Debian Package Tracker
Register | Log in
Subscribe

firefox

Mozilla Firefox web browser

Choose email to subscribe with

general
  • source: firefox (main)
  • version: 147.0.4-1
  • maintainer: Maintainers of Mozilla-related packages (DMD)
  • uploaders: Mike Hommey [DMD]
  • arch: all any
  • std-ver: 3.9.8.0
  • VCS: Git (Browse, QA)
versions [more versions can be listed by madison] [old versions available from snapshot.debian.org]
[pool directory]
  • unstable: 147.0.4-1
versioned links
  • 147.0.3-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 147.0.4-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
binaries
  • firefox (159 bugs: 2, 123, 34, 0)
  • firefox-l10n-ach
  • firefox-l10n-af
  • firefox-l10n-all
  • firefox-l10n-an
  • firefox-l10n-ar
  • firefox-l10n-ast
  • firefox-l10n-az
  • firefox-l10n-be
  • firefox-l10n-bg
  • firefox-l10n-bn
  • firefox-l10n-br
  • firefox-l10n-bs
  • firefox-l10n-ca
  • firefox-l10n-ca-valencia
  • firefox-l10n-cak
  • firefox-l10n-cs
  • firefox-l10n-cy
  • firefox-l10n-da
  • firefox-l10n-de
  • firefox-l10n-dsb
  • firefox-l10n-el
  • firefox-l10n-en-ca
  • firefox-l10n-en-gb
  • firefox-l10n-eo
  • firefox-l10n-es-ar
  • firefox-l10n-es-cl
  • firefox-l10n-es-es
  • firefox-l10n-es-mx
  • firefox-l10n-et
  • firefox-l10n-eu
  • firefox-l10n-fa
  • firefox-l10n-ff
  • firefox-l10n-fi (1 bugs: 0, 0, 1, 0)
  • firefox-l10n-fr (1 bugs: 0, 1, 0, 0)
  • firefox-l10n-fur
  • firefox-l10n-fy-nl
  • firefox-l10n-ga-ie
  • firefox-l10n-gd
  • firefox-l10n-gl
  • firefox-l10n-gn
  • firefox-l10n-gu-in
  • firefox-l10n-he
  • firefox-l10n-hi-in
  • firefox-l10n-hr
  • firefox-l10n-hsb
  • firefox-l10n-hu
  • firefox-l10n-hy-am
  • firefox-l10n-ia
  • firefox-l10n-id
  • firefox-l10n-is
  • firefox-l10n-it
  • firefox-l10n-ja
  • firefox-l10n-ka
  • firefox-l10n-kab
  • firefox-l10n-kk
  • firefox-l10n-km
  • firefox-l10n-kn
  • firefox-l10n-ko
  • firefox-l10n-lij
  • firefox-l10n-lt
  • firefox-l10n-lv
  • firefox-l10n-mk
  • firefox-l10n-mr
  • firefox-l10n-ms
  • firefox-l10n-my
  • firefox-l10n-nb-no
  • firefox-l10n-ne-np
  • firefox-l10n-nl
  • firefox-l10n-nn-no
  • firefox-l10n-oc
  • firefox-l10n-pa-in (1 bugs: 0, 0, 1, 0)
  • firefox-l10n-pl
  • firefox-l10n-pt-br
  • firefox-l10n-pt-pt
  • firefox-l10n-rm
  • firefox-l10n-ro
  • firefox-l10n-ru
  • firefox-l10n-sat
  • firefox-l10n-sc
  • firefox-l10n-sco
  • firefox-l10n-si
  • firefox-l10n-sk
  • firefox-l10n-skr
  • firefox-l10n-sl
  • firefox-l10n-son
  • firefox-l10n-sq
  • firefox-l10n-sr
  • firefox-l10n-sv-se (1 bugs: 0, 0, 1, 0)
  • firefox-l10n-szl
  • firefox-l10n-ta
  • firefox-l10n-te
  • firefox-l10n-tg
  • firefox-l10n-th
  • firefox-l10n-tl
  • firefox-l10n-tr
  • firefox-l10n-trs
  • firefox-l10n-uk
  • firefox-l10n-ur
  • firefox-l10n-uz
  • firefox-l10n-vi
  • firefox-l10n-xh
  • firefox-l10n-zh-cn
  • firefox-l10n-zh-tw
action needed
A new upstream version is available: 148.0 high
A new upstream version 148.0 is available, you should consider packaging it.
Created: 2026-02-25 Last update: 2026-02-25 15:02
51 security issues in sid high

There are 51 open security issues in sid.

