Debian Package Tracker
Register | Log in
Subscribe

firefox-esr

Mozilla Firefox web browser - Extended Support Release (ESR)

Choose email to subscribe with

general
  • source: firefox-esr (main)
  • version: 140.8.0esr-1
  • maintainer: Maintainers of Mozilla-related packages (DMD)
  • uploaders: Mike Hommey [DMD]
  • arch: all any
  • std-ver: 3.9.8.0
  • VCS: Git (Browse, QA)
versions [more versions can be listed by madison] [old versions available from snapshot.debian.org]
[pool directory]
  • o-o-stable: 115.14.0esr-1~deb11u1
  • o-o-sec: 140.7.0esr-1~deb11u1
  • o-o-p-u: 115.14.0esr-1~deb11u1
  • oldstable: 128.14.0esr-1~deb12u1
  • old-sec: 140.8.0esr-1~deb12u1
  • old-p-u: 140.8.0esr-1~deb12u1
  • stable: 140.4.0esr-1~deb13u1
  • stable-sec: 140.8.0esr-1~deb13u1
  • stable-p-u: 140.8.0esr-1~deb13u1
  • testing: 140.7.0esr-1
  • unstable: 140.8.0esr-1
versioned links
  • 78.15.0esr-1~deb11u1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 91.13.0esr-1~deb11u1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 115.14.0esr-1~deb11u1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 115.15.0esr-1~deb12u1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 128.14.0esr-1~deb12u1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 140.4.0esr-1~deb13u1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 140.7.0esr-1~deb11u1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 140.7.0esr-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 140.8.0esr-1~deb12u1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 140.8.0esr-1~deb13u1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 140.8.0esr-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
binaries
  • firefox-esr (280 bugs: 6, 241, 33, 0)
  • firefox-esr-l10n-ach
  • firefox-esr-l10n-af
  • firefox-esr-l10n-all
  • firefox-esr-l10n-an
  • firefox-esr-l10n-ar
  • firefox-esr-l10n-ast
  • firefox-esr-l10n-az
  • firefox-esr-l10n-be
  • firefox-esr-l10n-bg
  • firefox-esr-l10n-bn
  • firefox-esr-l10n-br
  • firefox-esr-l10n-bs
  • firefox-esr-l10n-ca
  • firefox-esr-l10n-ca-valencia
  • firefox-esr-l10n-cak
  • firefox-esr-l10n-cs
  • firefox-esr-l10n-cy
  • firefox-esr-l10n-da
  • firefox-esr-l10n-de (1 bugs: 0, 1, 0, 0)
  • firefox-esr-l10n-dsb
  • firefox-esr-l10n-el (1 bugs: 0, 1, 0, 0)
  • firefox-esr-l10n-en-ca (1 bugs: 0, 1, 0, 0)
  • firefox-esr-l10n-en-gb (1 bugs: 0, 1, 0, 0)
  • firefox-esr-l10n-eo
  • firefox-esr-l10n-es-ar
  • firefox-esr-l10n-es-cl
  • firefox-esr-l10n-es-es
  • firefox-esr-l10n-es-mx
  • firefox-esr-l10n-et
  • firefox-esr-l10n-eu
  • firefox-esr-l10n-fa
  • firefox-esr-l10n-ff
  • firefox-esr-l10n-fi (2 bugs: 0, 1, 1, 0)
  • firefox-esr-l10n-fr
  • firefox-esr-l10n-fur
  • firefox-esr-l10n-fy-nl
  • firefox-esr-l10n-ga-ie
  • firefox-esr-l10n-gd
  • firefox-esr-l10n-gl
  • firefox-esr-l10n-gn
  • firefox-esr-l10n-gu-in
  • firefox-esr-l10n-he
  • firefox-esr-l10n-hi-in
  • firefox-esr-l10n-hr
  • firefox-esr-l10n-hsb
  • firefox-esr-l10n-hu
  • firefox-esr-l10n-hy-am
