></range>
+    </package>
+    <package>
+	<name>thunderbird</name>
+	<range><lt>142.0.0</lt></range>
+    </package>
+    <package>
+	<name>thunderbird</name>
+	<range><lt>140.2.0</lt></range>
+    </package>
+    </affects>
+    <description>
+	<body xmlns="http://www.w3.org/1999/xhtml">;
+	<p>https://bugzilla.mozilla.org/show_bug.cgi?id=1979782 reports:</p>
+	<blockquote cite="https://bugzilla.mozilla.org/show_bug.cgi?id=1979782">;
+	  <p>Same-origin policy bypass in the Graphics: Canvas2D
+	    component.</p>
+	</blockquote>
+	</body>
+    </description>
+    <references>
+      <cvename>CVE-2025-9180</cvename>
+      <url>https://cveawg.mitre.org/api/cve/CVE-2025-9180</url>;
+    </references>
+    <dates>
+      <discovery>2025-08-19</discovery>
+      <entry>2025-11-02</entry>
+    </dates>
+  </vuln>
+
+  <vuln vid="f752879f-b809-11f0-8016-b42e991fc52e">
+    <topic>Firefox -- Sandbox escape due to integer overflow</topic>
+    <affects>
+    <package>
+	<name>firefox</name>
+	<range><lt>143.0.3,2</lt></range>
+    </package>
+    </affects>
+    <description>
+	<body xmlns="http://www.w3.org/1999/xhtml">;
+	<p>https://bugzilla.mozilla.org/show_bug.cgi?id=1987246 reports:</p>
+	<blockquote cite="https://bugzilla.mozilla.org/show_bug.cgi?id=1987246">;
+	  <p>Sandbox escape due to integer overflow in the Graphics:
+	  Canvas2D component.</p>
+	</blockquote>
+	</body>
+    </description>
+    <references>
+      <cvename>CVE-2025-11152</cvename>
+      <url>https://cveawg.mitre.org/api/cve/CVE-2025-11152</url>;
+    </references>
+    <dates>
+      <discovery>2025-09-30</discovery>
+      <entry>2025-11-02</entry>
+    </dates>
+  </vuln>
+
+  <vuln vid="ea017037-b808-11f0-8016-b42e991fc52e">
+    <topic>Firefox -- Information disclosure in the Networking: Cache component</topic>
+    <affects>
+    <package>
+	<name>firefox</name>
+	<range><lt>143.0.0,2</lt></range>
+    </package>
+    <package>
+	<name>firefox-esr</name>
+	<range><lt>140.3.0</lt></range>
+    </package>
+    <package>
+	<name>thunderbird</name>
+	<range><lt>143.0.0</lt></range>
+    </package>
+    </affects>
+    <description>
+	<body xmlns="http://www.w3.org/1999/xhtml">;
+	<p>https://bugzilla.mozilla.org/show_bug.cgi?id=1981502 reports:</p>
+	<blockquote cite="https://bugzilla.mozilla.org/show_bug.cgi?id=1981502">;
+	  <p>Information disclosure in the Networking: Cache
+	    component.</p>
+	</blockquote>
+	</body>
+    </description>
+    <references>
+      <cvename>CVE-2025-10536</cvename>
+      <url>https://cveawg.mitre.org/api/cve/CVE-2025-10536</url>;
+    </references>
+    <dates>
+      <discovery>2025-09-16</discovery>
+      <entry>2025-11-02</entry>
+    </dates>
+  </vuln>
+
+  <vuln vid="d09efc3b-b808-11f0-8016-b42e991fc52e">
+    <topic>Firefox -- Spoofing issue in the Site Permissions component</topic>
+    <affects>
+    <package>
+	<name>firefox</name>
+	<range><lt>143.0.0,2</lt></range>
+    </package>
+    <package>
+	<name>thunderbird</name>
+	<range><lt>143.0.0</lt></range>
+    </package>
+    </affects>
+    <description>
+	<body xmlns="http://www.w3.org/1999/xhtml">;
+	<p>https://bugzilla.mozilla.org/show_bug.cgi?id=1665334 reports:</p>
+	<blockquote cite="https://bugzilla.mozilla.org/show_bug.cgi?id=1665334">;
+	  <p>Spoofing issue in the Site Permissions component.</p>
+	</blockquote>
+	</body>