51 important issues:
  • CVE-2026-2757: Incorrect boundary conditions in the WebRTC: Audio/Video component. This vulnerability affects Firefox < 148, Firefox ESR < 115.33, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.
  • CVE-2026-2758: Use-after-free in the JavaScript: GC component. This vulnerability affects Firefox < 148, Firefox ESR < 115.33, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.
  • CVE-2026-2759: Incorrect boundary conditions in the Graphics: ImageLib component. This vulnerability affects Firefox < 148, Firefox ESR < 115.33, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.
  • CVE-2026-2760: Sandbox escape due to incorrect boundary conditions in the Graphics: WebRender component. This vulnerability affects Firefox < 148, Firefox ESR < 115.33, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.
  • CVE-2026-2761: Sandbox escape in the Graphics: WebRender component. This vulnerability affects Firefox < 148, Firefox ESR < 115.33, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.
  • CVE-2026-2762: Integer overflow in the JavaScript: Standard Library component. This vulnerability affects Firefox < 148, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.
  • CVE-2026-2763: Use-after-free in the JavaScript Engine component. This vulnerability affects Firefox < 148, Firefox ESR < 115.33, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.
  • CVE-2026-2764: JIT miscompilation, use-after-free in the JavaScript Engine: JIT component. This vulnerability affects Firefox < 148, Firefox ESR < 115.33, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.
  • CVE-2026-2765: Use-after-free in the JavaScript Engine component. This vulnerability affects Firefox < 148, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.
  • CVE-2026-2766: Use-after-free in the JavaScript Engine: JIT component. This vulnerability affects Firefox < 148, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.
  • CVE-2026-2767: Use-after-free in the JavaScript: WebAssembly component. This vulnerability affects Firefox < 148, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.
  • CVE-2026-2768: Sandbox escape in the Storage: IndexedDB component. This vulnerability affects Firefox < 148, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.
  • CVE-2026-2769: Use-after-free in the Storage: IndexedDB component. This vulnerability affects Firefox < 148, Firefox ESR < 115.33, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.
  • CVE-2026-2770: Use-after-free in the DOM: Bindings (WebIDL) component. This vulnerability affects Firefox < 148, Firefox ESR < 115.33, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.
  • CVE-2026-2771: Undefined behavior in the DOM: Core & HTML component. This vulnerability affects Firefox < 148, Firefox ESR < 115.33, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.
  • CVE-2026-2772: Use-after-free in the Audio/Video: Playback component. This vulnerability affects Firefox < 148, Firefox ESR < 115.33, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.
  • CVE-2026-2773: Incorrect boundary conditions in the Web Audio component. This vulnerability affects Firefox < 148, Firefox ESR < 115.33, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.
  • CVE-2026-2774: Integer overflow in the Audio/Video component. This vulnerability affects Firefox < 148, Firefox ESR < 115.33, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.
  • CVE-2026-2775: Mitigation bypass in the DOM: HTML Parser component. This vulnerability affects Firefox < 148, Firefox ESR < 115.33, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.
  • CVE-2026-2776: Sandbox escape due to incorrect boundary conditions in the Telemetry component in External Software. This vulnerability affects Firefox < 148, Firefox ESR < 115.33, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.
  • CVE-2026-2777: Privilege escalation in the Messaging System component. This vulnerability affects Firefox < 148, Firefox ESR < 115.33, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.
  • CVE-2026-2778: Sandbox escape due to incorrect boundary conditions in the DOM: Core & HTML component. This vulnerability affects Firefox < 148, Firefox ESR < 115.33, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.
  • CVE-2026-2779: Incorrect boundary conditions in the Networking: JAR component. This vulnerability affects Firefox < 148, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.
  • CVE-2026-2780: Privilege escalation in the Netmonitor component. This vulnerability affects Firefox < 148, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.
  • CVE-2026-2781: Integer overflow in the Libraries component in NSS. This vulnerability affects Firefox < 148, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.
  • CVE-2026-2782: Privilege escalation in the Netmonitor component. This vulnerability affects Firefox < 148, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.
  • CVE-2026-2783: Information disclosure due to JIT miscompilation in the JavaScript Engine: JIT component. This vulnerability affects Firefox < 148, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.
  • CVE-2026-2784: Mitigation bypass in the DOM: Security component. This vulnerability affects Firefox < 148, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.
  • CVE-2026-2785: Invalid pointer in the JavaScript Engine component. This vulnerability affects Firefox < 148, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.
