git: d62ea8c0ed16 - main - security/vuxml: Entries for mozilla products

From: Fernando Apesteguía <fernape_at_FreeBSD.org>
Date: Fri, 07 Feb 2025 16:49:49 UTC
The branch main has been updated by fernape:

URL: https://cgit.FreeBSD.org/ports/commit/?id=d62ea8c0ed16eade163e7af7293829dad0a4dcd2

commit d62ea8c0ed16eade163e7af7293829dad0a4dcd2
Author:     Fernando Apesteguía <fernape@FreeBSD.org>
AuthorDate: 2025-02-07 16:47:56 +0000
Commit:     Fernando Apesteguía <fernape@FreeBSD.org>
CommitDate: 2025-02-07 16:48:21 +0000

    security/vuxml: Entries for mozilla products
    
    CVE-2025-10{09,10,11,12,13,14,15,16,17,18,19,20}
---
 security/vuxml/vuln/2025.xml | 172 +++++++++++++++++++++++++++++++++++++++++++
 1 file changed, 172 insertions(+)

diff --git a/security/vuxml/vuln/2025.xml b/security/vuxml/vuln/2025.xml
index d237a93416e7..1a7462c511a2 100644
--- a/security/vuxml/vuln/2025.xml
+++ b/security/vuxml/vuln/2025.xml
@@ -1,3 +1,175 @@
+  <vuln vid="20485d27-e540-11ef-a845-b42e991fc52e">
+    <topic>mozilla -- multiple vulnerabilities</topic>
+    <affects>
+      <package>
+	<name>firefox</name>
+	<range><lt>135.0.0,2</lt></range>
+      </package>
+      <package>
+	<name>firefox-esr</name>
+	<range><lt>128.7,1</lt></range>
+      </package>
+      <package>
+	<name>thunderbird</name>
+	<range><lt>128.7</lt></range>
+	<range><gt>129</gt><lt>135</lt></range>
+      </package>
+    </affects>
+    <description>
+	<body xmlns="http://www.w3.org/1999/xhtml">
+	<p>security@mozilla.org reports:</p>
+	<blockquote cite="https://bugzilla.mozilla.org/buglist.cgi?bug_id=1926256%2C1935984%2C1935471">
+	<p>A bug in WebAssembly code generation could have lead to a crash.
+	It may have been possible for an attacker to leverage this to achieve
+	code execution.</p>
+	<p>A race condition could have led to private browsing tabs being
+	opened in normal browsing windows.  This could have resulted in a
+	potential privacy leak.</p>
+	<p>Certificate length was not properly checked when added to a certificate
+	store.  In practice only trusted data was processed.</p>
+	<p>Memory safety bugs present in Firefox 134, Thunderbird 134, Firefox
+	ESR 128.6, and Thunderbird 128.6.  Some of these bugs showed evidence
+	of memory corruption and we presume that with enough effort some
+	of these could have been exploited to run arbitrary code.</p>
+	</blockquote>
+	</body>
+    </description>
+    <references>
+      <cvename>CVE-2025-1011</cvename>
+      <url>https://nvd.nist.gov/vuln/detail/CVE-2025-1011</url>
+      <cvename>CVE-2025-1013</cvename>
+      <url>https://nvd.nist.gov/vuln/detail/CVE-2025-1013</url>
+      <cvename>CVE-2025-1014</cvename>
+      <url>https://nvd.nist.gov/vuln/detail/CVE-2025-1014</url>
+      <cvename>CVE-2025-1017</cvename>
+      <url>https://nvd.nist.gov/vuln/detail/CVE-2025-1017</url>
+    </references>
+    <dates>
+      <discovery>2025-02-04</discovery>
+      <entry>2025-02-07</entry>
+    </dates>
+  </vuln>
+
+  <vuln vid="f7ca4ff7-e53f-11ef-a845-b42e991fc52e">
+    <topic>mozilla -- multiple vulnerabilities</topic>
+    <affects>
+      <package>
+	<name>mozilla</name>
+	<range><lt>135.0.0,2</lt></range>
+      </package>
+    </affects>
+    <description>
+	<body xmlns="http://www.w3.org/1999/xhtml">
+	<p>security@mozilla.org reports:</p>
+	<blockquote cite="https://bugzilla.mozilla.org/buglist.cgi?bug_id=1939063%2C1942169">
+	  <p>Memory safety bugs present in Firefox 134 and Thunderbird 134.  Some
+	of these bugs showed evidence of memory corruption and we presume
+	that with enough effort some of these could have been exploited to
+	run arbitrary code.</p>
+	  <p>The fullscreen notification is prematurely hidden when fullscreen
+	is re-requested quickly by the user.  This could have been leveraged
+	to perform a potential spoofing attack.</p>
