Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 26 Mar 2026 19:18:57 +0000
From:      Fernando Apeste=?utf-8?Q?gu=C3=ADa?= <fernape@FreeBSD.org>
To:        ports-committers@FreeBSD.org, dev-commits-ports-all@FreeBSD.org, dev-commits-ports-main@FreeBSD.org
Subject:   git: 62f0a081738b - main - security/vuxml: Add Mozilla vulnerabilities
Message-ID:  <69c586a1.1a3e0.36af47ad@gitrepo.freebsd.org>

index | next in thread | raw e-mail

The branch main has been updated by fernape:

URL: https://cgit.FreeBSD.org/ports/commit/?id=62f0a081738b3e2d8d551bd87526567c8de55704

commit 62f0a081738b3e2d8d551bd87526567c8de55704
Author:     Fernando ApesteguĂ­a <fernape@FreeBSD.org>
AuthorDate: 2026-03-26 19:15:41 +0000
Commit:     Fernando ApesteguĂ­a <fernape@FreeBSD.org>
CommitDate: 2026-03-26 19:18:38 +0000

    security/vuxml: Add Mozilla vulnerabilities
---
 security/vuxml/vuln/2026.xml | 215 ++++++++++++++++++++++++++++++++++++++-----
 1 file changed, 191 insertions(+), 24 deletions(-)

