From nobody Fri Apr 04 16:44:32 2025 X-Original-To: dev-commits-ports-main@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 4ZTkwK18w4z5s41T; Fri, 04 Apr 2025 16:44:33 +0000 (UTC) (envelope-from git@FreeBSD.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "R10" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4ZTkwJ6g1hz3HT8; Fri, 04 Apr 2025 16:44:32 +0000 (UTC) (envelope-from git@FreeBSD.org) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=freebsd.org; s=dkim; t=1743785072; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding; bh=xwjpPW7RQ/HQ6DWfB+v8+Hy3prwne8lSWZGsen0g5as=; b=MgUvwfbz4spHwGLtaTAJey4+9nDbuULtTBYezVLBiWPrrVw7MuAxOqPi25iXkrfgtEFxKI fVUQaiOyG8ufXyOiUiakKokvkPRq4qI/lpBaRAH4x3xlOuBPVfZ8r7FgNujKJrDsYjgDbp rs/rRs3yKtelnjwFpOXpEKyI5Sc9bdNmWOdN/Ckc5R59XEgwc8uh5xKU18sHHb8y2qJK5Y j2mr34eqHL1gEST/U/v1TiSr8mR2lk+RCjVDJ/Q2QcSqVyE3LxJwgCG24mEBfEnEJnzgIp tQqbEtYZckEfRzIbBYbTiY1cR8wsRYpaB15rGYwCfY6Z6nIuPToZGRXO5+7HvA== ARC-Seal: i=1; s=dkim; d=freebsd.org; t=1743785072; a=rsa-sha256; cv=none; b=cwQjgWWq5U5vlIXliNOzuTueMmI8mjERtpevdkn7PoU99tClwp3uItHJcFg2soUVH4UoNA SwhKLELHQoZtVAXC5+SmYbRu7Vdl9bHG/OvA3PbsQnP+qC7dfZ0O5ncJcSG2SP1pxTGH1F fiG/2jvXYNapgaZCLHv8obK5fLZTucrOP5owKtjugwAxz3ernzQ+ImIOr9HLca3CetVBLf r13BlVjCYkSzkoOtZpjw+8vMCvBLY3J9knEupOEdu2xnVmgKB4htxvweQNfgMBgSuH4N7C TNcmMJU4j0HUnPCj2tBAyqMHMsDo1Ucyhu1MR3qDon0Nb7fBGOgYwuKYPFdwGw== ARC-Authentication-Results: i=1; mx1.freebsd.org; none ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=freebsd.org; s=dkim; t=1743785072; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding; bh=xwjpPW7RQ/HQ6DWfB+v8+Hy3prwne8lSWZGsen0g5as=; b=XUwCCSiQIpz4OA2Va/OcHsTqqaeuIkECSD5r5Z0UURKld7HdeZgCKvlIzCP1PyxTX1Z3sT 4czev0uh7MvQu9dD4jBik9uAMzwayFtJz3R1Tqnr5JIQEhIvFvASppBKN2EnCGWpbE+MZw AxFHr7vwszDJlKLBHrgrvMiKHrF29GYkZLzM364MBcjJGB1gyBO7mcLvBUEU/6P4Jqp7bf ggxePpRkonBp60OE2GKt4MmpuEkTd4r3pB+h1EjduxOwR1RoxslDQYLFeweXOOnk/emOST 5Cwr9uD7V6yMVWMWYt0xo8kgN3rB3LKEM4y6nluopcbSOIr9XIEzisTeODGaIQ== Received: from gitrepo.freebsd.org (gitrepo.freebsd.org [IPv6:2610:1c1:1:6068::e6a:5]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id 4ZTkwJ5qQYzv6b; Fri, 04 Apr 2025 16:44:32 +0000 (UTC) (envelope-from git@FreeBSD.org) Received: from gitrepo.freebsd.org ([127.0.1.44]) by gitrepo.freebsd.org (8.18.1/8.18.1) with ESMTP id 534GiW8h012663; Fri, 4 Apr 2025 16:44:32 GMT (envelope-from git@gitrepo.freebsd.org) Received: (from git@localhost) by gitrepo.freebsd.org (8.18.1/8.18.1/Submit) id 534GiWpZ012660; Fri, 4 Apr 2025 16:44:32 GMT (envelope-from git) Date: Fri, 4 Apr 2025 16:44:32 GMT Message-Id: <202504041644.534GiWpZ012660@gitrepo.freebsd.org> To: ports-committers@FreeBSD.org, dev-commits-ports-all@FreeBSD.org, dev-commits-ports-main@FreeBSD.org From: Fernando =?utf-8?Q?Apestegu=C3=ADa?= Subject: git: 9d1c1d171ea4 - main - security/vuxml: Mozilla vulnerabilities List-Id: Commits to the main branch of the FreeBSD ports repository List-Archive: https://lists.freebsd.org/archives/dev-commits-ports-main List-Help: List-Post: List-Subscribe: List-Unsubscribe: X-BeenThere: dev-commits-ports-main@freebsd.org Sender: owner-dev-commits-ports-main@FreeBSD.org MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: 8bit X-Git-Committer: fernape X-Git-Repository: ports X-Git-Refname: refs/heads/main X-Git-Reftype: branch X-Git-Commit: 9d1c1d171ea405a31b6a99bed4528d37fdf41d54 Auto-Submitted: auto-generated The branch main has been updated by fernape: URL: https://cgit.FreeBSD.org/ports/commit/?id=9d1c1d171ea405a31b6a99bed4528d37fdf41d54 commit 9d1c1d171ea405a31b6a99bed4528d37fdf41d54 Author: Fernando ApesteguĂ­a AuthorDate: 2025-04-04 16:43:19 +0000 Commit: Fernando ApesteguĂ­a CommitDate: 2025-04-04 16:43:19 +0000 security/vuxml: Mozilla vulnerabilities * CVE-2025-0237 * CVE-2025-0238 * CVE-2025-0239 * CVE-2025-0240 * CVE-2025-0241 * CVE-2025-0242 * CVE-2025-0243 * CVE-2025-0245 * CVE-2025-0247 --- security/vuxml/vuln/2025.xml | 355 +++++++++++++++++++++++++++++++++++++++++++ 1 file changed, 355 insertions(+) diff --git a/security/vuxml/vuln/2025.xml b/security/vuxml/vuln/2025.xml index 33028e0c457c..8369eb830611 100644 --- a/security/vuxml/vuln/2025.xml +++ b/security/vuxml/vuln/2025.xml @@ -1,3 +1,358 @@ + + Mozilla -- Memory corruption bug + + + firefox + 134.0,2 + + + librewolf + 134.0 + + + firefox-esr + 128.6.0 + + + thunderbird + 134.0 + + + + +

