Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:deb/debian/firefox@67.0-2?distro=sid
purl pkg:deb/debian/firefox@67.0-2?distro=sid
Vulnerabilities affecting this package (0)
Vulnerability Summary Fixed by
This package is not known to be affected by vulnerabilities.
Vulnerabilities fixed by this package (17)
Vulnerability Summary Aliases
VCID-4v74-u3y3-xkh6 If the ALT and "a" keys are pressed when users receive an extension installation prompt, the extension will be installed without the install prompt delay that keeps the prompt visible in order for users to accept or decline the installation. A malicious web page could use this with spoofing on the page to trick users into installing a malicious extension. CVE-2019-11697
VCID-5gs2-jpsz-jbfu A use-after-free vulnerability can occur in AssertWorkerThread due to a race condition with shared workers. This results in a potentially exploitable crash. CVE-2019-9821
VCID-7ej9-whhw-97hn A vulnerability where a JavaScript compartment mismatch can occur while working with the fetch API, resulting in a potentially exploitable crash. CVE-2019-9819
VCID-92qb-fqpr-27hm A use-after-free vulnerability can occur in the chrome event handler when it is freed while still in use. This results in a potentially exploitable crash. CVE-2019-9820
VCID-d636-k6r3-skez Mozilla developers and community members Christian Holler, Andrei Ciure, Julien Cristau, Jan de Mooij, Jan Varga, Marcia Knous, André Bargull, and Philipp reported memory safety bugs present in Firefox 66. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. CVE-2019-9814
VCID-fx8t-41tv-hkdu Use After Free png_image_free in png.c in libpng has a use-after-free because png_image_free_function is called under png_safe_execute. CVE-2019-7317
VCID-g3nf-qnz2-h7gg Images from a different domain can be read using a canvas object in some circumstances. This could be used to steal image data from a different site in violation of same-origin policy. CVE-2019-9817
VCID-k321-r7qq-gbb9 A use-after-free vulnerability can occur when working with XMLHttpRequest (XHR) in an event loop, causing the XHR main thread to be called after it has been freed. This results in a potentially exploitable crash. CVE-2019-11691
VCID-mejk-v3p1-eyfy A custom cursor defined by scripting on a site can position itself over the addressbar to spoof the actual cursor when it should not be allowed outside of the primary web content area. This could be used by a malicious site to trick users into clicking on permission prompts, doorhanger notifications, or other buttons inadvertently if the location is spoofed over the user interface. CVE-2019-11695
VCID-q181-ebjc-1qe4 The default webcal: protocol handler will load a web site vulnerable to cross-site scripting (XSS) attacks. This default was left in place as a legacy feature and has now been removed. *Note: this issue only affects users with an account on the vulnerable service. Other users are unaffected.* CVE-2019-11701
VCID-sq1u-5jfc-dyh1 A possible vulnerability exists where type confusion can occur when manipulating JavaScript objects in object groups, allowing for the bypassing of security checks within these groups. *Note: this vulnerability has only been demonstrated with UnboxedObjects, which are disabled by default on all supported releases.* CVE-2019-9816
VCID-tfry-ch3y-fyb1 Mozilla developers and community members Olli Pettay, Bogdan Tara, Jan de Mooij, Jason Kratzer, Jan Varga, Gary Kwong, Tim Guan-tin Chien, Tyson Smith, Ronald Crane, and Ted Campbell reported memory safety bugs present in Firefox 66 and Firefox ESR 60.6. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. CVE-2019-9800
VCID-ugjs-4tca-d3dk The bufferdata function in WebGL is vulnerable to a buffer overflow with specific graphics drivers on Linux. This could result in malicious content freezing a tab or triggering a potentially exploitable crash. *Note: this issue only occurs on Linux. Other operating systems are unaffected.* CVE-2019-11693
VCID-v2ak-jyep-a3cv Files with the .JNLP extension used for "Java web start" applications are not treated as executable content for download prompts even though they can be executed if Java is installed on the local system. This could allow users to mistakenly launch an executable binary locally. CVE-2019-11696
VCID-vvpm-3zhz-77dm A use-after-free vulnerability can occur when listeners are removed from the event listener manager while still in use, resulting in a potentially exploitable crash. CVE-2019-11692
VCID-w5hu-w7mu-b3g3 If a crafted hyperlink is dragged and dropped to the bookmark bar or sidebar and the resulting bookmark is subsequently dragged and dropped into the web content area, an arbitrary query of a user's browser history can be run and transmitted to the content page via drop event data. This allows for the theft of browser history by a malicious site. CVE-2019-11698
VCID-z3k2-uhun-pyh3 A malicious page can briefly cause the wrong name to be highlighted as the domain name in the addressbar during page navigations. This could result in user confusion of which site is currently loaded for spoofing attacks. CVE-2019-11699

