Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
d23f6228 by Salvatore Bonaccorso at 2024-10-05T21:50:53+02:00
Track fixed version for thunderbird issues via unstable

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -696,40 +696,40 @@ CVE-2024-9403 (Memory safety bugs present in Firefox 130. 
Some of these bugs sho
        NOTE: 
https://www.mozilla.org/en-US/security/advisories/mfsa2024-46/#CVE-2024-9403
 CVE-2024-9402 (Memory safety bugs present in Firefox 130, Firefox ESR 128.2, 
and Thun ...)
        - firefox 131.0-1
-       - thunderbird <unfixed>
+       - thunderbird 1:128.3.0esr-1
        NOTE: 
https://www.mozilla.org/en-US/security/advisories/mfsa2024-46/#CVE-2024-9402
        NOTE: 
https://www.mozilla.org/en-US/security/advisories/mfsa2024-49/#CVE-2024-9402
 CVE-2024-9401 (Memory safety bugs present in Firefox 130, Firefox ESR 115.15, 
Firefox ...)
        {DSA-5783-1}
        - firefox 131.0-1
        - firefox-esr 128.3.0esr-1
-       - thunderbird <unfixed>
+       - thunderbird 1:128.3.0esr-1
        NOTE: 
https://www.mozilla.org/en-US/security/advisories/mfsa2024-46/#CVE-2024-9401
        NOTE: 
https://www.mozilla.org/en-US/security/advisories/mfsa2024-48/#CVE-2024-9401
        NOTE: 
https://www.mozilla.org/en-US/security/advisories/mfsa2024-49/#CVE-2024-9401
 CVE-2024-9400 (A potential memory corruption vulnerability could be triggered 
if an a ...)
        - firefox 131.0-1
-       - thunderbird <unfixed>
+       - thunderbird 1:128.3.0esr-1
        NOTE: 
https://www.mozilla.org/en-US/security/advisories/mfsa2024-46/#CVE-2024-9400
        NOTE: 
https://www.mozilla.org/en-US/security/advisories/mfsa2024-49/#CVE-2024-9400
 CVE-2024-9399 (A website configured to initiate a specially crafted 
WebTransport sess ...)
        - firefox 131.0-1
-       - thunderbird <unfixed>
+       - thunderbird 1:128.3.0esr-1
        NOTE: 
https://www.mozilla.org/en-US/security/advisories/mfsa2024-46/#CVE-2024-9399
        NOTE: 
https://www.mozilla.org/en-US/security/advisories/mfsa2024-49/#CVE-2024-9399
 CVE-2024-9398 (By checking the result of calls to `window.open` with 
specifically set ...)
        - firefox 131.0-1
-       - thunderbird <unfixed>
+       - thunderbird 1:128.3.0esr-1
        NOTE: 
https://www.mozilla.org/en-US/security/advisories/mfsa2024-46/#CVE-2024-9398
        NOTE: 
https://www.mozilla.org/en-US/security/advisories/mfsa2024-49/#CVE-2024-9398
 CVE-2024-9397 (A missing delay in directory upload UI could have made it 
possible for ...)
        - firefox 131.0-1
-       - thunderbird <unfixed>
+       - thunderbird 1:128.3.0esr-1
        NOTE: 
https://www.mozilla.org/en-US/security/advisories/mfsa2024-46/#CVE-2024-9397
        NOTE: 
https://www.mozilla.org/en-US/security/advisories/mfsa2024-49/#CVE-2024-9397
 CVE-2024-9396 (It is currently unknown if this issue is exploitable but a 
condition m ...)
        - firefox 131.0-1
-       - thunderbird <unfixed>
+       - thunderbird 1:128.3.0esr-1
        NOTE: 
https://www.mozilla.org/en-US/security/advisories/mfsa2024-46/#CVE-2024-9396
        NOTE: 
https://www.mozilla.org/en-US/security/advisories/mfsa2024-49/#CVE-2024-9396
 CVE-2024-9395 (A specially crafted filename containing a large number of 
spaces could ...)
@@ -739,7 +739,7 @@ CVE-2024-9394 (An attacker could, via a specially crafted 
multipart response, ex
        {DSA-5783-1}
        - firefox 131.0-1
        - firefox-esr 128.3.0esr-1
-       - thunderbird <unfixed>
+       - thunderbird 1:128.3.0esr-1
        NOTE: 
https://www.mozilla.org/en-US/security/advisories/mfsa2024-46/#CVE-2024-9394
        NOTE: 
https://www.mozilla.org/en-US/security/advisories/mfsa2024-48/#CVE-2024-9394
        NOTE: 
https://www.mozilla.org/en-US/security/advisories/mfsa2024-49/#CVE-2024-9394
@@ -747,7 +747,7 @@ CVE-2024-9393 (An attacker could, via a specially crafted 
multipart response, ex
        {DSA-5783-1}
        - firefox 131.0-1
        - firefox-esr 128.3.0esr-1
-       - thunderbird <unfixed>
+       - thunderbird 1:128.3.0esr-1
        NOTE: 
https://www.mozilla.org/en-US/security/advisories/mfsa2024-46/#CVE-2024-9393
        NOTE: 
https://www.mozilla.org/en-US/security/advisories/mfsa2024-48/#CVE-2024-9393
        NOTE: 
https://www.mozilla.org/en-US/security/advisories/mfsa2024-49/#CVE-2024-9393
@@ -755,7 +755,7 @@ CVE-2024-9392 (A compromised content process could have 
allowed for the arbitrar
        {DSA-5783-1}
        - firefox 131.0-1
        - firefox-esr 128.3.0esr-1
-       - thunderbird <unfixed>
+       - thunderbird 1:128.3.0esr-1
        NOTE: 
https://www.mozilla.org/en-US/security/advisories/mfsa2024-46/#CVE-2024-9392
        NOTE: 
https://www.mozilla.org/en-US/security/advisories/mfsa2024-48/#CVE-2024-9392
        NOTE: 
https://www.mozilla.org/en-US/security/advisories/mfsa2024-49/#CVE-2024-9392
@@ -3355,7 +3355,7 @@ CVE-2024-8939 (A vulnerability was found in the ilab 
model serve component, wher
        NOT-FOR-US: RHEL AI
 CVE-2024-8900 (An attacker could write data to the user's clipboard, bypassing 
the us ...)
        - firefox 129.0-1
-       - thunderbird <unfixed>
+       - thunderbird 1:128.3.0esr-1
        NOTE: 
https://www.mozilla.org/en-US/security/advisories/mfsa2024-33/#CVE-2024-8900
        NOTE: 
https://www.mozilla.org/en-US/security/advisories/mfsa2024-49/#CVE-2024-8900
 CVE-2024-8897 (Under certain conditions, an attacker with the ability to 
redirect use ...)



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/d23f6228f9efebe6661f1f6fe96c525eb2b9cfbf

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/d23f6228f9efebe6661f1f6fe96c525eb2b9cfbf
You're receiving this email because of your account on salsa.debian.org.


_______________________________________________
debian-security-tracker-commits mailing list
[email protected]
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits

Reply via email to