[Git][security-tracker-team/security-tracker][master] Track fixed version for thunderbird issues via unstable

Salvatore Bonaccorso (@carnil) carnil at debian.org
Sat Oct 5 20:51:31 BST 2024



Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker


Commits:
d23f6228 by Salvatore Bonaccorso at 2024-10-05T21:50:53+02:00
Track fixed version for thunderbird issues via unstable

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -696,40 +696,40 @@ CVE-2024-9403 (Memory safety bugs present in Firefox 130. Some of these bugs sho
 	NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2024-46/#CVE-2024-9403
 CVE-2024-9402 (Memory safety bugs present in Firefox 130, Firefox ESR 128.2, and Thun ...)
 	- firefox 131.0-1
-	- thunderbird <unfixed>
+	- thunderbird 1:128.3.0esr-1
 	NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2024-46/#CVE-2024-9402
 	NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2024-49/#CVE-2024-9402
 CVE-2024-9401 (Memory safety bugs present in Firefox 130, Firefox ESR 115.15, Firefox ...)
 	{DSA-5783-1}
 	- firefox 131.0-1
 	- firefox-esr 128.3.0esr-1
-	- thunderbird <unfixed>
+	- thunderbird 1:128.3.0esr-1
 	NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2024-46/#CVE-2024-9401
 	NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2024-48/#CVE-2024-9401
 	NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2024-49/#CVE-2024-9401
 CVE-2024-9400 (A potential memory corruption vulnerability could be triggered if an a ...)
 	- firefox 131.0-1
-	- thunderbird <unfixed>
+	- thunderbird 1:128.3.0esr-1
 	NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2024-46/#CVE-2024-9400
 	NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2024-49/#CVE-2024-9400
 CVE-2024-9399 (A website configured to initiate a specially crafted WebTransport sess ...)
 	- firefox 131.0-1
-	- thunderbird <unfixed>
+	- thunderbird 1:128.3.0esr-1
 	NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2024-46/#CVE-2024-9399
 	NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2024-49/#CVE-2024-9399
 CVE-2024-9398 (By checking the result of calls to `window.open` with specifically set ...)
 	- firefox 131.0-1
-	- thunderbird <unfixed>
+	- thunderbird 1:128.3.0esr-1
 	NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2024-46/#CVE-2024-9398
 	NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2024-49/#CVE-2024-9398
 CVE-2024-9397 (A missing delay in directory upload UI could have made it possible for ...)
 	- firefox 131.0-1
-	- thunderbird <unfixed>
+	- thunderbird 1:128.3.0esr-1
 	NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2024-46/#CVE-2024-9397
 	NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2024-49/#CVE-2024-9397
 CVE-2024-9396 (It is currently unknown if this issue is exploitable but a condition m ...)
 	- firefox 131.0-1
-	- thunderbird <unfixed>
+	- thunderbird 1:128.3.0esr-1
 	NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2024-46/#CVE-2024-9396
 	NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2024-49/#CVE-2024-9396
 CVE-2024-9395 (A specially crafted filename containing a large number of spaces could ...)
@@ -739,7 +739,7 @@ CVE-2024-9394 (An attacker could, via a specially crafted multipart response, ex
 	{DSA-5783-1}
 	- firefox 131.0-1
 	- firefox-esr 128.3.0esr-1
-	- thunderbird <unfixed>
+	- thunderbird 1:128.3.0esr-1
 	NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2024-46/#CVE-2024-9394
 	NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2024-48/#CVE-2024-9394
 	NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2024-49/#CVE-2024-9394
@@ -747,7 +747,7 @@ CVE-2024-9393 (An attacker could, via a specially crafted multipart response, ex
 	{DSA-5783-1}
 	- firefox 131.0-1
 	- firefox-esr 128.3.0esr-1
-	- thunderbird <unfixed>
+	- thunderbird 1:128.3.0esr-1
 	NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2024-46/#CVE-2024-9393
 	NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2024-48/#CVE-2024-9393
 	NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2024-49/#CVE-2024-9393
@@ -755,7 +755,7 @@ CVE-2024-9392 (A compromised content process could have allowed for the arbitrar
 	{DSA-5783-1}
 	- firefox 131.0-1
 	- firefox-esr 128.3.0esr-1
-	- thunderbird <unfixed>
+	- thunderbird 1:128.3.0esr-1
 	NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2024-46/#CVE-2024-9392
 	NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2024-48/#CVE-2024-9392
 	NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2024-49/#CVE-2024-9392
@@ -3355,7 +3355,7 @@ CVE-2024-8939 (A vulnerability was found in the ilab model serve component, wher
 	NOT-FOR-US: RHEL AI
 CVE-2024-8900 (An attacker could write data to the user's clipboard, bypassing the us ...)
 	- firefox 129.0-1
-	- thunderbird <unfixed>
+	- thunderbird 1:128.3.0esr-1
 	NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2024-33/#CVE-2024-8900
 	NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2024-49/#CVE-2024-8900
 CVE-2024-8897 (Under certain conditions, an attacker with the ability to redirect use ...)



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/d23f6228f9efebe6661f1f6fe96c525eb2b9cfbf

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/d23f6228f9efebe6661f1f6fe96c525eb2b9cfbf
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20241005/b61d2fa9/attachment.htm>


More information about the debian-security-tracker-commits mailing list