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-16T12:14:50.037887+00:00 Debian Importer Fixing VCID-92qb-fqpr-27hm https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:07:18.871690+00:00 Debian Importer Fixing VCID-7ej9-whhw-97hn https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:47:47.764020+00:00 Debian Importer Fixing VCID-tfry-ch3y-fyb1 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:07:35.213370+00:00 Debian Importer Fixing VCID-z3k2-uhun-pyh3 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:06:49.072938+00:00 Debian Importer Fixing VCID-ugjs-4tca-d3dk https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:58:31.811052+00:00 Debian Importer Fixing VCID-sq1u-5jfc-dyh1 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:54:27.260824+00:00 Debian Importer Fixing VCID-d636-k6r3-skez https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:54:01.255706+00:00 Debian Importer Fixing VCID-g3nf-qnz2-h7gg https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:46:34.876138+00:00 Debian Importer Fixing VCID-v2ak-jyep-a3cv https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:33:45.602100+00:00 Debian Importer Fixing VCID-w5hu-w7mu-b3g3 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:24:15.662354+00:00 Debian Importer Fixing VCID-4v74-u3y3-xkh6 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:23:55.713461+00:00 Debian Importer Fixing VCID-fx8t-41tv-hkdu https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:08:11.265561+00:00 Debian Importer Fixing VCID-q181-ebjc-1qe4 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:06:49.239366+00:00 Debian Importer Fixing VCID-vvpm-3zhz-77dm https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:56:58.870639+00:00 Debian Importer Fixing VCID-k321-r7qq-gbb9 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:55:32.047419+00:00 Debian Importer Fixing VCID-5gs2-jpsz-jbfu https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:38:32.343467+00:00 Debian Importer Fixing VCID-mejk-v3p1-eyfy https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-13T08:22:37.131443+00:00 Debian Importer Fixing VCID-92qb-fqpr-27hm https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:33:21.049817+00:00 Debian Importer Fixing VCID-7ej9-whhw-97hn https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:18:22.891684+00:00 Debian Importer Fixing VCID-tfry-ch3y-fyb1 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:48:03.235487+00:00 Debian Importer Fixing VCID-z3k2-uhun-pyh3 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:47:26.905425+00:00 Debian Importer Fixing VCID-ugjs-4tca-d3dk https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:40:57.847300+00:00 Debian Importer Fixing VCID-sq1u-5jfc-dyh1 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:37:47.000108+00:00 Debian Importer Fixing VCID-d636-k6r3-skez https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:37:28.554771+00:00 Debian Importer Fixing VCID-g3nf-qnz2-h7gg https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:31:42.837512+00:00 Debian Importer Fixing VCID-v2ak-jyep-a3cv https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:22:22.601563+00:00 Debian Importer Fixing VCID-w5hu-w7mu-b3g3 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:16:36.846639+00:00 Debian Importer Fixing VCID-4v74-u3y3-xkh6 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:16:26.230600+00:00 Debian Importer Fixing VCID-fx8t-41tv-hkdu https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:07:06.742606+00:00 Debian Importer Fixing VCID-q181-ebjc-1qe4 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:06:18.061491+00:00 Debian Importer Fixing VCID-vvpm-3zhz-77dm https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:00:22.677349+00:00 Debian Importer Fixing VCID-k321-r7qq-gbb9 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:59:24.550362+00:00 Debian Importer Fixing VCID-5gs2-jpsz-jbfu https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:48:39.062857+00:00 Debian Importer Fixing VCID-mejk-v3p1-eyfy https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-02T17:18:26.144180+00:00 Debian Importer Fixing VCID-g3nf-qnz2-h7gg https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:17:33.051323+00:00 Debian Importer Fixing VCID-w5hu-w7mu-b3g3 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:17:08.016454+00:00 Debian Importer Fixing VCID-tfry-ch3y-fyb1 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:14:50.560354+00:00 Debian Importer Fixing VCID-k321-r7qq-gbb9 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:14:23.466011+00:00 Debian Importer Fixing VCID-7ej9-whhw-97hn https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:14:20.283879+00:00 Debian Importer Fixing VCID-v2ak-jyep-a3cv https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:14:11.737127+00:00 Debian Importer Fixing VCID-92qb-fqpr-27hm https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:13:24.864275+00:00 Debian Importer Fixing VCID-z3k2-uhun-pyh3 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:11:59.857023+00:00 Debian Importer Fixing VCID-ugjs-4tca-d3dk https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:09:09.016781+00:00 Debian Importer Fixing VCID-d636-k6r3-skez https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:06:38.131612+00:00 Debian Importer Fixing VCID-sq1u-5jfc-dyh1 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:04:49.045187+00:00 Debian Importer Fixing VCID-4v74-u3y3-xkh6 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:04:48.662836+00:00 Debian Importer Fixing VCID-fx8t-41tv-hkdu https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:03:56.246563+00:00 Debian Importer Fixing VCID-q181-ebjc-1qe4 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:03:51.849801+00:00 Debian Importer Fixing VCID-vvpm-3zhz-77dm https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:03:17.665481+00:00 Debian Importer Fixing VCID-5gs2-jpsz-jbfu https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:02:13.186573+00:00 Debian Importer Fixing VCID-mejk-v3p1-eyfy https://security-tracker.debian.org/tracker/data/json 38.1.0