Lucene search

K
slackwareSlackware Linux ProjectSSA-2023-353-02
HistoryDec 19, 2023 - 9:32 p.m.

[slackware-security] mozilla-firefox

2023-12-1921:32:19
Slackware Linux Project
www.slackware.com
10
mozilla-firefox
security-fix
slackware 15.0
-current
cve-2023-6856
cve-2023-6865
cve-2023-6857
cve-2023-6858
cve-2023-6859
cve-2023-6860
cve-2023-6867
cve-2023-6861
cve-2023-6862
cve-2023-6863
cve-2023-6864

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

6.7 Medium

AI Score

Confidence

Low

0.005 Low

EPSS

Percentile

77.4%

New mozilla-firefox packages are available for Slackware 15.0 and -current to
fix security issues.

Here are the details from the Slackware 15.0 ChangeLog:

patches/packages/mozilla-firefox-115.6.0esr-i686-1_slack15.0.txz: Upgraded.
This update contains security fixes and improvements.
For more information, see:
https://www.mozilla.org/en-US/firefox/115.6.0/releasenotes/
https://www.mozilla.org/security/advisories/mfsa2023-54/
https://vulners.com/cve/CVE-2023-6856
https://vulners.com/cve/CVE-2023-6865
https://vulners.com/cve/CVE-2023-6857
https://vulners.com/cve/CVE-2023-6858
https://vulners.com/cve/CVE-2023-6859
https://vulners.com/cve/CVE-2023-6860
https://vulners.com/cve/CVE-2023-6867
https://vulners.com/cve/CVE-2023-6861
https://vulners.com/cve/CVE-2023-6862
https://vulners.com/cve/CVE-2023-6863
https://vulners.com/cve/CVE-2023-6864
(* Security fix *)

Where to find the new packages:

Thanks to the friendly folks at the OSU Open Source Lab
(http://osuosl.org) for donating FTP and rsync hosting
to the Slackware project! :-)

Also see the “Get Slack” section on http://slackware.com for
additional mirror sites near you.

Updated package for Slackware 15.0:
ftp://ftp.slackware.com/pub/slackware/slackware-15.0/patches/packages/mozilla-firefox-115.6.0esr-i686-1_slack15.0.txz

Updated package for Slackware x86_64 15.0:
ftp://ftp.slackware.com/pub/slackware/slackware64-15.0/patches/packages/mozilla-firefox-115.6.0esr-x86_64-1_slack15.0.txz

Updated package for Slackware -current:
ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/xap/mozilla-firefox-115.6.0esr-i686-1.txz

Updated package for Slackware x86_64 -current:
ftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/xap/mozilla-firefox-115.6.0esr-x86_64-1.txz

MD5 signatures:

Slackware 15.0 package:
b2ac40b678fed2f2bc37fbaa8dcd9766 mozilla-firefox-115.6.0esr-i686-1_slack15.0.txz

Slackware x86_64 15.0 package:
fabd52a287faddb7543b2cce8d3faa1f mozilla-firefox-115.6.0esr-x86_64-1_slack15.0.txz

Slackware -current package:
75cae7b411df6f4ca4f4c8f18529b772 xap/mozilla-firefox-115.6.0esr-i686-1.txz

Slackware x86_64 -current package:
9388bad634352c43749aa19061157c38 xap/mozilla-firefox-115.6.0esr-x86_64-1.txz

Installation instructions:

Upgrade the package as root:
> upgradepkg mozilla-firefox-115.6.0esr-i686-1_slack15.0.txz

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

6.7 Medium

AI Score

Confidence

Low

0.005 Low

EPSS

Percentile

77.4%