Lucene search

K
slackwareSlackware Linux ProjectSSA-2022-320-02
HistoryNov 17, 2022 - 2:00 a.m.

[slackware-security] mozilla-firefox

2022-11-1702:00:08
Slackware Linux Project
www.slackware.com
21
mozilla-firefox
slackware 15.0
security fix
package upgrade
cve-2022-45403
cve-2022-45404
cve-2022-45405
cve-2022-45406
cve-2022-45408
cve-2022-45409
cve-2022-45410
cve-2022-45411
cve-2022-45412
cve-2022-45416
cve-2022-45418
cve-2022-45420
cve-2022-45421

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

EPSS

0.002

Percentile

59.3%

New mozilla-firefox packages are available for Slackware 15.0 and -current to
fix security issues.

Here are the details from the Slackware 15.0 ChangeLog:

patches/packages/mozilla-firefox-102.5.0esr-i686-1_slack15.0.txz: Upgraded.
This update contains security fixes and improvements.
For more information, see:
https://www.mozilla.org/en-US/firefox/102.5.0/releasenotes/
https://www.mozilla.org/security/advisories/mfsa2022-48/
https://vulners.com/cve/CVE-2022-45403
https://vulners.com/cve/CVE-2022-45404
https://vulners.com/cve/CVE-2022-45405
https://vulners.com/cve/CVE-2022-45406
https://vulners.com/cve/CVE-2022-45408
https://vulners.com/cve/CVE-2022-45409
https://vulners.com/cve/CVE-2022-45410
https://vulners.com/cve/CVE-2022-45411
https://vulners.com/cve/CVE-2022-45412
https://vulners.com/cve/CVE-2022-45416
https://vulners.com/cve/CVE-2022-45418
https://vulners.com/cve/CVE-2022-45420
https://vulners.com/cve/CVE-2022-45421
(* Security fix *)

Where to find the new packages:

Thanks to the friendly folks at the OSU Open Source Lab
(http://osuosl.org) for donating FTP and rsync hosting
to the Slackware project! :-)

Also see the “Get Slack” section on http://slackware.com for
additional mirror sites near you.

Updated package for Slackware 15.0:
ftp://ftp.slackware.com/pub/slackware/slackware-15.0/patches/packages/mozilla-firefox-102.5.0esr-i686-1_slack15.0.txz

Updated package for Slackware x86_64 15.0:
ftp://ftp.slackware.com/pub/slackware/slackware64-15.0/patches/packages/mozilla-firefox-102.5.0esr-x86_64-1_slack15.0.txz

Updated package for Slackware -current:
ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/xap/mozilla-firefox-107.0-i686-1.txz

Updated package for Slackware x86_64 -current:
ftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/xap/mozilla-firefox-107.0-x86_64-1.txz

MD5 signatures:

Slackware 15.0 package:
e196f266ce2fc4b70a9260aa113f839e mozilla-firefox-102.5.0esr-i686-1_slack15.0.txz

Slackware x86_64 15.0 package:
05b262952f385387175893d225b57cfe mozilla-firefox-102.5.0esr-x86_64-1_slack15.0.txz

Slackware -current package:
01901a0ca26c3ed6d847897ca1f84f39 xap/mozilla-firefox-107.0-i686-1.txz

Slackware x86_64 -current package:
c588b3212d70afbd869195d34babd8a4 xap/mozilla-firefox-107.0-x86_64-1.txz

Installation instructions:

Upgrade the package as root:
> upgradepkg mozilla-firefox-102.5.0esr-i686-1_slack15.0.txz

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

EPSS

0.002

Percentile

59.3%