  • CVE-2026-2786: Use-after-free in the JavaScript Engine component. This vulnerability affects Firefox < 148, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.
  • CVE-2026-2787: Use-after-free in the DOM: Window and Location component. This vulnerability affects Firefox < 148, Firefox ESR < 115.33, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.
  • CVE-2026-2788: Incorrect boundary conditions in the Audio/Video: GMP component. This vulnerability affects Firefox < 148, Firefox ESR < 115.33, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.
  • CVE-2026-2789: Use-after-free in the Graphics: ImageLib component. This vulnerability affects Firefox < 148, Firefox ESR < 115.33, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.
  • CVE-2026-2790: Same-origin policy bypass in the Networking: JAR component. This vulnerability affects Firefox < 148, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.
  • CVE-2026-2791: Mitigation bypass in the Networking: Cache component. This vulnerability affects Firefox < 148, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.
  • CVE-2026-2792: Memory safety bugs present in Firefox ESR 140.7, Thunderbird ESR 140.7, Firefox 147 and Thunderbird 147. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 148, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.
  • CVE-2026-2793: Memory safety bugs present in Firefox ESR 115.32, Firefox ESR 140.7, Thunderbird ESR 140.7, Firefox 147 and Thunderbird 147. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 148, Firefox ESR < 115.33, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.
  • CVE-2026-2794: Information disclosure due to uninitialized memory in Firefox and Firefox Focus for Android. This vulnerability affects Firefox < 148.
  • CVE-2026-2795: Use-after-free in the JavaScript: GC component. This vulnerability affects Firefox < 148 and Thunderbird < 148.
  • CVE-2026-2796: JIT miscompilation in the JavaScript: WebAssembly component. This vulnerability affects Firefox < 148 and Thunderbird < 148.
  • CVE-2026-2797: Use-after-free in the JavaScript: GC component. This vulnerability affects Firefox < 148 and Thunderbird < 148.
  • CVE-2026-2798: Use-after-free in the DOM: Core & HTML component. This vulnerability affects Firefox < 148 and Thunderbird < 148.
  • CVE-2026-2799: Use-after-free in the DOM: Core & HTML component. This vulnerability affects Firefox < 148 and Thunderbird < 148.
  • CVE-2026-2800: Spoofing issue in the WebAuthn component in Firefox for Android. This vulnerability affects Firefox < 148 and Thunderbird < 148.
  • CVE-2026-2801: Incorrect boundary conditions in the JavaScript: WebAssembly component. This vulnerability affects Firefox < 148 and Thunderbird < 148.
  • CVE-2026-2802: Race condition in the JavaScript: GC component. This vulnerability affects Firefox < 148 and Thunderbird < 148.
  • CVE-2026-2803: Information disclosure, mitigation bypass in the Settings UI component. This vulnerability affects Firefox < 148 and Thunderbird < 148.
  • CVE-2026-2804: Use-after-free in the JavaScript: WebAssembly component. This vulnerability affects Firefox < 148 and Thunderbird < 148.
  • CVE-2026-2805: Invalid pointer in the DOM: Core & HTML component. This vulnerability affects Firefox < 148 and Thunderbird < 148.
  • CVE-2026-2806: Uninitialized memory in the Graphics: Text component. This vulnerability affects Firefox < 148 and Thunderbird < 148.
  • CVE-2026-2807: Memory safety bugs present in Firefox 147 and Thunderbird 147. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 148 and Thunderbird < 148.
Created: 2026-02-24 Last update: 2026-02-25 04:00
lintian reports 2 errors and 25 warnings high
Lintian reports 2 errors and 25 warnings about this package. You should make the package lintian clean getting rid of them.
Created: 2026-02-17 Last update: 2026-02-17 13:32
Standards version of the package is outdated. high
The package is severely out of date with respect to the Debian Policy. The package should be updated to follow the last version of Debian Policy (Standards-Version 4.7.3 instead of 3.9.8.0).
Created: 2017-08-09 Last update: 2026-02-17 09:19
Depends on packages which need a new maintainer normal
The packages that firefox depends on which need a new maintainer are:
  • hunspell-kk (#879871)
    • Recommends: hunspell-kk
  • ifrench-gut (#1006643)
    • Recommends: myspell-fr-gut
  • uzbek-wordlist (#841696)
    • Recommends: hunspell-uz
Created: 2019-11-22 Last update: 2026-02-25 15:02
The package has not entered testing even though the delay is over normal
The package has not entered testing even though the 5-day delay is over. Check why.
Created: 2026-02-22 Last update: 2026-02-25 15:01
17 bugs tagged patch in the BTS normal
The BTS contains patches fixing 17 bugs, consider including or untagging them.
Created: 2025-01-06 Last update: 2026-02-25 15:00
8 open merge requests in Salsa normal
There are 8 open merge requests for this package on Salsa. You should consider reviewing and/or merging these merge requests.
Created: 2025-08-19 Last update: 2025-12-18 14:31
AppStream hints: 1 warning for firefox normal
AppStream found metadata issues for packages:
  • firefox: 1 warning
You should get rid of them to provide more metadata about this software.
Created: 2019-01-27 Last update: 2025-04-02 15:31
debian/patches: 18 patches to forward upstream low