+    </description>
+    <references>
+      <cvename>CVE-2025-10534</cvename>
+      <url>https://cveawg.mitre.org/api/cve/CVE-2025-10534</url>;
+    </references>
+    <dates>
+      <discovery>2025-09-16</discovery>
+      <entry>2025-11-02</entry>
+    </dates>
+  </vuln>
+
+  <vuln vid="c80baae7-b808-11f0-8016-b42e991fc52e">
+    <topic>Firefox -- Integer overflow in the SVG component</topic>
+    <affects>
+    <package>
+	<name>firefox</name>
+	<range><lt>143.0.0,2</lt></range>
+    </package>
+    <package>
+	<name>firefox-esr</name>
+	<range><lt>140.3.0</lt></range>
+    </package>
+    <package>
+	<name>thunderbird</name>
+	<range><lt>143.0.0</lt></range>
+    </package>
+    </affects>
+    <description>
+	<body xmlns="http://www.w3.org/1999/xhtml">;
+	<p>https://bugzilla.mozilla.org/show_bug.cgi?id=1980788 reports:</p>
+	<blockquote cite="https://bugzilla.mozilla.org/show_bug.cgi?id=1980788">;
+	  <p>Integer overflow in the SVG component.</p>
+	</blockquote>
+	</body>
+    </description>
+    <references>
+      <cvename>CVE-2025-10533</cvename>
+      <url>https://cveawg.mitre.org/api/cve/CVE-2025-10533</url>;
+    </references>
+    <dates>
+      <discovery>2025-09-16</discovery>
+      <entry>2025-11-02</entry>
+    </dates>
+  </vuln>
+
+  <vuln vid="af9c5b99-b808-11f0-8016-b42e991fc52e">
+    <topic>Firefox -- Incorrect boundary conditions</topic>
+    <affects>
+    <package>
+	<name>firefox</name>
+	<range><lt>143.0.0,2</lt></range>
+    </package>
+    <package>
+	<name>firefox-esr</name>
+	<range><lt>140.3.0</lt></range>
+    </package>
+    <package>
+	<name>thunderbird</name>
+	<range><lt>143</lt></range>
+    </package>
+    </affects>
+    <description>
+	<body xmlns="http://www.w3.org/1999/xhtml">;
+	<p>https://bugzilla.mozilla.org/show_bug.cgi?id=1979502 reports:</p>
+	<blockquote cite="https://bugzilla.mozilla.org/show_bug.cgi?id=1979502">;
+	  <p>Incorrect boundary conditions in the JavaScript: GC
+	    component.</p>
+	</blockquote>
+	</body>
+    </description>
+    <references>
+      <cvename>CVE-2025-10532</cvename>
+      <url>https://cveawg.mitre.org/api/cve/CVE-2025-10532</url>;
+    </references>
+    <dates>
+      <discovery>2025-09-16</discovery>
+      <entry>2025-11-02</entry>
+    </dates>
+  </vuln>
+
+  <vuln vid="a4bebda9-b808-11f0-8016-b42e991fc52e">
+    <topic>Firefox -- Mitigation bypass</topic>
+    <affects>
+    <package>
+	<name>firefox</name>
+	<range><lt>143.0.0,2</lt></range>
+    </package>
+    <package>
+	<name>thunderbird</name>
+	<range><lt>143.0.0</lt></range>
+    </package>
+    </affects>
+    <description>
+	<body xmlns="http://www.w3.org/1999/xhtml">;
+	<p>https://bugzilla.mozilla.org/show_bug.cgi?id=1978453 reports:</p>
+	<blockquote cite="https://bugzilla.mozilla.org/show_bug.cgi?id=1978453">;
+	  <p>Mitigation bypass in the Web Compatibility: Tooling
+	    component.</p>
+	</blockquote>
+	</body>
+    </description>
+    <references>
+      <cvename>CVE-2025-10531</cvename>
+      <url>https://cveawg.mitre.org/api/cve/CVE-2025-10531</url>;
+    </references>
+    <dates>
+      <discovery>2025-09-16</discovery>
+      <entry>2025-11-02</entry>
+    </dates>
+  </vuln>
+
+  <vuln vid="944d968c-b808-11f0-8016-b42e991fc52e">
+    <topic>Firefox -- Same-origin policy bypass</topic>
+    <affects>
+    <package>
+	<name>firefox</name>
+	<range><lt>143.0.0,2</lt></range>
