git: b10c38f16596 - main - security/vuxml: Add firefox vulnerability

From: Fernando Apesteguía <fernape_at_FreeBSD.org>
Date: Thu, 30 Oct 2025 17:04:37 UTC
The branch main has been updated by fernape:

URL: https://cgit.FreeBSD.org/ports/commit/?id=b10c38f16596199be7a742fe3496e7ee7ec6751d

commit b10c38f16596199be7a742fe3496e7ee7ec6751d
Author:     Fernando Apesteguía <fernape@FreeBSD.org>
AuthorDate: 2025-10-30 17:04:07 +0000
Commit:     Fernando Apesteguía <fernape@FreeBSD.org>
CommitDate: 2025-10-30 17:04:07 +0000

    security/vuxml: Add firefox vulnerability
    
     * CVE-2025-12380
---
 security/vuxml/vuln/2025.xml | 30 ++++++++++++++++++++++++++++++
 1 file changed, 30 insertions(+)

diff --git a/security/vuxml/vuln/2025.xml b/security/vuxml/vuln/2025.xml
index 7d792f97c5b2..d6bb2730b71e 100644
--- a/security/vuxml/vuln/2025.xml
+++ b/security/vuxml/vuln/2025.xml
@@ -1,3 +1,33 @@
+  <vuln vid="291773e6-b5b2-11f0-8f61-b42e991fc52e">
+    <topic>Firefox -- use-after-free in the GPU or browser process</topic>
+    <affects>
+    <package>
+	<name>firefox</name>
+	<range><lt>144.0.2,2</lt></range>
+    </package>
+    </affects>
+    <description>
+	<body xmlns="http://www.w3.org/1999/xhtml">
+	<p>https://bugzilla.mozilla.org/show_bug.cgi?id=1993113 reports:</p>
+	<blockquote cite="https://bugzilla.mozilla.org/show_bug.cgi?id=1993113">
+	  <p>Starting with Firefox 142, it was possible for a
+	  compromised child process to trigger a use-after-free in the
+	  GPU or browser process using WebGPU-related IPC calls.
+	  This may have been usable to escape the child process
+	  sandbox.</p>
+	</blockquote>
+	</body>
+    </description>
+    <references>
+      <cvename>CVE-2025-12380</cvename>
+      <url>https://cveawg.mitre.org/api/cve/CVE-2025-12380</url>
+    </references>
+    <dates>
+      <discovery>2025-10-28</discovery>
+      <entry>2025-10-30</entry>
+    </dates>
+  </vuln>
+
   <vuln vid="237f4f57-b50f-11f0-ae9b-b42e991fc52e">
     <topic>Erlang - Absolute Path in Zip Module</topic>
     <affects>