On 02/09/2025 17.16, Topi Toosi via Tails-dev wrote:
>
>
> David A. Wheeler:
>>
>> I'm not a member of the Tails release group. However, this doesn't
>> seem to be specific to Thunderbird or Tails. This is, in some sense,
>> the inevitable result of being a distribution, that is, packaging
>> software developed by many others who have their own schedule.
>
> The problem is specific to Thunderbird in that the security updates for
> it are typically released by Mozilla on the same day as the updates for
> Firefox.
>
> As Tails releases follow the Firefox update cycle, but Thunderbird is
> not updated at the same time, Thunderbird is almost always one release
> behind. I.e. there is no time when there are no publicly known
> vulnerabilities in the Tails version of Thunderbird.
This unfortunate situation is indeed the root cause of this.
>> If it *is* vulnerable to expected use (e.g., merely receiving &
>> reading an email would cause a takeover), I'd hope that the Tails team
>> would do an emergency release.
That is the intention.
> To my knowledge Tails has never had an emergency release related to
> Thunderbird. Even when there have been vulnerabilities in Thunderbird
> which would have compromised the anonymity of the users.
https://tails.net/news/IP_leakage_with_Icedove/ :D
>> I can imagine them doing some other things to compensate:
>> * making it easier to update from Debian directly
>> * working with Debian to compile with more hardening flags, to make it
>> harder to attack
>> * sandboxing Thunderbird
Indeed, sandboxing Thunderbird has been our best-effort attempt at
managing the situation, and we know the sandboxing is problematic (see
my other post in this thread).
> Agreed. I would hope that actions such as these would be taken and
> documented somewhere.
Please open an issue about it on Tails' GitLab and let's try to make it
happen!
Cheers!