Lucene search

K
slackwareSlackware Linux ProjectSSA-2023-101-01
HistoryApr 11, 2023 - 6:52 p.m.

[slackware-security] mozilla-firefox

2023-04-1118:52:40
Slackware Linux Project
www.slackware.com
15

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.001 Low

EPSS

Percentile

44.4%

New mozilla-firefox packages are available for Slackware 15.0 and -current to
fix security issues.

Here are the details from the Slackware 15.0 ChangeLog:

patches/packages/mozilla-firefox-102.10.0esr-i686-1_slack15.0.txz: Upgraded.
This update contains security fixes and improvements.
For more information, see:
https://www.mozilla.org/en-US/firefox/102.10.0/releasenotes/
https://www.mozilla.org/en-US/security/advisories/mfsa2023-14
https://www.mozilla.org/en-US/security/advisories/mfsa2023-14/#MFSA-TMP-2023-0001
https://vulners.com/cve/CVE-2023-29531
https://vulners.com/cve/CVE-2023-29532
https://vulners.com/cve/CVE-2023-29533
https://vulners.com/cve/CVE-2023-29535
https://vulners.com/cve/CVE-2023-29536
https://vulners.com/cve/CVE-2023-29539
https://vulners.com/cve/CVE-2023-29541
https://vulners.com/cve/CVE-2023-29545
https://vulners.com/cve/CVE-2023-1945
https://vulners.com/cve/CVE-2023-29548
https://vulners.com/cve/CVE-2023-29550
(* Security fix *)

Where to find the new packages:

Thanks to the friendly folks at the OSU Open Source Lab
(http://osuosl.org) for donating FTP and rsync hosting
to the Slackware project! :-)

Also see the “Get Slack” section on http://slackware.com for
additional mirror sites near you.

Updated package for Slackware 15.0:
ftp://ftp.slackware.com/pub/slackware/slackware-15.0/patches/packages/mozilla-firefox-102.10.0esr-i686-1_slack15.0.txz

Updated package for Slackware x86_64 15.0:
ftp://ftp.slackware.com/pub/slackware/slackware64-15.0/patches/packages/mozilla-firefox-102.10.0esr-x86_64-1_slack15.0.txz

Updated package for Slackware -current:
ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/xap/mozilla-firefox-112.0-i686-1.txz

Updated package for Slackware x86_64 -current:
ftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/xap/mozilla-firefox-112.0-x86_64-1.txz

MD5 signatures:

Slackware 15.0 package:
c7b14db8b6a2c0635521079e3083ebc1 mozilla-firefox-102.10.0esr-i686-1_slack15.0.txz

Slackware x86_64 15.0 package:
d50875d0d84498a4625ce71d2382c531 mozilla-firefox-102.10.0esr-x86_64-1_slack15.0.txz

Slackware -current package:
ee7318aed0a244f2197ad7098da94889 xap/mozilla-firefox-112.0-i686-1.txz

Slackware x86_64 -current package:
fb7d0a5d37c3aff5d88c54b35fbc0e81 xap/mozilla-firefox-112.0-x86_64-1.txz

Installation instructions:

Upgrade the package as root:
> upgradepkg mozilla-firefox-102.10.0esr-i686-1_slack15.0.txz

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.001 Low

EPSS

Percentile

44.4%