security@mozilla.org reports:

+
+

Memory safety bugs present in Firefox 133, Thunderbird 133, + Firefox ESR 128.5, and Thunderbird 128.5. Some of these + bugs showed evidence of memory corruption and we presume + that with enough effort some of these could have been + exploited to run arbitrary code.

+
+ +
+ + CVE-2025-0243 + https://nvd.nist.gov/vuln/detail/CVE-2025-0243 + + + 2025-01-07 + 2025-04-04 + +
+ + + Mozilla -- Memory safety bugs + + + firefox + 134.0,2 + + + librewolf + 134.0 + + + thunderbird + 134.0 + + + + +

security@mozilla.org reports:

+
+

Memory safety bugs present in Firefox 133 and Thunderbird 133. + Some of these bugs showed evidence of memory corruption and + we presume that with enough effort some of these could have + been exploited to run arbitrary code.

+
+ +
+ + CVE-2025-0247 + https://nvd.nist.gov/vuln/detail/CVE-2025-0247 + + + 2025-01-07 + 2025-04-04 + +
+ + + firefox -- authentication bypass + + + firefox + 134.0,2 + + + librewolf + 134.0,2 + + + + +

security@mozilla.org reports:

+
+

Under certain circumstances, a user opt-in setting that + Focus should require authentication before use could have + been be bypassed.

