Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:alpm/archlinux/firefox@93.0-1
purl pkg:alpm/archlinux/firefox@93.0-1
Next non-vulnerable version 94.0-1
Latest non-vulnerable version 101.0-1
Risk 4.5
Vulnerabilities affecting this package (8)
Vulnerability Summary Fixed by
VCID-b8c2-qrxm-sybt
Aliases:
CVE-2021-38508
Multiple vulnerabilities have been found in Mozilla Thunderbird, the worst of which could result in the arbitrary execution of code.
94.0-1
Affected by 0 other vulnerabilities.
VCID-b911-qnc2-x3aj
Aliases:
CVE-2021-38509
Multiple vulnerabilities have been found in Mozilla Thunderbird, the worst of which could result in the arbitrary execution of code.
94.0-1
Affected by 0 other vulnerabilities.
VCID-c51s-yenc-4yab
Aliases:
CVE-2021-38504
Multiple vulnerabilities have been found in Mozilla Thunderbird, the worst of which could result in the arbitrary execution of code.
94.0-1
Affected by 0 other vulnerabilities.
VCID-ddem-1dt1-uff7
Aliases:
CVE-2021-38503
Multiple vulnerabilities have been found in Mozilla Thunderbird, the worst of which could result in the arbitrary execution of code.
94.0-1
Affected by 0 other vulnerabilities.
VCID-jy6e-d578-nkcg
Aliases:
CVE-2021-38507
Multiple vulnerabilities have been found in Mozilla Thunderbird, the worst of which could result in the arbitrary execution of code.
94.0-1
Affected by 0 other vulnerabilities.
VCID-n4kc-y37w-qkdk
Aliases:
CVE-2021-38506
Multiple vulnerabilities have been found in Mozilla Thunderbird, the worst of which could result in the arbitrary execution of code.
94.0-1
Affected by 0 other vulnerabilities.
VCID-t769-2t1u-57b6
Aliases:
CVE-2021-38505
Microsoft introduced a new feature in Windows 10 known as Cloud Clipboard which, if enabled, will record data copied to the clipboard to the cloud, and make it available on other computers in certain scenarios. Applications that wish to prevent copied data from being recorded in Cloud History must use specific clipboard formats; and Firefox before versions 94 and ESR 91.3 did not implement them. This could have caused sensitive data to be recorded to a user's Microsoft account.*This bug only affects Firefox for Windows 10+ with Cloud Clipboard enabled. Other operating systems are unaffected.*
94.0-1
Affected by 0 other vulnerabilities.
VCID-yfmg-82tr-gfec
Aliases:
CVE-2021-38510
The executable file warning was not presented when downloading .inetloc files, which, due to a flaw in Mac OS, can run commands on a user's computer.*Note: This issue only affected Mac OS operating systems. Other operating systems are unaffected.*
94.0-1
Affected by 0 other vulnerabilities.
Vulnerabilities fixed by this package (7)
Vulnerability Summary Aliases
VCID-16cw-k8f1-8kc4 Mozilla developers and community members Julien Cristau, Christian Holler reported memory safety bugs present in Firefox 92. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. CVE-2021-38499
VCID-1rj3-tt63-4yc1 Through use of reportValidity() and window.open(), a plain-text validation message could have been overlaid on another origin, leading to possible user confusion and spoofing attacks. CVE-2021-38497
VCID-2k99-39yt-gkbe During operations on MessageTasks, a task may have been removed while it was still scheduled, resulting in memory corruption and a potentially exploitable crash. CVE-2021-38496
VCID-6fkp-5fzu-fydp Mozilla developers and community members Andreas Pehrson and Christian Holler reported memory safety bugs present in Thunderbird 91.1. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. CVE-2021-38500
VCID-9y48-sjn7-rqeu Mozilla developers and community members Kevin Brosnan, Mihai Alexandru Michis, and Christian Holler reported memory safety bugs present in Thunderbird 91.1. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. CVE-2021-38501