  • firefox-esr-l10n-ia
  • firefox-esr-l10n-id
  • firefox-esr-l10n-is
  • firefox-esr-l10n-it
  • firefox-esr-l10n-ja
  • firefox-esr-l10n-ka
  • firefox-esr-l10n-kab
  • firefox-esr-l10n-kk
  • firefox-esr-l10n-km
  • firefox-esr-l10n-kn
  • firefox-esr-l10n-ko
  • firefox-esr-l10n-lij
  • firefox-esr-l10n-lt
  • firefox-esr-l10n-lv
  • firefox-esr-l10n-mk
  • firefox-esr-l10n-mr
  • firefox-esr-l10n-ms
  • firefox-esr-l10n-my
  • firefox-esr-l10n-nb-no
  • firefox-esr-l10n-ne-np
  • firefox-esr-l10n-nl
  • firefox-esr-l10n-nn-no
  • firefox-esr-l10n-oc
  • firefox-esr-l10n-pa-in
  • firefox-esr-l10n-pl
  • firefox-esr-l10n-pt-br
  • firefox-esr-l10n-pt-pt
  • firefox-esr-l10n-rm
  • firefox-esr-l10n-ro
  • firefox-esr-l10n-ru
  • firefox-esr-l10n-sat
  • firefox-esr-l10n-sc
  • firefox-esr-l10n-sco
  • firefox-esr-l10n-si
  • firefox-esr-l10n-sk
  • firefox-esr-l10n-skr
  • firefox-esr-l10n-sl
  • firefox-esr-l10n-son
  • firefox-esr-l10n-sq
  • firefox-esr-l10n-sr
  • firefox-esr-l10n-sv-se (1 bugs: 0, 0, 1, 0)
  • firefox-esr-l10n-szl
  • firefox-esr-l10n-ta
  • firefox-esr-l10n-te
  • firefox-esr-l10n-tg
  • firefox-esr-l10n-th
  • firefox-esr-l10n-tl
  • firefox-esr-l10n-tr
  • firefox-esr-l10n-trs
  • firefox-esr-l10n-uk
  • firefox-esr-l10n-ur
  • firefox-esr-l10n-uz
  • firefox-esr-l10n-vi
  • firefox-esr-l10n-xh
  • firefox-esr-l10n-zh-cn
  • firefox-esr-l10n-zh-tw
action needed
Marked for autoremoval on 26 March: #1127569 high
Version 140.7.0esr-1 of firefox-esr is marked for autoremoval from testing on Thu 26 Mar 2026. It is affected by #1127569. The removal of firefox-esr will also cause the removal of (transitive) reverse dependencies: debianbuttons, firefox-esr-mobile-config, gnome-kiosk, gosa, gosa-plugins-ldapmanager, gosa-plugins-mailaddress, gosa-plugins-netgroups, gosa-plugins-pwreset, gosa-plugins-rolemanagement, gosa-plugins-sudo, gosa-plugins-systems, libfirefox-marionette-perl, phoenix, pybrowsers, reform-tools. You should try to prevent the removal by fixing these RC bugs.
Created: 2026-02-17 Last update: 2026-03-01 03:00
37 security issues in forky high

There are 37 open security issues in forky.

37 important issues:
  • CVE-2026-2757: Incorrect boundary conditions in the WebRTC: Audio/Video component. This vulnerability affects Firefox < 148, Firefox ESR < 115.33, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.
  • CVE-2026-2758: Use-after-free in the JavaScript: GC component. This vulnerability affects Firefox < 148, Firefox ESR < 115.33, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.
  • CVE-2026-2759: Incorrect boundary conditions in the Graphics: ImageLib component. This vulnerability affects Firefox < 148, Firefox ESR < 115.33, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.
  • CVE-2026-2760: Sandbox escape due to incorrect boundary conditions in the Graphics: WebRender component. This vulnerability affects Firefox < 148, Firefox ESR < 115.33, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.
