[Git][security-tracker-team/security-tracker][master] Track fixed version for thunderbird issues fixed via unstable
Salvatore Bonaccorso (@carnil)
carnil at debian.org
Thu May 29 19:28:30 BST 2025
Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker
Commits:
3d0fcd5d by Salvatore Bonaccorso at 2025-05-29T20:27:52+02:00
Track fixed version for thunderbird issues fixed via unstable
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -263,7 +263,7 @@ CVE-2025-5283 (Use after free in libvpx in Google Chrome prior to 137.0.7151.55
[bullseye] - chromium <end-of-life> (see #1061268)
- firefox 139.0-1
- firefox-esr 128.11.0esr-1
- - thunderbird <unfixed>
+ - thunderbird 1:128.11.0esr-1
- libvpx 1.15.0-2.1 (bug #1106689)
NOTE: Fixed by: https://chromium.googlesource.com/webm/libvpx/+/1c758781c428c0e895645b95b8ff1512b6bdcecb
NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2025-42/#CVE-2025-5283
@@ -357,14 +357,14 @@ CVE-2025-5272 (Memory safety bugs present in Firefox 138 and Thunderbird 138. So
CVE-2025-5269 (Memory safety bug present in Firefox ESR 128.10, and Thunderbird 128.1 ...)
{DSA-5926-1}
- firefox-esr 128.11.0esr-1
- - thunderbird <unfixed>
+ - thunderbird 1:128.11.0esr-1
NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2025-44/#CVE-2025-5269
NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2025-46/#CVE-2025-5269
CVE-2025-5268 (Memory safety bugs present in Firefox 138, Thunderbird 138, Firefox ES ...)
{DSA-5926-1}
- firefox 139.0-1
- firefox-esr 128.11.0esr-1
- - thunderbird <unfixed>
+ - thunderbird 1:128.11.0esr-1
NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2025-42/#CVE-2025-5268
NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2025-44/#CVE-2025-5268
NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2025-46/#CVE-2025-5268
@@ -372,7 +372,7 @@ CVE-2025-5267 (A clickjacking vulnerability could have been used to trick a user
{DSA-5926-1}
- firefox 139.0-1
- firefox-esr 128.11.0esr-1
- - thunderbird <unfixed>
+ - thunderbird 1:128.11.0esr-1
NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2025-42/#CVE-2025-5267
NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2025-44/#CVE-2025-5267
NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2025-46/#CVE-2025-5267
@@ -386,7 +386,7 @@ CVE-2025-5266 (Script elements loading cross-origin resources generated load and
{DSA-5926-1}
- firefox 139.0-1
- firefox-esr 128.11.0esr-1
- - thunderbird <unfixed>
+ - thunderbird 1:128.11.0esr-1
NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2025-42/#CVE-2025-5266
NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2025-44/#CVE-2025-5266
NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2025-46/#CVE-2025-5266
@@ -401,7 +401,7 @@ CVE-2025-5264 (Due to insufficient escaping of the newline character in the \u20
{DSA-5926-1}
- firefox 139.0-1
- firefox-esr 128.11.0esr-1
- - thunderbird <unfixed>
+ - thunderbird 1:128.11.0esr-1
NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2025-42/#CVE-2025-5264
NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2025-44/#CVE-2025-5264
NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2025-46/#CVE-2025-5264
@@ -409,7 +409,7 @@ CVE-2025-5263 (Error handling for script execution was incorrectly isolated from
{DSA-5926-1}
- firefox 139.0-1
- firefox-esr 128.11.0esr-1
- - thunderbird <unfixed>
+ - thunderbird 1:128.11.0esr-1
NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2025-42/#CVE-2025-5263
NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2025-44/#CVE-2025-5263
NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2025-46/#CVE-2025-5263
@@ -2891,7 +2891,7 @@ CVE-2025-4919 (An attacker was able to perform an out-of-bounds read or write on
{DSA-5922-1 DLA-4172-1}
- firefox 138.0.4-1
- firefox-esr 128.10.1esr-1
- - thunderbird <unfixed>
+ - thunderbird 1:128.11.0esr-1
[bookworm] - thunderbird <no-dsa> (Minor issue; wait for june release)
[bullseye] - thunderbird <postponed> (Minor issue; follow bookworm)
NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2025-36/#CVE-2025-4919
@@ -2902,7 +2902,7 @@ CVE-2025-4918 (An attacker was able to perform an out-of-bounds read or write on
{DSA-5922-1 DLA-4172-1}
- firefox 138.0.4-1
- firefox-esr 128.10.1esr-1
- - thunderbird <unfixed>
+ - thunderbird 1:128.11.0esr-1
[bookworm] - thunderbird <no-dsa> (Minor issue; wait for june release)
[bullseye] - thunderbird <postponed> (Minor issue; follow bookworm)
NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2025-36/#CVE-2025-4918
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/3d0fcd5d8ca26c5e3d432c07eb6fd81db68b9560
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/3d0fcd5d8ca26c5e3d432c07eb6fd81db68b9560
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20250529/0a8219f0/attachment.htm>
More information about the debian-security-tracker-commits
mailing list