Among the 18 debian patches available in version 147.0.4-1 of the package, we noticed the following issues:

  • 18 patches where the metadata indicates that the patch has not yet been forwarded upstream. You should either forward the patch upstream or update the metadata to document its real status.
Created: 2023-02-26 Last update: 2026-02-17 12:32
testing migrations
  • This package is part of the ongoing testing transition known as llvm-defaults. Please avoid uploads unrelated to this transition, they would likely delay it and require supplementary work from the release managers. On the other hand, if your package has problems preventing it to migrate to testing, please fix them as soon as possible. You can probably find supplementary information in the debian-release archives or in the corresponding release.debian.org bug.
  • excuses:
    • Migration status for firefox (- to 147.0.4-1): BLOCKED: Rejected/violates migration policy/introduces a regression
    • Issues preventing migration:
    • ∙ ∙ Updating firefox would introduce bugs in testing: #1017919, #1099130, #817954, #992263, #993659
    • ∙ ∙ Missing build on armhf
    • ∙ ∙ Lintian check waiting for test results on armhf - info
    • ∙ ∙ Reproducibility check deferred on armhf: missing builds
    • Additional info (not blocking):
    • ∙ ∙ Piuparts tested OK - https://piuparts.debian.org/sid/source/f/firefox.html
    • ∙ ∙ Autopkgtest skipped on i386: not installable (which is allowed)
    • ∙ ∙ Autopkgtest skipped on s390x: not installable (which is allowed)
    • ∙ ∙ Reproducible on amd64
    • ∙ ∙ Reproducible on arm64
    • ∙ ∙ Reproducible on i386
    • ∙ ∙ Reproducible on ppc64el
    • ∙ ∙ 8 days old (needed 5 days)
    • Not considered
news
[rss feed]
  • [2026-02-17] Accepted firefox 147.0.4-1 (source) into unstable (Mike Hommey)
  • [2026-02-05] Accepted firefox 147.0.3-1 (source) into unstable (Mike Hommey)
  • [2026-01-29] Accepted firefox 147.0.2-1 (source) into unstable (Mike Hommey)
  • [2026-01-20] Accepted firefox 147.0.1-1 (source) into unstable (Mike Hommey)
  • [2026-01-14] Accepted firefox 147.0-1 (source) into unstable (Mike Hommey)
  • [2025-12-19] Accepted firefox 146.0.1-1 (source) into unstable (Mike Hommey)
  • [2025-12-10] Accepted firefox 146.0-1 (source) into unstable (Mike Hommey)
  • [2025-11-19] Accepted firefox 145.0.1-1 (source) into unstable (Mike Hommey)