  • CVE-2026-2761: Sandbox escape in the Graphics: WebRender component. This vulnerability affects Firefox < 148, Firefox ESR < 115.33, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.
  • CVE-2026-2762: Integer overflow in the JavaScript: Standard Library component. This vulnerability affects Firefox < 148, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.
  • CVE-2026-2763: Use-after-free in the JavaScript Engine component. This vulnerability affects Firefox < 148, Firefox ESR < 115.33, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.
  • CVE-2026-2764: JIT miscompilation, use-after-free in the JavaScript Engine: JIT component. This vulnerability affects Firefox < 148, Firefox ESR < 115.33, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.
  • CVE-2026-2765: Use-after-free in the JavaScript Engine component. This vulnerability affects Firefox < 148, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.
  • CVE-2026-2766: Use-after-free in the JavaScript Engine: JIT component. This vulnerability affects Firefox < 148, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.
  • CVE-2026-2767: Use-after-free in the JavaScript: WebAssembly component. This vulnerability affects Firefox < 148, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.
  • CVE-2026-2768: Sandbox escape in the Storage: IndexedDB component. This vulnerability affects Firefox < 148, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.
  • CVE-2026-2769: Use-after-free in the Storage: IndexedDB component. This vulnerability affects Firefox < 148, Firefox ESR < 115.33, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.
  • CVE-2026-2770: Use-after-free in the DOM: Bindings (WebIDL) component. This vulnerability affects Firefox < 148, Firefox ESR < 115.33, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.
  • CVE-2026-2771: Undefined behavior in the DOM: Core & HTML component. This vulnerability affects Firefox < 148, Firefox ESR < 115.33, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.
  • CVE-2026-2772: Use-after-free in the Audio/Video: Playback component. This vulnerability affects Firefox < 148, Firefox ESR < 115.33, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.
  • CVE-2026-2773: Incorrect boundary conditions in the Web Audio component. This vulnerability affects Firefox < 148, Firefox ESR < 115.33, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.
  • CVE-2026-2774: Integer overflow in the Audio/Video component. This vulnerability affects Firefox < 148, Firefox ESR < 115.33, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.
  • CVE-2026-2775: Mitigation bypass in the DOM: HTML Parser component. This vulnerability affects Firefox < 148, Firefox ESR < 115.33, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.
  • CVE-2026-2776: Sandbox escape due to incorrect boundary conditions in the Telemetry component in External Software. This vulnerability affects Firefox < 148, Firefox ESR < 115.33, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.
  • CVE-2026-2777: Privilege escalation in the Messaging System component. This vulnerability affects Firefox < 148, Firefox ESR < 115.33, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.
  • CVE-2026-2778: Sandbox escape due to incorrect boundary conditions in the DOM: Core & HTML component. This vulnerability affects Firefox < 148, Firefox ESR < 115.33, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.
  • CVE-2026-2779: Incorrect boundary conditions in the Networking: JAR component. This vulnerability affects Firefox < 148, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.
  • CVE-2026-2780: Privilege escalation in the Netmonitor component. This vulnerability affects Firefox < 148, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.
  • CVE-2026-2781: Integer overflow in the Libraries component in NSS. This vulnerability affects Firefox < 148, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.
  • CVE-2026-2782: Privilege escalation in the Netmonitor component. This vulnerability affects Firefox < 148, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.
  • CVE-2026-2783: Information disclosure due to JIT miscompilation in the JavaScript Engine: JIT component. This vulnerability affects Firefox < 148, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.
  • CVE-2026-2784: Mitigation bypass in the DOM: Security component. This vulnerability affects Firefox < 148, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.
  • CVE-2026-2785: Invalid pointer in the JavaScript Engine component. This vulnerability affects Firefox < 148, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.
  • CVE-2026-2786: Use-after-free in the JavaScript Engine component. This vulnerability affects Firefox < 148, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.
  • CVE-2026-2787: Use-after-free in the DOM: Window and Location component. This vulnerability affects Firefox < 148, Firefox ESR < 115.33, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.