diff --git a/security/vuxml/vuln/2026.xml b/security/vuxml/vuln/2026.xml
index 89d4594f362f..56d3211142d9 100644
--- a/security/vuxml/vuln/2026.xml
+++ b/security/vuxml/vuln/2026.xml
@@ -1,38 +1,205 @@
-  <vuln vid="c6d41ac8-28d2-11f1-b35e-bc241121aa0a">
-    <topic>FreeBSD -- pf silently ignores certain rules</topic>
+  <vuln vid="26c24872-2943-11f1-8461-b42e991fc52e">
+    <topic>Mozilla -- Multiple vulnerabilities</topic>
     <affects>
       <package>
-	<name>FreeBSD-kernel</name>
-	<range><ge>15.0</ge><lt>15.0_5</lt></range>
-	<range><ge>14.4</ge><lt>14.4_1</lt></range>
-	<range><ge>14.3</ge><lt>14.3_10</lt></range>
+	<name>firefox</name>
+	<range><lt>149.0.0,2</lt></range>
+      </package>
+      <package>
+	<name>thunderbird</name>
+	<range><lt>149.0.0</lt></range>
       </package>
     </affects>
     <description>
       <body xmlns="http://www.w3.org/1999/xhtml">;
-	<h1>Problem Description:</h1>
-	  <p>A regression in the way hashes were calculated caused rules
-	  containing the address range syntax (x.x.x.x - y.y.y.y) that only
-	  differ in the address range(s) involved to be silently dropped as
-	  duplicates.  Only the first of such rules is actually loaded into
-	  pf.  Ranges expressed using the address[/mask-bits] syntax were not
-	  affected.</p>
-	  <p>Some keywords representing actions taken on a packet-matching rule,
-	  such as 'log', 'return tll', or 'dnpipe', may suffer from the same
-	  issue.  It is unlikely that users have such configurations, as these
-	  rules would always be redundant.  The verification described in
-	  "IV.  Workaround" below will find these as well.</p>
-	<h1>Impact:</h1>
-	  <p>Affected rules are silently ignored, which can lead to unexpected
-	  behaviour including over- and underblocking.</p>
+	<p>CVE-2026-4729: Memory safety bugs</p>
+	<p>CVE-2026-4728: Spoofing issue in the Privacy: Anti-Tracking
+	component.</p>
+	<p>CVE-2026-4727: Denial-of-service in the Libraries component
+	in NSS.</p>
+	<p>CVE-2026-4726: Denial-of-service in the XML component.</p>
+	<p>CVE-2026-4725: Sandbox escape due to use-after-free in the
+	Graphics: Canvas2D component.</p>
+	<p>CVE-2026-4724: Undefined behavior in the Audio/Video
+	component.</p>
+	<p>CVE-2026-4723: Use-after-free in the JavaScript Engine
+	component.</p>
+	<p>CVE-2026-4722: Privilege escalation in the IPC component.</p>
       </body>
     </description>
     <references>
-      <cvename>CVE-2026-4748</cvename>
-      <freebsdsa>SA-26:09.pf</freebsdsa>
+      <cvename>CVE-2026-4729</cvename>
+      <cvename>CVE-2026-4728</cvename>
+      <cvename>CVE-2026-4727</cvename>
+      <cvename>CVE-2026-4726</cvename>
+      <cvename>CVE-2026-4725</cvename>
+      <cvename>CVE-2026-4724</cvename>
+      <cvename>CVE-2026-4723</cvename>
+      <cvename>CVE-2026-4722</cvename>
     </references>
     <dates>
-      <discovery>2026-03-25</discovery>
+      <discovery>2026-03-24</discovery>
+      <entry>2026-03-26</entry>
+    </dates>
+  </vuln>
+
+  <vuln vid="32819a60-2943-11f1-8461-b42e991fc52e">
+    <topic>Mozilla -- Multiple vulnerabilities</topic>
+    <affects>
+      <package>
+	<name>firefox</name>
+	<range><lt>149.0.0,2</lt></range>
+      </package>
+      <package>
+	<name>firefox-esr</name>
+	<range><lt>140.9.0</lt></range>
+      </package>
+      <package>
+	<name>thunderbird</name>
+	<range><lt>149.0.0</lt></range>
+      </package>
+    </affects>
+    <description>
+      <body xmlns="http://www.w3.org/1999/xhtml">;
+	<p>CVE-2026-4721: Memory safety bugs. Potential arbitrary code
+	execution.</p>
+	<p>CVE-2026-4709: Incorrect boundary conditions in the
+	Audio/Video: GMP component.</p>
+	<p>CVE-2026-4707: Incorrect boundary conditions in the Graphics:
+	Canvas2D component.</p>
+	<p>CVE-2026-4706: Incorrect boundary conditions in the Graphics:
+	Canvas2D component.</p>
+	<p>CVE-2026-4699: Incorrect boundary conditions in the Layout:
+	Text and Fonts component.</p>
+	<p>CVE-2026-4698: JIT miscompilation in the JavaScript Engine:
+	JIT component.</p>
+	<p>CVE-2026-4696: Use-after-free in the Layout: Text and Fonts
+	component.</p>
+	<p>CVE-2026-4694: Incorrect boundary conditions, integer
+	overflow in the Graphics component.</p>
+	<p>CVE-2026-4693: Incorrect boundary conditions in the
+	Audio/Video: Playback component.</p>
+	<p>CVE-2026-4692: Sandbox escape in the Responsive Design Mode
+	component.</p>
+	<p>CVE-2026-4691: Use-after-free in the CSS Parsing and
+	Computation component.</p>
+	<p>CVE-2026-4690: Sandbox escape due to integer overflow in the
