From nobody Fri Jul 04 12:26:25 2025 X-Original-To: dev-commits-ports-main@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 4bYXtT6CwQz60vcw; Fri, 04 Jul 2025 12:26:25 +0000 (UTC) (envelope-from git@FreeBSD.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "R10" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4bYXtT3jBWz49S8; Fri, 04 Jul 2025 12:26:25 +0000 (UTC) (envelope-from git@FreeBSD.org) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=freebsd.org; s=dkim; t=1751631985; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding; bh=JMLyzPlSSaXRAJ/y5K5bBfUBZVvzAznS1ny10dngw+8=; b=UKSaREKJInNkkROHA0bKVphdVZ/4p7gQ7NJrfrbPDvy7mjXv2KC+3x2vmxtYjvm4hO9Qlr 0dU05ZWU3KMeEHqyQkr4ewdUJ2StrgzgTborZC/8O8VyiwsrxH/NWoHSlK4wKVTYYfZ1mv I30/yYaUypRPiEJcNyXecf+yN1ojSDUoxQj2Pl2c+cp3bA+YlYSJj5ykVEh5BgFbA7SFdr 6SR+MFFQPUeMMKIXly1dESOFgmJ/DMtA459LeTCpJe7L82bRxEpxHaT2CCAkpcJ+dfivll RY2lGwU4ta8elfEHlDSPjSIQtQPfcAvuO42JComLPYDPVqfL1EvkaMPVrqOTPA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=freebsd.org; s=dkim; t=1751631985; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding; bh=JMLyzPlSSaXRAJ/y5K5bBfUBZVvzAznS1ny10dngw+8=; b=O7BKQ3KEm6ykdpijl/ZYYigFoHQw36EVdr3pH0yIQXug+0F/+9XNMKTvKQ07rhs6Mh5Ij0 sUWCxd6ywFnnQlZ81LPQwdZkhRzYvxdzy+p8HBxMS/P8c6aJ2WfCQdz6QhqSDDP+cxTLfo /6gp/9CThdcyCgvZPpQm3OEhLO2TGTVBdioxSn4rAMfhBgWriMKNzCPgiZqZDJanjnU5uT R08FVjWndqmbeTNzNBT5nk1s0KZVHQJ0sZ11K6Pm9P0GenftPZ6WZCQfWAWNMRfaAAPzW9 7mwqLsT3ICcYr0ANtkqVawB5TzR1OgxqYcAE73iTfUfvZcCSZWqTatDHQ+16NQ== ARC-Authentication-Results: i=1; mx1.freebsd.org; none ARC-Seal: i=1; s=dkim; d=freebsd.org; t=1751631985; a=rsa-sha256; cv=none; b=IaNSYjcs9INOu6V4zNgFv/tm5wIz+rXDypQVZZTr0N7hwnJsAFEKdp6EpvSvH04uU+k0Vj o8gd7QCRIDYIvra0ynRdvizUeydJgoPLumje/qtJUmy+/zQv+PVZ/Vdu2MVRqVFPmXF12T FR2ut4VF/4rwrboI/xV++W6V43uu00R14f1XtJ7ahhYu7NUWj055mcDXqhm0BGk0qUriHa Axxp0eZV8M99tI9Sx5aHUzm5iImUajA6JLt1CwFLGDTyK0iiLBJs7WBXYxqPj838sLuYpy a+618JAjp54DjHLb4690LErmSWtIAzH9+pReeA2sdiylF9yELkL5nzW+J1HbAw== Received: from gitrepo.freebsd.org (gitrepo.freebsd.org [IPv6:2610:1c1:1:6068::e6a:5]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id 4bYXtT2yHBzqks; Fri, 04 Jul 2025 12:26:25 +0000 (UTC) (envelope-from git@FreeBSD.org) Received: from gitrepo.freebsd.org ([127.0.1.44]) by gitrepo.freebsd.org (8.18.1/8.18.1) with ESMTP id 564CQPHZ092361; Fri, 4 Jul 2025 12:26:25 GMT (envelope-from git@gitrepo.freebsd.org) Received: (from git@localhost) by gitrepo.freebsd.org (8.18.1/8.18.1/Submit) id 564CQPbp092358; Fri, 4 Jul 2025 12:26:25 GMT (envelope-from git) Date: Fri, 4 Jul 2025 12:26:25 GMT Message-Id: <202507041226.564CQPbp092358@gitrepo.freebsd.org> To: ports-committers@FreeBSD.org, dev-commits-ports-all@FreeBSD.org, dev-commits-ports-main@FreeBSD.org From: Fernando =?utf-8?Q?Apestegu=C3=ADa?= Subject: git: bd589649ee53 - main - security/vuxml: Add Mozilla vulnerabilities List-Id: Commits to the main branch of the FreeBSD ports repository List-Archive: https://lists.freebsd.org/archives/dev-commits-ports-main List-Help: List-Post: List-Subscribe: List-Unsubscribe: X-BeenThere: dev-commits-ports-main@freebsd.org Sender: owner-dev-commits-ports-main@FreeBSD.org MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: 8bit X-Git-Committer: fernape X-Git-Repository: ports X-Git-Refname: refs/heads/main X-Git-Reftype: branch X-Git-Commit: bd589649ee538403a4e4a5fb7f621b010f3f860b Auto-Submitted: auto-generated The branch main has been updated by fernape: URL: https://cgit.FreeBSD.org/ports/commit/?id=bd589649ee538403a4e4a5fb7f621b010f3f860b commit bd589649ee538403a4e4a5fb7f621b010f3f860b Author: Fernando ApesteguĂ­a AuthorDate: 2025-07-04 12:24:40 +0000 Commit: Fernando ApesteguĂ­a CommitDate: 2025-07-04 12:24:40 +0000 security/vuxml: Add Mozilla vulnerabilities * CVE-2025-6425 * CVE-2025-6427 * CVE-2025-6429 * CVE-2025-6430 * CVE-2025-6432 * CVE-2025-6433 * CVE-2025-6434 * CVE-2025-6435 * CVE-2025-6436 --- security/vuxml/vuln/2025.xml | 143 +++++++++++++++++++++++++++++++++++++++++++ 1 file changed, 143 insertions(+) diff --git a/security/vuxml/vuln/2025.xml b/security/vuxml/vuln/2025.xml index 6bc7dd3de85f..32a7a8a7559a 100644 --- a/security/vuxml/vuln/2025.xml +++ b/security/vuxml/vuln/2025.xml @@ -1,3 +1,146 @@ + + firefox -- multiple vulnerabilities + + + firefox + 140.0,2 + + + + +