+    </package>
+    <package>
+	<name>firefox-esr</name>
+	<range><lt>140.3.0</lt></range>
+    </package>
+    <package>
+	<name>thunderbird</name>
+	<range><lt>143.0.0</lt></range>
+    </package>
+    <package>
+	<name>thunderbird</name>
+	<range><lt>140.3.0</lt></range>
+    </package>
+    </affects>
+    <description>
+	<body xmlns="http://www.w3.org/1999/xhtml">;
+	<p>https://bugzilla.mozilla.org/show_bug.cgi?id=1970490 reports:</p>
+	<blockquote cite="https://bugzilla.mozilla.org/show_bug.cgi?id=1970490">;
+	  <p>Same-origin policy bypass in the Layout component.</p>
+	</blockquote>
+	</body>
+    </description>
+    <references>
+      <cvename>CVE-2025-10529</cvename>
+      <url>https://cveawg.mitre.org/api/cve/CVE-2025-10529</url>;
+    </references>
+    <dates>
+      <discovery>2025-09-16</discovery>
+      <entry>2025-11-02</entry>
+    </dates>
+  </vuln>
+
+  <vuln vid="8b5f4eb3-b808-11f0-8016-b42e991fc52e">
+    <topic>Firefox -- Sandbox escape due to undefined behavior</topic>
+    <affects>
+    <package>
+	<name>firefox</name>
+	<range><lt>143.0.0,2</lt></range>
+    </package>
+    <package>
+	<name>firefox-esr</name>
+	<range><lt>140.3.0</lt></range>
+    </package>
+    <package>
+	<name>thunderbird</name>
+	<range><lt>143.0.0</lt></range>
+    </package>
+    <package>
+	<name>thunderbird</name>
+	<range><lt>140.3.0</lt></range>
+    </package>
+    </affects>
+    <description>
+	<body xmlns="http://www.w3.org/1999/xhtml">;
+	<p>https://bugzilla.mozilla.org/show_bug.cgi?id=1986185 reports:</p>
+	<blockquote cite="https://bugzilla.mozilla.org/show_bug.cgi?id=1986185">;
+	  <p>Sandbox escape due to undefined behavior, invalid pointer
+	  in the Graphics: Canvas2D component.</p>
+	</blockquote>
+	</body>
+    </description>
+    <references>
+      <cvename>CVE-2025-10528</cvename>
+      <url>https://cveawg.mitre.org/api/cve/CVE-2025-10528</url>;
+    </references>
+    <dates>
+      <discovery>2025-09-16</discovery>
+      <entry>2025-11-02</entry>
+    </dates>
+  </vuln>
+
+  <vuln vid="82595339-b808-11f0-8016-b42e991fc52e">
+    <topic>Firefox -- Sandbox escape due to use-after-free</topic>
+    <affects>
+    <package>
+	<name>firefox</name>
+	<range><lt>143.0.0,2</lt></range>
+    </package>
+    <package>
+	<name>firefox-esr</name>
+	<range><lt>140.3.0</lt></range>
+    </package>
+    <package>
+	<name>thunderbird</name>
+	<range><lt>143.0.0</lt></range>
+    </package>
+    </affects>
+    <description>
+	<body xmlns="http://www.w3.org/1999/xhtml">;
+	<p>https://bugzilla.mozilla.org/show_bug.cgi?id=1984825 reports:</p>
+	<blockquote cite="https://bugzilla.mozilla.org/show_bug.cgi?id=1984825">;
+	  <p>Sandbox escape due to use-after-free in the Graphics:
+	  Canvas2D component.</p>
+	</blockquote>
+	</body>
+    </description>
+    <references>
+      <cvename>CVE-2025-10527</cvename>
+      <url>https://cveawg.mitre.org/api/cve/CVE-2025-10527</url>;
+    </references>
+    <dates>
+      <discovery>2025-09-16</discovery>
+      <entry>2025-11-02</entry>
+    </dates>
+  </vuln>
+
   <vuln vid="77a0f93a-b71e-11f0-8d86-d7789240c8c2">
     <topic>python 3.9 -- end of life, not receiving security support</topic>
     <affects>


home | help

Want to link to this message? Use this
URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?202511021726.5A2HQAvP099410>