  • CVE-2026-2788: Incorrect boundary conditions in the Audio/Video: GMP component. This vulnerability affects Firefox < 148, Firefox ESR < 115.33, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.
  • CVE-2026-2789: Use-after-free in the Graphics: ImageLib component. This vulnerability affects Firefox < 148, Firefox ESR < 115.33, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.
  • CVE-2026-2790: Same-origin policy bypass in the Networking: JAR component. This vulnerability affects Firefox < 148, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.
  • CVE-2026-2791: Mitigation bypass in the Networking: Cache component. This vulnerability affects Firefox < 148, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.
  • CVE-2026-2792: Memory safety bugs present in Firefox ESR 140.7, Thunderbird ESR 140.7, Firefox 147 and Thunderbird 147. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 148, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.
  • CVE-2026-2793: Memory safety bugs present in Firefox ESR 115.32, Firefox ESR 140.7, Thunderbird ESR 140.7, Firefox 147 and Thunderbird 147. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 148, Firefox ESR < 115.33, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.
Created: 2026-02-24 Last update: 2026-02-27 11:30
37 security issues in bullseye high

There are 37 open security issues in bullseye.

37 important issues:
  • CVE-2026-2757: Incorrect boundary conditions in the WebRTC: Audio/Video component. This vulnerability affects Firefox < 148, Firefox ESR < 115.33, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.
  • CVE-2026-2758: Use-after-free in the JavaScript: GC component. This vulnerability affects Firefox < 148, Firefox ESR < 115.33, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.
  • CVE-2026-2759: Incorrect boundary conditions in the Graphics: ImageLib component. This vulnerability affects Firefox < 148, Firefox ESR < 115.33, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.
  • CVE-2026-2760: Sandbox escape due to incorrect boundary conditions in the Graphics: WebRender component. This vulnerability affects Firefox < 148, Firefox ESR < 115.33, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.
  • CVE-2026-2761: Sandbox escape in the Graphics: WebRender component. This vulnerability affects Firefox < 148, Firefox ESR < 115.33, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.
  • CVE-2026-2762: Integer overflow in the JavaScript: Standard Library component. This vulnerability affects Firefox < 148, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.
  • CVE-2026-2763: Use-after-free in the JavaScript Engine component. This vulnerability affects Firefox < 148, Firefox ESR < 115.33, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.
  • CVE-2026-2764: JIT miscompilation, use-after-free in the JavaScript Engine: JIT component. This vulnerability affects Firefox < 148, Firefox ESR < 115.33, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.
  • CVE-2026-2765: Use-after-free in the JavaScript Engine component. This vulnerability affects Firefox < 148, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.
  • CVE-2026-2766: Use-after-free in the JavaScript Engine: JIT component. This vulnerability affects Firefox < 148, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.
  • CVE-2026-2767: Use-after-free in the JavaScript: WebAssembly component. This vulnerability affects Firefox < 148, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.
  • CVE-2026-2768: Sandbox escape in the Storage: IndexedDB component. This vulnerability affects Firefox < 148, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.
  • CVE-2026-2769: Use-after-free in the Storage: IndexedDB component. This vulnerability affects Firefox < 148, Firefox ESR < 115.33, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.
  • CVE-2026-2770: Use-after-free in the DOM: Bindings (WebIDL) component. This vulnerability affects Firefox < 148, Firefox ESR < 115.33, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.
  • CVE-2026-2771: Undefined behavior in the DOM: Core & HTML component. This vulnerability affects Firefox < 148, Firefox ESR < 115.33, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.
  • CVE-2026-2772: Use-after-free in the Audio/Video: Playback component. This vulnerability affects Firefox < 148, Firefox ESR < 115.33, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.
  • CVE-2026-2773: Incorrect boundary conditions in the Web Audio component. This vulnerability affects Firefox < 148, Firefox ESR < 115.33, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.
  • CVE-2026-2774: Integer overflow in the Audio/Video component. This vulnerability affects Firefox < 148, Firefox ESR < 115.33, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.