+	XPCOM component.</p>
+	<p>CVE-2026-4689: Sandbox escape due to integer overflow in the
+	XPCOM component.</p>
+	<p>CVE-2026-4687: Sandbox escape in the Telemetry component.</p>
+	<p>CVE-2026-4686: Incorrect boundary conditions in the Graphics:
+	Canvas2D component.</p>
+	<p>CVE-2026-4685: Incorrect boundary conditions in the Graphics:
+	Canvas2D component.</p>
+	<p>CVE-2026-4684: Race condition, use-after-free in the
+	Graphics: WebRender component.</p>
+      </body>
+    </description>
+    <references>
+      <cvename>CVE-2026-4721</cvename>
+      <cvename>CVE-2026-4709</cvename>
+      <cvename>CVE-2026-4707</cvename>
+      <cvename>CVE-2026-4706</cvename>
+      <cvename>CVE-2026-4699</cvename>
+      <cvename>CVE-2026-4698</cvename>
+      <cvename>CVE-2026-4696</cvename>
+      <cvename>CVE-2026-4694</cvename>
+      <cvename>CVE-2026-4693</cvename>
+      <cvename>CVE-2026-4692</cvename>
+      <cvename>CVE-2026-4691</cvename>
+      <cvename>CVE-2026-4690</cvename>
+      <cvename>CVE-2026-4689</cvename>
+      <cvename>CVE-2026-4687</cvename>
+      <cvename>CVE-2026-4686</cvename>
+      <cvename>CVE-2026-4685</cvename>
+      <cvename>CVE-2026-4684</cvename>
+    </references>
+    <dates>
+      <discovery>2026-03-24</discovery>
+      <entry>2026-03-26</entry>
+    </dates>
+  </vuln>
+
+  <vuln vid="6d445322-2945-11f1-8461-b42e991fc52e">
+    <topic>Mozilla -- Multiple vulnerabilities</topic>
+    <affects>
+      <package>
+	<name>firefox</name>
+	<range><lt>149.0.0,2</lt></range>
+      </package>
+      <package>
+	<name>thunderbird</name>
+	<range><lt>149.0.0</lt></range>
+      </package>
+    </affects>
+    <description>
+      <body xmlns="http://www.w3.org/1999/xhtml">;
+	<p>CVE-2026-4688: Sandbox escape due to use-after-free in
+	Disability Access APIs.</p>
+	<p>CVE-2026-4695: Incorrect boundary conditions in the
+	Audio/Video: Web Codecs component.</p>
+	<p>CVE-2026-4697: Incorrect boundary conditions in the
+	Audio/Video: Web Codecs component.</p>
+	<p>CVE-2026-4700: Mitigation bypass in the Networking: HTTP
+	component.</p>
+	<p>CVE-2026-4701: Use-after-free in the JavaScript Engine
+	component.</p>
+	<p>CVE-2026-4702: JIT miscompilation in the JavaScript Engine
+	component.</p>
+	<p>CVE-2026-4704: Denial-of-service in the WebRTC: Signaling
+	component.</p>
+	<p>CVE-2026-4705: Undefined behavior in the WebRTC: Signaling
+	component.</p>
+	<p>CVE-2026-4708: Incorrect boundary conditions in the Graphics
+	component.</p>
+	<p>CVE-2026-4710: Incorrect boundary conditions in the
+	Audio/Video component.</p>
+	<p>CVE-2026-4711: Use-after-free in the Widget: Cocoa
+	component.</p>
+	<p>CVE-2026-4712: Information disclosure in the Widget: Cocoa
+	component.</p>
+	<p>CVE-2026-4713: Incorrect boundary conditions in the Graphics
+	component.</p>
+	<p>CVE-2026-4714: Incorrect boundary conditions in the
+	Audio/Video component.</p>
+	<p>CVE-2026-4715: Uninitialized memory in the Graphics: Canvas2D
+	component.</p>
+	<p>CVE-2026-4716: Incorrect boundary conditions and
+	uninitialized memory in the JavaScript Engine.</p>
+	<p>CVE-2026-4717: Privilege escalation in the Netmonitor
+	component.</p>
+	<p>CVE-2026-4718: Undefined behavior in the WebRTC: Signaling
+	component.</p>
+	<p>CVE-2026-4719: Incorrect boundary conditions in the Graphics:
+	Text component.</p>
+	<p>CVE-2026-4720: Memory safety bugs</p>
+      </body>
+    </description>
+    <references>
+      <cvename>CVE-2026-4688</cvename>
+      <cvename>CVE-2026-4695</cvename>
+      <cvename>CVE-2026-4697</cvename>
+      <cvename>CVE-2026-4700</cvename>
+      <cvename>CVE-2026-4701</cvename>
+      <cvename>CVE-2026-4702</cvename>
+      <cvename>CVE-2026-4704</cvename>
+      <cvename>CVE-2026-4705</cvename>
+      <cvename>CVE-2026-4708</cvename>
+      <cvename>CVE-2026-4710</cvename>
+      <cvename>CVE-2026-4711</cvename>
+      <cvename>CVE-2026-4712</cvename>
+      <cvename>CVE-2026-4713</cvename>
+      <cvename>CVE-2026-4714</cvename>
+      <cvename>CVE-2026-4715</cvename>
+      <cvename>CVE-2026-4716</cvename>
+      <cvename>CVE-2026-4717</cvename>
+      <cvename>CVE-2026-4718</cvename>
+      <cvename>CVE-2026-4719</cvename>
+      <cvename>CVE-2026-4720</cvename>
+    </references>
+    <dates>
+      <discovery>2026-03-24</discovery>
       <entry>2026-03-26</entry>
     </dates>
   </vuln>


home | help

Want to link to this message? Use this
URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?69c586a1.1a3e0.36af47ad>