[Git][security-tracker-team/security-tracker][master] Track fixed version for firefox-esr issues via unstable

Salvatore Bonaccorso (@carnil) carnil at debian.org
Wed Mar 20 06:19:09 GMT 2024



Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker


Commits:
893b2831 by Salvatore Bonaccorso at 2024-03-20T07:18:30+01:00
Track fixed version for firefox-esr issues via unstable

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -171,7 +171,7 @@ CVE-2024-27439 (An error in the evaluation of the fetch metadata headers could a
 CVE-2024-24683 (Improper Input Validation vulnerability in Apache Hop Engine.This issu ...)
 	NOT-FOR-US: Apache Hop Engine
 CVE-2024-2616 (To harden ICU against exploitation, the behavior for out-of-memory con ...)
-	- firefox-esr <unfixed>
+	- firefox-esr 115.9.0esr-1
 	- thunderbird 1:115.9.0-1
 	NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2024-13/#CVE-2024-2616
 	NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2024-14/#CVE-2024-2616
@@ -180,7 +180,7 @@ CVE-2024-2615 (Memory safety bugs present in Firefox 123. Some of these bugs sho
 	NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2024-12/#CVE-2024-2615
 CVE-2024-2614 (Memory safety bugs present in Firefox 123, Firefox ESR 115.8, and Thun ...)
 	- firefox 124.0-1
-	- firefox-esr <unfixed>
+	- firefox-esr 115.9.0esr-1
 	- thunderbird 1:115.9.0-1
 	NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2024-12/#CVE-2024-2614
 	NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2024-13/#CVE-2024-2614
@@ -190,21 +190,21 @@ CVE-2024-2613 (Data was not properly sanitized when decoding a QUIC ACK frame; t
 	NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2024-12/#CVE-2024-2613
 CVE-2024-2612 (If an attacker could find a way to trigger a particular code path in ` ...)
 	- firefox 124.0-1
-	- firefox-esr <unfixed>
+	- firefox-esr 115.9.0esr-1
 	- thunderbird 1:115.9.0-1
 	NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2024-12/#CVE-2024-2612
 	NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2024-13/#CVE-2024-2612
 	NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2024-14/#CVE-2024-2612
 CVE-2024-2611 (A missing delay on when pointer lock was used could have allowed a mal ...)
 	- firefox 124.0-1
-	- firefox-esr <unfixed>
+	- firefox-esr 115.9.0esr-1
 	- thunderbird 1:115.9.0-1
 	NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2024-12/#CVE-2024-2611
 	NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2024-13/#CVE-2024-2611
 	NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2024-14/#CVE-2024-2611
 CVE-2024-2610 (Using a markup injection an attacker could have stolen nonce values. T ...)
 	- firefox 124.0-1
-	- firefox-esr <unfixed>
+	- firefox-esr 115.9.0esr-1
 	- thunderbird 1:115.9.0-1
 	NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2024-12/#CVE-2024-2610
 	NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2024-13/#CVE-2024-2610
@@ -214,14 +214,14 @@ CVE-2024-2609 (The permission prompt input delay could have expired while the wi
 	NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2024-12/#CVE-2024-2609
 CVE-2024-2608 (`AppendEncodedAttributeValue(), ExtraSpaceNeededForAttrEncoding()` and ...)
 	- firefox 124.0-1
-	- firefox-esr <unfixed>
+	- firefox-esr 115.9.0esr-1
 	- thunderbird 1:115.9.0-1
 	NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2024-12/#CVE-2024-2608
 	NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2024-13/#CVE-2024-2608
 	NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2024-14/#CVE-2024-2608
 CVE-2024-2607 (Return registers were overwritten which could have allowed an attacker ...)
 	- firefox 124.0-1
-	- firefox-esr <unfixed>
+	- firefox-esr 115.9.0esr-1
 	- thunderbird 1:115.9.0-1
 	NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2024-12/#CVE-2024-2607
 	NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2024-13/#CVE-2024-2607
@@ -13344,7 +13344,7 @@ CVE-2024-0744 (In some circumstances, JIT compiled code could have dereferenced
 CVE-2024-0743 (An unchecked return value in TLS handshake code could have caused a po ...)
 	{DLA-3757-1}
 	- firefox 122.0-1
-	- firefox-esr <unfixed>
+	- firefox-esr 115.9.0esr-1
 	- nss 2:3.96.1-1
 	- thunderbird 1:115.9.0-1
 	NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2024-01/#CVE-2024-0743
@@ -30075,7 +30075,7 @@ CVE-2023-39333
 CVE-2023-5388 (NSS was susceptible to a timing side-channel attack when performing RS ...)
 	{DLA-3757-1}
 	- firefox 124.0-1
-	- firefox-esr <unfixed>
+	- firefox-esr 115.9.0esr-1
 	- nss 2:3.98-1 (bug #1056284)
 	[bookworm] - nss <no-dsa> (Minor issue)
 	[bullseye] - nss <no-dsa> (Minor issue)



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/893b283135a3b801dc26b6fa5fe23c92c80191c6

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/893b283135a3b801dc26b6fa5fe23c92c80191c6
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20240320/961d3e25/attachment.htm>


More information about the debian-security-tracker-commits mailing list