[RLSA-2022:6702] Important: firefox security update
Severity
Important
Affected Packages
2
CVEs
6
An update for firefox is now available for Rocky Linux 8. Rocky Enterprise Software Foundation Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability.
This update upgrades Firefox to version 102.3.0 ESR.
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Package | Affected Version |
---|---|
pkg:rpm/rockylinux/firefox?arch=x86_64&distro=rockylinux-8.6 | < 102.3.0-6.el8_6 |
pkg:rpm/rockylinux/firefox?arch=aarch64&distro=rockylinux-8.6 | < 102.3.0-6.el8_6 |
- ID
- RLSA-2022:6702
- Severity
- important
- URL
- https://errata.rockylinux.org/RLSA-2022:6702
- Published
-
2022-10-13T13:00:49
(23 months ago) - Modified
-
2022-09-26T00:00:00
(2 years ago) - Rights
- Copyright (C) 2022 Rocky Enterprise Software Foundation
- Other Advisories
-
- ALAS2-2022-1900
- ALPINE:CVE-2022-40956
- ALPINE:CVE-2022-40957
- ALPINE:CVE-2022-40958
- ALPINE:CVE-2022-40959
- ALPINE:CVE-2022-40960
- ALPINE:CVE-2022-40962
- ALSA-2022:6700
- ALSA-2022:6702
- ALSA-2022:6708
- ALSA-2022:6717
- DSA-5237-1
- DSA-5238-1
- ELSA-2022-6700
- ELSA-2022-6702
- ELSA-2022-6708
- ELSA-2022-6710
- ELSA-2022-6711
- ELSA-2022-6717
- GLSA-202209-18
- GLSA-202209-27
- MFSA-2022-40
- MFSA-2022-41
- MFSA-2022-42
- RHSA-2022:6700
- RHSA-2022:6702
- RHSA-2022:6708
- RHSA-2022:6710
- RHSA-2022:6711
- RHSA-2022:6717
- RLSA-2022:6708
- SSA:2022-263-02
- SUSE-SU-2022:3396-1
- SUSE-SU-2022:3440-1
- SUSE-SU-2022:3441-1
- SUSE-SU-2022:3800-1
- USN-5649-1
- USN-5724-1
Source | # ID | Name | URL |
---|---|---|---|
CVE | CVE-2022-40956 | https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-40956.json | |
CVE | CVE-2022-40957 | https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-40957.json | |
CVE | CVE-2022-40958 | https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-40958.json | |
CVE | CVE-2022-40959 | https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-40959.json | |
CVE | CVE-2022-40960 | https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-40960.json | |
CVE | CVE-2022-40962 | https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-40962.json |
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:rpm/rockylinux/firefox?arch=x86_64&distro=rockylinux-8.6 | rockylinux | firefox | < 102.3.0-6.el8_6 | rockylinux-8.6 | x86_64 | |
Affected | pkg:rpm/rockylinux/firefox?arch=aarch64&distro=rockylinux-8.6 | rockylinux | firefox | < 102.3.0-6.el8_6 | rockylinux-8.6 | aarch64 |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |