[Git][security-tracker-team/security-tracker][master] Track fixed version for thunderbird issues fixed via unstable

Salvatore Bonaccorso (@carnil) carnil at debian.org
Thu May 29 19:28:30 BST 2025



Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker


Commits:
3d0fcd5d by Salvatore Bonaccorso at 2025-05-29T20:27:52+02:00
Track fixed version for thunderbird issues fixed via unstable

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -263,7 +263,7 @@ CVE-2025-5283 (Use after free in libvpx in Google Chrome prior to 137.0.7151.55
 	[bullseye] - chromium <end-of-life> (see #1061268)
 	- firefox 139.0-1
 	- firefox-esr 128.11.0esr-1
-	- thunderbird <unfixed>
+	- thunderbird 1:128.11.0esr-1
 	- libvpx 1.15.0-2.1 (bug #1106689)
 	NOTE: Fixed by: https://chromium.googlesource.com/webm/libvpx/+/1c758781c428c0e895645b95b8ff1512b6bdcecb
 	NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2025-42/#CVE-2025-5283
@@ -357,14 +357,14 @@ CVE-2025-5272 (Memory safety bugs present in Firefox 138 and Thunderbird 138. So
 CVE-2025-5269 (Memory safety bug present in Firefox ESR 128.10, and Thunderbird 128.1 ...)
 	{DSA-5926-1}
 	- firefox-esr 128.11.0esr-1
-	- thunderbird <unfixed>
+	- thunderbird 1:128.11.0esr-1
 	NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2025-44/#CVE-2025-5269
 	NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2025-46/#CVE-2025-5269
 CVE-2025-5268 (Memory safety bugs present in Firefox 138, Thunderbird 138, Firefox ES ...)
 	{DSA-5926-1}
 	- firefox 139.0-1
 	- firefox-esr 128.11.0esr-1
-	- thunderbird <unfixed>
+	- thunderbird 1:128.11.0esr-1
 	NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2025-42/#CVE-2025-5268
 	NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2025-44/#CVE-2025-5268
 	NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2025-46/#CVE-2025-5268
@@ -372,7 +372,7 @@ CVE-2025-5267 (A clickjacking vulnerability could have been used to trick a user
 	{DSA-5926-1}
 	- firefox 139.0-1
 	- firefox-esr 128.11.0esr-1
-	- thunderbird <unfixed>
+	- thunderbird 1:128.11.0esr-1
 	NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2025-42/#CVE-2025-5267
 	NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2025-44/#CVE-2025-5267
 	NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2025-46/#CVE-2025-5267
@@ -386,7 +386,7 @@ CVE-2025-5266 (Script elements loading cross-origin resources generated load and
 	{DSA-5926-1}
 	- firefox 139.0-1
 	- firefox-esr 128.11.0esr-1
-	- thunderbird <unfixed>
+	- thunderbird 1:128.11.0esr-1
 	NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2025-42/#CVE-2025-5266
 	NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2025-44/#CVE-2025-5266
 	NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2025-46/#CVE-2025-5266
@@ -401,7 +401,7 @@ CVE-2025-5264 (Due to insufficient escaping of the newline character in the \u20
 	{DSA-5926-1}
 	- firefox 139.0-1
 	- firefox-esr 128.11.0esr-1
-	- thunderbird <unfixed>
+	- thunderbird 1:128.11.0esr-1
 	NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2025-42/#CVE-2025-5264
 	NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2025-44/#CVE-2025-5264
 	NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2025-46/#CVE-2025-5264
@@ -409,7 +409,7 @@ CVE-2025-5263 (Error handling for script execution was incorrectly isolated from
 	{DSA-5926-1}
 	- firefox 139.0-1
 	- firefox-esr 128.11.0esr-1
-	- thunderbird <unfixed>
+	- thunderbird 1:128.11.0esr-1
 	NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2025-42/#CVE-2025-5263
 	NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2025-44/#CVE-2025-5263
 	NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2025-46/#CVE-2025-5263
@@ -2891,7 +2891,7 @@ CVE-2025-4919 (An attacker was able to perform an out-of-bounds read or write on
 	{DSA-5922-1 DLA-4172-1}
 	- firefox 138.0.4-1
 	- firefox-esr 128.10.1esr-1
-	- thunderbird <unfixed>
+	- thunderbird 1:128.11.0esr-1
 	[bookworm] - thunderbird <no-dsa> (Minor issue; wait for june release)
 	[bullseye] - thunderbird <postponed> (Minor issue; follow bookworm)
 	NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2025-36/#CVE-2025-4919
@@ -2902,7 +2902,7 @@ CVE-2025-4918 (An attacker was able to perform an out-of-bounds read or write on
 	{DSA-5922-1 DLA-4172-1}
 	- firefox 138.0.4-1
 	- firefox-esr 128.10.1esr-1
-	- thunderbird <unfixed>
+	- thunderbird 1:128.11.0esr-1
 	[bookworm] - thunderbird <no-dsa> (Minor issue; wait for june release)
 	[bullseye] - thunderbird <postponed> (Minor issue; follow bookworm)
 	NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2025-36/#CVE-2025-4918



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/3d0fcd5d8ca26c5e3d432c07eb6fd81db68b9560

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/3d0fcd5d8ca26c5e3d432c07eb6fd81db68b9560
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20250529/0a8219f0/attachment.htm>


More information about the debian-security-tracker-commits mailing list