  • CVE-2026-2775: Mitigation bypass in the DOM: HTML Parser component. This vulnerability affects Firefox < 148, Firefox ESR < 115.33, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.
  • CVE-2026-2776: Sandbox escape due to incorrect boundary conditions in the Telemetry component in External Software. This vulnerability affects Firefox < 148, Firefox ESR < 115.33, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.
  • CVE-2026-2777: Privilege escalation in the Messaging System component. This vulnerability affects Firefox < 148, Firefox ESR < 115.33, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.
  • CVE-2026-2778: Sandbox escape due to incorrect boundary conditions in the DOM: Core & HTML component. This vulnerability affects Firefox < 148, Firefox ESR < 115.33, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.
  • CVE-2026-2779: Incorrect boundary conditions in the Networking: JAR component. This vulnerability affects Firefox < 148, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.
  • CVE-2026-2780: Privilege escalation in the Netmonitor component. This vulnerability affects Firefox < 148, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.
  • CVE-2026-2781: Integer overflow in the Libraries component in NSS. This vulnerability affects Firefox < 148, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.
  • CVE-2026-2782: Privilege escalation in the Netmonitor component. This vulnerability affects Firefox < 148, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.
  • CVE-2026-2783: Information disclosure due to JIT miscompilation in the JavaScript Engine: JIT component. This vulnerability affects Firefox < 148, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.
  • CVE-2026-2784: Mitigation bypass in the DOM: Security component. This vulnerability affects Firefox < 148, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.
  • CVE-2026-2785: Invalid pointer in the JavaScript Engine component. This vulnerability affects Firefox < 148, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.
  • CVE-2026-2786: Use-after-free in the JavaScript Engine component. This vulnerability affects Firefox < 148, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.
  • CVE-2026-2787: Use-after-free in the DOM: Window and Location component. This vulnerability affects Firefox < 148, Firefox ESR < 115.33, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.
  • CVE-2026-2788: Incorrect boundary conditions in the Audio/Video: GMP component. This vulnerability affects Firefox < 148, Firefox ESR < 115.33, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.
  • CVE-2026-2789: Use-after-free in the Graphics: ImageLib component. This vulnerability affects Firefox < 148, Firefox ESR < 115.33, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.
  • CVE-2026-2790: Same-origin policy bypass in the Networking: JAR component. This vulnerability affects Firefox < 148, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.
  • CVE-2026-2791: Mitigation bypass in the Networking: Cache component. This vulnerability affects Firefox < 148, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.
  • CVE-2026-2792: Memory safety bugs present in Firefox ESR 140.7, Thunderbird ESR 140.7, Firefox 147 and Thunderbird 147. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 148, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.
  • CVE-2026-2793: Memory safety bugs present in Firefox ESR 115.32, Firefox ESR 140.7, Thunderbird ESR 140.7, Firefox 147 and Thunderbird 147. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 148, Firefox ESR < 115.33, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.
Created: 2026-02-24 Last update: 2026-02-27 11:30
lintian reports 2 errors and 25 warnings high
Lintian reports 2 errors and 25 warnings about this package. You should make the package lintian clean getting rid of them.
Created: 2026-02-26 Last update: 2026-02-26 09:30
Standards version of the package is outdated. high
The package is severely out of date with respect to the Debian Policy. The package should be updated to follow the last version of Debian Policy (Standards-Version 4.7.3 instead of 3.9.8.0).
Created: 2017-06-24 Last update: 2026-02-26 04:01
Depends on packages which need a new maintainer normal
The packages that firefox-esr depends on which need a new maintainer are:
  • hunspell-kk (#879871)
    • Recommends: hunspell-kk
  • ifrench-gut (#1006643)
    • Recommends: myspell-fr-gut
  • uzbek-wordlist (#841696)
    • Recommends: hunspell-uz
Created: 2019-11-22 Last update: 2026-03-01 03:00
15 bugs tagged patch in the BTS normal
The BTS contains patches fixing 15 bugs (16 if counting merged bugs), consider including or untagging them.