  • [2025-11-12] Accepted firefox 145.0-1 (source) into unstable (Mike Hommey)
  • [2025-10-29] Accepted firefox 144.0.2-1 (source) into unstable (Mike Hommey)
  • [2025-10-15] Accepted firefox 144.0-1 (source) into unstable (Mike Hommey)
  • [2025-10-01] Accepted firefox 143.0.3-1 (source) into unstable (Mike Hommey)
  • [2025-09-17] Accepted firefox 143.0-1 (source) into unstable (Mike Hommey)
  • [2025-08-28] Accepted firefox 142.0.1-1 (source) into unstable (Mike Hommey)
  • [2025-08-22] Accepted firefox 142.0-1 (source) into unstable (Mike Hommey)
  • [2025-08-08] Accepted firefox 141.0.3-1 (source) into unstable (Mike Hommey)
  • [2025-08-07] Accepted firefox 141.0.2-1 (source) into unstable (Mike Hommey)
  • [2025-07-23] Accepted firefox 141.0-1 (source) into unstable (Mike Hommey)
  • [2025-07-09] Accepted firefox 140.0.4-1 (source) into unstable (Mike Hommey)
  • [2025-06-27] Accepted firefox 140.0.1-1 (source) into unstable (Mike Hommey)
  • [2025-06-25] Accepted firefox 140.0-1 (source) into unstable (Mike Hommey)
  • [2025-06-11] Accepted firefox 139.0.4-1 (source) into unstable (Mike Hommey)
  • [2025-05-28] Accepted firefox 139.0-1 (source) into unstable (Mike Hommey)
  • [2025-05-18] Accepted firefox 138.0.4-1 (source) into unstable (Mike Hommey)
  • [2025-05-13] Accepted firefox 138.0.3-1 (source) into unstable (Mike Hommey)
  • [2025-05-02] Accepted firefox 138.0.1-1 (source) into unstable (Mike Hommey)
  • [2025-04-30] Accepted firefox 138.0-1 (source) into unstable (Mike Hommey)
  • [2025-04-16] Accepted firefox 137.0.2-1 (source) into unstable (Mike Hommey)
  • [2025-04-08] Accepted firefox 137.0.1-1 (source) into unstable (Mike Hommey)
  • [2025-04-02] Accepted firefox 137.0-1 (source) into unstable (Mike Hommey)
  • 1
  • 2
bugs [bug history graph]
  • all: 180 184
  • RC: 4 5
  • I&N: 136 139
  • M&W: 40
  • F&P: 0
  • patch: 17
links
  • lintian (2, 25)
  • buildd: logs, cross
  • popcon
  • browse source code
  • edit tags
  • other distros
  • security tracker
  • screenshots
  • debian patches
ubuntu Ubuntu logo [Information about Ubuntu for Debian Developers]
  • version: 1:1snap1-0ubuntu8
  • 637 bugs (14 patches)

Debian Package Tracker — Copyright 2013-2025 The Distro Tracker Developers
Report problems to the tracker.debian.org pseudo-package in the Debian BTS.
Documentation — Bugs — Git Repository — Contributing