VCID-hhu1-cgcx-nfev During process shutdown, a document could have caused a use-after-free of a languages service object, leading to memory corruption and a potentially exploitable crash. CVE-2021-38498
VCID-vtjf-sufh-p3h4 crossbeam-deque Data Race before v0.7.4 and v0.8.1 ### Impact In the affected version of this crate, the result of the race condition is that one or more tasks in the worker queue can be popped twice instead of other tasks that are forgotten and never popped. If tasks are allocated on the heap, this can cause double free and a memory leak. If not, this still can cause a logical bug. Crates using `Stealer::steal`, `Stealer::steal_batch`, or `Stealer::steal_batch_and_pop` are affected by this issue. ### Patches This has been fixed in crossbeam-deque 0.8.1 and 0.7.4. ### Credits This issue was reported and fixed by Maor Kleinberger. ### License This advisory is in the public domain. CVE-2021-32810
GHSA-pqqp-xmhj-wgcw

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-07T13:59:12.124002+00:00 Arch Linux Importer Affected by VCID-ddem-1dt1-uff7 https://security.archlinux.org/AVG-2511 38.1.0
2026-04-07T13:59:12.110256+00:00 Arch Linux Importer Affected by VCID-c51s-yenc-4yab https://security.archlinux.org/AVG-2511 38.1.0
2026-04-07T13:59:12.096069+00:00 Arch Linux Importer Affected by VCID-n4kc-y37w-qkdk https://security.archlinux.org/AVG-2511 38.1.0
2026-04-07T13:59:12.082791+00:00 Arch Linux Importer Affected by VCID-jy6e-d578-nkcg https://security.archlinux.org/AVG-2511 38.1.0
2026-04-07T13:59:12.062304+00:00 Arch Linux Importer Affected by VCID-b8c2-qrxm-sybt https://security.archlinux.org/AVG-2511 38.1.0
2026-04-07T13:59:12.048600+00:00 Arch Linux Importer Affected by VCID-b911-qnc2-x3aj https://security.archlinux.org/AVG-2511 38.1.0
2026-04-01T18:25:19.757234+00:00 Arch Linux Importer Fixing VCID-vtjf-sufh-p3h4 https://security.archlinux.org/AVG-2443 38.0.0
2026-04-01T18:25:19.735011+00:00 Arch Linux Importer Fixing VCID-2k99-39yt-gkbe https://security.archlinux.org/AVG-2443 38.0.0
2026-04-01T18:25:19.714721+00:00 Arch Linux Importer Fixing VCID-1rj3-tt63-4yc1 https://security.archlinux.org/AVG-2443 38.0.0
2026-04-01T18:25:19.692766+00:00 Arch Linux Importer Fixing VCID-hhu1-cgcx-nfev https://security.archlinux.org/AVG-2443 38.0.0
2026-04-01T18:25:19.669593+00:00 Arch Linux Importer Fixing VCID-16cw-k8f1-8kc4 https://security.archlinux.org/AVG-2443 38.0.0
2026-04-01T18:25:19.630545+00:00 Arch Linux Importer Fixing VCID-6fkp-5fzu-fydp https://security.archlinux.org/AVG-2443 38.0.0
2026-04-01T18:25:19.608357+00:00 Arch Linux Importer Fixing VCID-9y48-sjn7-rqeu https://security.archlinux.org/AVG-2443 38.0.0
2026-04-01T18:25:18.044436+00:00 Arch Linux Importer Affected by VCID-ddem-1dt1-uff7 https://security.archlinux.org/AVG-2511 38.0.0
2026-04-01T18:25:18.018334+00:00 Arch Linux Importer Affected by VCID-c51s-yenc-4yab https://security.archlinux.org/AVG-2511 38.0.0
2026-04-01T18:25:17.992263+00:00 Arch Linux Importer Affected by VCID-n4kc-y37w-qkdk https://security.archlinux.org/AVG-2511 38.0.0
2026-04-01T18:25:17.966825+00:00 Arch Linux Importer Affected by VCID-jy6e-d578-nkcg https://security.archlinux.org/AVG-2511 38.0.0
2026-04-01T18:25:17.940851+00:00 Arch Linux Importer Affected by VCID-b8c2-qrxm-sybt https://security.archlinux.org/AVG-2511 38.0.0
2026-04-01T18:25:17.916087+00:00 Arch Linux Importer Affected by VCID-b911-qnc2-x3aj https://security.archlinux.org/AVG-2511 38.0.0
2026-04-01T18:25:17.886777+00:00 Arch Linux Importer Affected by VCID-t769-2t1u-57b6 https://security.archlinux.org/AVG-2512 38.0.0
2026-04-01T18:25:17.863784+00:00 Arch Linux Importer Affected by VCID-yfmg-82tr-gfec https://security.archlinux.org/AVG-2512 38.0.0