Created: 2025-01-06 Last update: 2026-03-01 02:31
Fails to build during reproducibility testing normal
A package building reproducibly enables third parties to verify that the source matches the distributed binaries. It has been identified that this source package produced different results, failed to build or had other issues in a test environment. Please read about how to improve the situation!
Created: 2026-01-15 Last update: 2026-02-28 21:30
8 open merge requests in Salsa normal
There are 8 open merge requests for this package on Salsa. You should consider reviewing and/or merging these merge requests.
Created: 2025-08-19 Last update: 2025-12-17 07:03
AppStream hints: 1 warning for firefox-esr normal
AppStream found metadata issues for packages:
  • firefox-esr: 1 warning
You should get rid of them to provide more metadata about this software.
Created: 2020-01-13 Last update: 2025-04-02 15:31
debian/patches: 18 patches to forward upstream low

Among the 18 debian patches available in version 140.8.0esr-1 of the package, we noticed the following issues:

  • 18 patches where the metadata indicates that the patch has not yet been forwarded upstream. You should either forward the patch upstream or update the metadata to document its real status.
Created: 2023-02-26 Last update: 2026-02-26 11:00
testing migrations
  • This package is part of the ongoing testing transition known as llvm-defaults. Please avoid uploads unrelated to this transition, they would likely delay it and require supplementary work from the release managers. On the other hand, if your package has problems preventing it to migrate to testing, please fix them as soon as possible. You can probably find supplementary information in the debian-release archives or in the corresponding release.debian.org bug.
  • excuses:
    • Migration status for firefox-esr (140.7.0esr-1 to 140.8.0esr-1): Waiting for test results or another package, or too young (no action required now - check later)
    • Issues preventing migration:
    • ∙ ∙ Too young, only 3 of 5 days old
    • Additional info (not blocking):
    • ∙ ∙ Piuparts tested OK - https://piuparts.debian.org/sid/source/f/firefox-esr.html
    • ∙ ∙ Reproducible on amd64
    • ∙ ∙ Reproducible on arm64
    • ∙ ∙ Reproducible on armhf
    • ∙ ∙ Reproducible on i386
    • ∙ ∙ Reproducible on ppc64el
    • Not considered
news
[rss feed]
  • [2026-02-28] Accepted firefox-esr 140.8.0esr-1~deb12u1 (source) into oldstable-proposed-updates (Debian FTP Masters) (signed by: Mike Hommey)
  • [2026-02-28] Accepted firefox-esr 140.8.0esr-1~deb13u1 (source) into proposed-updates (Debian FTP Masters) (signed by: Mike Hommey)
  • [2026-02-25] Accepted firefox-esr 140.8.0esr-1~deb12u1 (source) into oldstable-security (Debian FTP Masters) (signed by: Mike Hommey)
  • [2026-02-25] Accepted firefox-esr 140.8.0esr-1~deb13u1 (source) into stable-security (Debian FTP Masters) (signed by: Mike Hommey)
  • [2026-02-25] Accepted firefox-esr 140.8.0esr-1 (source) into unstable (Mike Hommey)
  • [2026-01-24] Accepted firefox-esr 140.7.0esr-1~deb12u1 (source) into oldstable-proposed-updates (Debian FTP Masters) (signed by: Mike Hommey)
  • [2026-01-24] Accepted firefox-esr 140.7.0esr-1~deb13u1 (source) into proposed-updates (Debian FTP Masters) (signed by: Mike Hommey)