+
+ +
+ + CVE-2025-0245 + https://nvd.nist.gov/vuln/detail/CVE-2025-0245 + + + 2025-01-07 + 2025-04-04 + +
+ + + Mozilla -- Memory safety bugs + + + firefox + 134.0,2 + + + librewolf + 134.0 + + + firefox-esr + 115.19 + + + thunderbird + 134.0 + + + + +

security@mozilla.org reports:

+
+

Memory safety bugs present in Firefox 133, Thunderbird 133, + Firefox ESR 115.18, Firefox ESR 128.5, Thunderbird 115.18, + and Thunderbird 128.5. Some of these bugs showed evidence + of memory corruption and we presume that with enough effort + some of these could have been exploited to run arbitrary + code.

+
+ +
+ + CVE-2025-0242 + https://nvd.nist.gov/vuln/detail/CVE-2025-0242 + + + 2025-01-07 + 2025-04-04 + +
+ + + Mozilla -- DoS via segmentation fault + + + firefox + 134.0,2 + + + librewolf + 134.0 + + + firefox-esr + 128.6.0 + + + thunderbird + 134.0 + + + + +

security@mozilla.org reports:

+
+

When segmenting specially crafted text, segmentation + would corrupt memory leading to a potentially exploitable + crash.

+
+ +
+ + CVE-2025-0241 + https://nvd.nist.gov/vuln/detail/CVE-2025-0241 + + + 2025-01-07 + 2025-04-04 + +
+ + + Mozilla -- use-after-free while parsing JSON + + + firefox + 134.0,2 + + + librewolf + 134.0 + + + firefox-esr + 128.6.0 + + + thunderbird + 134.0 + + + + +

security@mozilla.org reports:

+
+

Parsing a JavaScript module as JSON could, under some + circumstances, cause cross-compartment access, which may + result in a use-after-free.

+
+ +
+ + CVE-2025-0240 + https://nvd.nist.gov/vuln/detail/CVE-2025-0240 + + + 2025-01-07 + 2025-04-04 + +
+ + + Mozilla -- redirection to insecure site + + + firefox + 134.0,2 + + + librewolf + 134.0 + + + firefox-esr + 128.6.0 + + + thunderbird + 134.0 + + + + +

security@mozilla.org reports:

+
+

When using Alt-Svc, ALPN did not properly validate + certificates when the original server is redirecting to an + insecure site.

+
+ +
+ + CVE-2025-0239 + https://nvd.nist.gov/vuln/detail/CVE-2025-0239 + + + 2025-01-07 + 2025-04-04 + +
+ + + Mozilla -- use-after-free after failed memory allocation + + + firefox + 134.0,2 + + + librewolf + 134.0 + + + firefox-esr + 128.6.0 + + + thunderbird + 128.6 + + + + +

security@mozilla.org reports:

+
+

Assuming a controlled failed memory allocation, an + attacker could have caused a use-after-free, leading to a + potentially exploitable crash.

+
+ +
+ + CVE-2025-0238 + https://nvd.nist.gov/vuln/detail/CVE-2025-0238 + + + 2025-01-07 + 2025-04-04 + +
+ + + Mozilla -- privilege scalation attack + + + firefox + 134.0,2 + + + librewolf + 134.0 + + + firefox-esr + 128.6.0 + + + thunderbird + 128.6 + + + + +

security@mozilla.org reports:

+
+

The WebChannel API, which is used to transport various + information across processes, did not check the sending + principal but rather accepted the principal being sent. + This could have led to privilege escalation attacks.

+
+ +
+ + CVE-2025-0237 + https://nvd.nist.gov/vuln/detail/CVE-2025-0237 + + + 2025-01-07 + 2025-04-04 + +
+ mozilla -- memory corruption