+	</blockquote>
+	</body>
+    </description>
+    <references>
+      <cvename>CVE-2025-1018</cvename>
+      <url>https://nvd.nist.gov/vuln/detail/CVE-2025-1018</url>
+      <cvename>CVE-2025-1019</cvename>
+      <url>https://nvd.nist.gov/vuln/detail/CVE-2025-1019</url>
+      <cvename>CVE-2025-1020</cvename>
+      <url>https://nvd.nist.gov/vuln/detail/CVE-2025-1020</url>
+    </references>
+    <dates>
+      <discovery>2025-02-04</discovery>
+      <entry>2025-02-07</entry>
+    </dates>
+  </vuln>
+
+  <vuln vid="e54a1413-e539-11ef-a845-b42e991fc52e">
+    <topic>mozilla -- multiple vulnerabilities</topic>
+    <affects>
+      <package>
+	<name>firefox</name>
+	<range><lt>135.0.0,2</lt></range>
+      </package>
+      <package>
+	<name>firefox-esr</name>
+	<range><lt>115.20,1</lt></range>
+	<range><gt>116.0,1</gt><lt>128.6,1</lt></range>
+      </package>
+      <package>
+	<name>thunderbird</name>
+	<range><lt>128.7</lt></range>
+	<range><gt>129</gt><lt>135</lt></range>
+      </package>
+    </affects>
+    <description>
+	<body xmlns="http://www.w3.org/1999/xhtml">
+	<p>security@mozilla.org reports:</p>
+	<blockquote cite="https://bugzilla.mozilla.org/buglist.cgi?bug_id=1936601%2C1936844%2C1937694%2C1938469%2C1939583%2C1940994">
+	<p>An attacker could have caused a use-after-free via crafted XSLT
+	data, leading to a potentially exploitable crash.</p>
+	<p>An attacker could have caused a use-after-free via the Custom
+	Highlight API, leading to a potentially exploitable crash.</p>
+	<p>A race during concurrent delazification could have led to a
+	use-after-free.</p>
+	<p>Memory safety bugs present in Firefox 134, Thunderbird 134, Firefox
+	ESR 115.19, Firefox ESR 128.6, Thunderbird 115.19, and Thunderbird
+	128.6.  Some of these bugs showed evidence of memory corruption and
+	we presume that with enough effort some of these could have been
+	exploited to run arbitrary code.</p>
+	</blockquote>
+	</body>
+    </description>
+    <references>
+      <cvename>CVE-2025-1009</cvename>
+      <url>https://nvd.nist.gov/vuln/detail/CVE-2025-1009</url>
+      <cvename>CVE-2025-1010</cvename>
+      <url>https://nvd.nist.gov/vuln/detail/CVE-2025-1010</url>
+      <cvename>CVE-2025-1012</cvename>
+      <url>https://nvd.nist.gov/vuln/detail/CVE-2025-1012</url>
+      <cvename>CVE-2025-1016</cvename>
+      <url>https://nvd.nist.gov/vuln/detail/CVE-2025-1016</url>
+    </references>
+    <dates>
+      <discovery>2025-02-04</discovery>
+      <entry>2025-02-07</entry>
+    </dates>
+  </vuln>
+
+  <vuln vid="830381c7-e539-11ef-a845-b42e991fc52e">
+    <topic>Thundirbird -- unprivileged JavaScript code execution</topic>
+    <affects>
+      <package>
+	<name>mozilla</name>
+	<range><lt>128.7,1</lt></range>
+      </package>
+    </affects>
+    <description>
+	<body xmlns="http://www.w3.org/1999/xhtml">
+	<p>security@mozilla.org reports:</p>
+	<blockquote cite="https://bugzilla.mozilla.org/show_bug.cgi?id=1939458">
+	  <p>The Thunderbird Address Book URI fields contained unsanitized links.
+	This could be used by an attacker to create and export an address
+	book containing a malicious payload in a field.  For example, in
+	the Other field of the Instant Messaging section.  If another user
+	imported the address book, clicking on the link could result in
+	opening a web page inside Thunderbird, and that page could execute
+	(unprivileged) JavaScript.</p>
+	</blockquote>
+	</body>
+    </description>
+    <references>
+      <cvename>CVE-2025-1015</cvename>
+      <url>https://nvd.nist.gov/vuln/detail/CVE-2025-1015</url>
+    </references>
+    <dates>
+      <discovery>2025-02-04</discovery>
+      <entry>2025-02-07</entry>
+    </dates>
+  </vuln>
+
   <vuln vid="7bcfca95-e563-11ef-873e-8447094a420f">
     <topic>MariaDB -- DoS vulnerability in InnoDB</topic>
     <affects>