  • [2026-01-20] firefox-esr 140.7.0esr-1 MIGRATED to testing (Debian testing watch)
  • [2026-01-15] Accepted firefox-esr 140.7.0esr-1~deb12u1 (source) into oldstable-security (Debian FTP Masters) (signed by: Mike Hommey)
  • [2026-01-15] Accepted firefox-esr 140.7.0esr-1~deb13u1 (source) into stable-security (Debian FTP Masters) (signed by: Mike Hommey)
  • [2026-01-15] Accepted firefox-esr 140.7.0esr-1~deb11u1 (source) into oldoldstable-security (Emilio Pozuelo Monfort)
  • [2026-01-15] firefox-esr 140.6.0esr-1 MIGRATED to testing (Debian testing watch)
  • [2026-01-14] Accepted firefox-esr 140.7.0esr-1 (source) into unstable (Mike Hommey)
  • [2025-12-20] Accepted firefox-esr 140.6.0esr-1~deb12u1 (source) into oldstable-proposed-updates (Debian FTP Masters) (signed by: Mike Hommey)
  • [2025-12-20] Accepted firefox-esr 140.6.0esr-1~deb13u1 (source) into proposed-updates (Debian FTP Masters) (signed by: Mike Hommey)
  • [2025-12-10] Accepted firefox-esr 140.6.0esr-1~deb13u1 (source) into stable-security (Debian FTP Masters) (signed by: Mike Hommey)
  • [2025-12-10] Accepted firefox-esr 140.6.0esr-1~deb12u1 (source) into oldstable-security (Debian FTP Masters) (signed by: Mike Hommey)
  • [2025-12-10] Accepted firefox-esr 140.6.0esr-1~deb11u1 (source) into oldoldstable-security (Emilio Pozuelo Monfort)
  • [2025-12-10] Accepted firefox-esr 140.6.0esr-1 (source) into unstable (Mike Hommey)
  • [2025-11-22] Accepted firefox-esr 140.5.0esr-1~deb12u1 (source) into oldstable-proposed-updates (Debian FTP Masters) (signed by: Mike Hommey)
  • [2025-11-22] Accepted firefox-esr 140.5.0esr-1~deb13u1 (source) into proposed-updates (Debian FTP Masters) (signed by: Mike Hommey)
  • [2025-11-18] firefox-esr 140.5.0esr-1 MIGRATED to testing (Debian testing watch)
  • [2025-11-13] Accepted firefox-esr 140.5.0esr-1~deb11u1 (source) into oldoldstable-security (Emilio Pozuelo Monfort)
  • [2025-11-12] Accepted firefox-esr 140.5.0esr-1~deb13u1 (source) into stable-security (Debian FTP Masters) (signed by: Mike Hommey)
  • [2025-11-12] Accepted firefox-esr 140.5.0esr-1~deb12u1 (source) into oldstable-security (Debian FTP Masters) (signed by: Mike Hommey)
  • [2025-11-12] Accepted firefox-esr 140.5.0esr-1 (source) into unstable (Mike Hommey)
  • [2025-10-20] firefox-esr 140.4.0esr-1 MIGRATED to testing (Debian testing watch)
  • [2025-10-19] Accepted firefox-esr 140.4.0esr-1~deb12u1 (source) into oldstable-proposed-updates (Debian FTP Masters) (signed by: Mike Hommey)
  • [2025-10-19] Accepted firefox-esr 140.3.1esr-1~deb12u1 (source) into oldstable-proposed-updates (Debian FTP Masters) (signed by: Mike Hommey)
  • [2025-10-19] Accepted firefox-esr 140.3.0esr-1~deb12u1 (source) into oldstable-proposed-updates (Debian FTP Masters) (signed by: Mike Hommey)
  • 1
  • 2
bugs [bug history graph]
  • all: 296 301
  • RC: 7
  • I&N: 251 256
  • M&W: 38
  • F&P: 0
  • patch: 15 16
  • NC: 1
links
  • lintian (2, 25)
  • buildd: logs, reproducibility, cross
  • popcon
  • browse source code
  • edit tags
  • other distros
  • security tracker
  • screenshots
  • debian patches

Debian Package Tracker — Copyright 2013-2025 The Distro Tracker Developers
Report problems to the tracker.debian.org pseudo-package in the Debian BTS.
Documentation — Bugs — Git Repository — Contributing