[Git][security-tracker-team/security-tracker][master] Track firefox issues fixed via unstable (for mfsa2025-51)

Salvatore Bonaccorso (@carnil) carnil at debian.org
Wed Jun 25 07:11:15 BST 2025



Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker


Commits:
64d2554f by Salvatore Bonaccorso at 2025-06-25T08:10:32+02:00
Track firefox issues fixed via unstable (for mfsa2025-51)

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -200,30 +200,30 @@ CVE-2024-56916 (In Netbox Community 4.1.7, once authenticated, Configuration His
 CVE-2024-37743 (An issue in mmzdev KnowledgeGPT V.0.0.5 allows a remote attacker to ex ...)
 	TODO: check
 CVE-2025-6436 (Memory safety bugs present in Firefox 139 and Thunderbird 139. Some of ...)
-	- firefox <unfixed>
+	- firefox 140.0-1
 	NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2025-51/#CVE-2025-6436
 CVE-2025-6435 (If a user saved a response from the Network tab in Devtools using the  ...)
-	- firefox <unfixed>
+	- firefox 140.0-1
 	NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2025-51/#CVE-2025-6435
 CVE-2025-6434 (The exception page for the HTTPS-Only feature, displayed when a websit ...)
-	- firefox <unfixed>
+	- firefox 140.0-1
 	NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2025-51/#CVE-2025-6434
 CVE-2025-6433 (If a user visited a webpage with an invalid TLS certificate, and grant ...)
-	- firefox <unfixed>
+	- firefox 140.0-1
 	NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2025-51/#CVE-2025-6433
 CVE-2025-6432 (When Multi-Account Containers was enabled, DNS requests could have byp ...)
-	- firefox <unfixed>
+	- firefox 140.0-1
 	NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2025-51/#CVE-2025-6432
 CVE-2025-6431 (When a link can be opened in an external application, Firefox for Andr ...)
 	- firefox <not-affected> (Android-specific)
 	NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2025-51/#CVE-2025-6431
 CVE-2025-6430 (When a file download is specified via the `Content-Disposition` header ...)
-	- firefox <unfixed>
+	- firefox 140.0-1
 	- firefox-esr <unfixed>
 	NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2025-51/#CVE-2025-6430
 	NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2025-53/#CVE-2025-6430
 CVE-2025-6429 (Firefox could have incorrectly parsed a URL and rewritten it to the yo ...)
-	- firefox <unfixed>
+	- firefox 140.0-1
 	- firefox-esr <unfixed>
 	NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2025-51/#CVE-2025-6429
 	NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2025-53/#CVE-2025-6429
@@ -231,7 +231,7 @@ CVE-2025-6428 (When a URL was provided in a link querystring parameter, Firefox
 	- firefox <not-affected> (Android-specific)
 	NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2025-51/#CVE-2025-6428
 CVE-2025-6427 (An attacker was able to bypass the `connect-src` directive of a Conten ...)
-	- firefox <unfixed>
+	- firefox 140.0-1
 	NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2025-51/#CVE-2025-6427
 CVE-2025-6426 (The executable file warning did not warn users before opening files wi ...)
 	- firefox <not-affected> (MacOS-specific)
@@ -239,12 +239,12 @@ CVE-2025-6426 (The executable file warning did not warn users before opening fil
 	NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2025-51/#CVE-2025-6426
 	NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2025-53/#CVE-2025-6426
 CVE-2025-6425 (An attacker who enumerated resources from the WebCompat extension coul ...)
-	- firefox <unfixed>
+	- firefox 140.0-1
 	- firefox-esr <unfixed>
 	NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2025-51/#CVE-2025-6425
 	NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2025-53/#CVE-2025-6425
 CVE-2025-6424 (A use-after-free in FontFaceSet resulted in a potentially exploitable  ...)
-	- firefox <unfixed>
+	- firefox 140.0-1
 	- firefox-esr <unfixed>
 	NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2025-51/#CVE-2025-6424
 	NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2025-53/#CVE-2025-6424



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/64d2554f6ed8dd4a4b101f1c3e14670ae4c71e2e

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/64d2554f6ed8dd4a4b101f1c3e14670ae4c71e2e
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20250625/3908254d/attachment.htm>


More information about the debian-security-tracker-commits mailing list