security@mozilla.org reports:

+
+

An attacker was able to bypass the `connect-src` + directive of a Content Security Policy by manipulating + subdocuments. This would have also hidden the connections + from the Network tab in Devtools.

+

When Multi-Account Containers was enabled, DNS requests + could have bypassed a SOCKS proxy when the domain name was + invalid or the SOCKS proxy was not responding.

+

If a user visited a webpage with an invalid TLS + certificate, and granted an exception, the webpage was able to + provide a WebAuthn challenge that the user would be prompted + to complete. This is in violation of the WebAuthN spec which + requires "a secure transport established without + errors".

+

The exception page for the HTTPS-Only feature, displayed + when a website is opened via HTTP, lacked an anti-clickjacking + delay, potentially allowing an attacker to trick a user into + granting an exception and loading a webpage over HTTP.

+

If a user saved a response from the Network tab in Devtools + using the Save As context menu option, that file may not have + been saved with the `.download` file extension. + This could have led to the user inadvertently running a + malicious executable.

+

Memory safety bugs present in Firefox 139 and Thunderbird + 139. Some of these bugs showed evidence of memory corruption + and we presume that with enough effort some of these could + have been exploited to run arbitrary code.

+
+ +
+ + CVE-2025-6427 + https://nvd.nist.gov/vuln/detail/CVE-2025-6427 + CVE-2025-6432 + https://nvd.nist.gov/vuln/detail/CVE-2025-6432 + CVE-2025-6433 + https://nvd.nist.gov/vuln/detail/CVE-2025-6433 + CVE-2025-6434 + https://nvd.nist.gov/vuln/detail/CVE-2025-6434 + CVE-2025-6435 + https://nvd.nist.gov/vuln/detail/CVE-2025-6435 + CVE-2025-6436 + https://nvd.nist.gov/vuln/detail/CVE-2025-6436 + + + 2025-06-24 + 2025-07-04 + +
+ + + firefox -- multiple vulnerabilities + + + firefox + 128.12.0,2 + 140.0,2 + + + + +

security@mozilla.org reports:

+
+

Firefox could have incorrectly parsed a URL and rewritten + it to the youtube.com domain when parsing the URL specified + in an `embed` tag. This could have bypassed website security + checks that restricted which domains users were allowed to + embed.

+

When a file download is specified via the + `Content-Disposition` header, that directive would be ignored + if the file was included via a `&lt;embed&gt;` or + `&lt;object&gt;` tag, potentially making a website + vulnerable to a cross-site scripting attack.

+
+ +
+ + CVE-2025-6429 + https://nvd.nist.gov/vuln/detail/CVE-2025-6429 + CVE-2025-6430 + https://nvd.nist.gov/vuln/detail/CVE-2025-6430 + + + 2025-06-24 + 2025-07-04 + +
+ + + Mozilla -- persistent UUID that identifies browser + + + firefox + 140.0,2 + + + firefox-esr + 115.25.0 + 128.12 + + + thunderbird + 140.0 + + + thunderbird + 128.12 + + + + +

security@mozilla.org reports:

+
+

An attacker who enumerated resources from the WebCompat extension + could have obtained a persistent UUID that identified the browser, + and persisted between containers and normal/private browsing mode, + but not profiles. This vulnerability affects Firefox < 140, + Firefox ESR < 115.25, Firefox ESR < 128.12, Thunderbird < + 140, and Thunderbird < 128.12.

+
+ +
+ + CVE-2025-6425 + https://nvd.nist.gov/vuln/detail/CVE-2025-6425 + + + 2025-06-24 + 2025-07-04 + +
+ php -- Multiple vulnerabilities