[SSA:2023-045-01] mozilla-firefox
New mozilla-firefox packages are available for Slackware 15.0 and -current to
fix security issues.
Here are the details from the Slackware 15.0 ChangeLog
patches/packages/mozilla-firefox-102.8.0esr-i686-1_slack15.0.txz: Upgraded.
This update contains security fixes and improvements.
For more information, see:
https://www.mozilla.org/en-US/firefox/102.8.0/releasenotes/
https://www.mozilla.org/en-US/security/advisories/mfsa2023-06/
https://www.cve.org/CVERecord?id=CVE-2023-25728
https://www.cve.org/CVERecord?id=CVE-2023-25730
https://www.cve.org/CVERecord?id=CVE-2023-25743
https://www.cve.org/CVERecord?id=CVE-2023-0767
https://www.cve.org/CVERecord?id=CVE-2023-25735
https://www.cve.org/CVERecord?id=CVE-2023-25737
https://www.cve.org/CVERecord?id=CVE-2023-25738
https://www.cve.org/CVERecord?id=CVE-2023-25739
https://www.cve.org/CVERecord?id=CVE-2023-25729
https://www.cve.org/CVERecord?id=CVE-2023-25732
https://www.cve.org/CVERecord?id=CVE-2023-25734
https://www.cve.org/CVERecord?id=CVE-2023-25742
https://www.cve.org/CVERecord?id=CVE-2023-25746
(* Security fix *)
Where to find the new packages
Thanks to the friendly folks at the OSU Open Source Lab
(http://osuosl.org) for donating FTP and rsync hosting
to the Slackware project! :-)
Also see the "Get Slack" section on http://slackware.com for
additional mirror sites near you.
Updated package for Slackware 15.0:
ftp://ftp.slackware.com/pub/slackware/slackware-15.0/patches/packages/mozilla-firefox-102.8.0esr-i686-1_slack15.0.txz
Updated package for Slackware x86_64 15.0:
ftp://ftp.slackware.com/pub/slackware/slackware64-15.0/patches/packages/mozilla-firefox-102.8.0esr-x86_64-1_slack15.0.txz
Updated package for Slackware -current:
ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/xap/mozilla-firefox-110.0-i686-1.txz
Updated package for Slackware x86_64 -current:
ftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/xap/mozilla-firefox-110.0-x86_64-1.txz
MD5 signatures
Slackware 15.0 package:
8dd0e1d54bae04be723ed3eee3ff7765 mozilla-firefox-102.8.0esr-i686-1_slack15.0.txz
Slackware x86_64 15.0 package:
3ecf20d3cda7fb71c8327c2cc86e1f3d mozilla-firefox-102.8.0esr-x86_64-1_slack15.0.txz
Slackware -current package:
b723b4cbe8ca21217b9f27fee0397f21 xap/mozilla-firefox-110.0-i686-1.txz
Slackware x86_64 -current package:
d7a2ec12738545cfd58d258c7eca74a2 xap/mozilla-firefox-110.0-x86_64-1.txz
Installation instructions
Upgrade the package as root:
# upgradepkg mozilla-firefox-102.8.0esr-i686-1_slack15.0.txz
- ID
- SSA:2023-045-01
- Severity
- high
- Severity from
- CVE-2023-0767
- URL
- http://www.slackware.com/security/viewer.php?l=slackware-security&y=2023&m=slackware-security.408363
- Published
-
2023-02-15T03:05:52
(19 months ago) - Modified
-
2023-02-15T03:05:52
(19 months ago) - Rights
- Slackware Linux Security Team
- Other Advisories
-
- ALAS-2023-1736
- ALAS2-2023-1983
- ALAS2-2023-1992
- ALPINE:CVE-2023-0767
- ALPINE:CVE-2023-25728
- ALPINE:CVE-2023-25729
- ALPINE:CVE-2023-25730
- ALPINE:CVE-2023-25732
- ALPINE:CVE-2023-25734
- ALPINE:CVE-2023-25735
- ALPINE:CVE-2023-25737
- ALPINE:CVE-2023-25738
- ALPINE:CVE-2023-25739
- ALPINE:CVE-2023-25742
- ALPINE:CVE-2023-25746
- ALSA-2023:0808
- ALSA-2023:0810
- ALSA-2023:0821
- ALSA-2023:0824
- ALSA-2023:1252
- ALSA-2023:1368
- DSA-5350-1
- DSA-5353-1
- DSA-5355-1
- ELSA-2023-0808
- ELSA-2023-0810
- ELSA-2023-0812
- ELSA-2023-0817
- ELSA-2023-0821
- ELSA-2023-0824
- ELSA-2023-12238
- ELSA-2023-1252
- ELSA-2023-1332
- ELSA-2023-1368
- GLSA-202305-35
- GLSA-202305-36
- MFSA-2023-05
- MFSA-2023-06
- MFSA-2023-07
- RHSA-2023:0808
- RHSA-2023:0810
- RHSA-2023:0812
- RHSA-2023:0817
- RHSA-2023:0821
- RHSA-2023:0824
- RHSA-2023:1252
- RHSA-2023:1332
- RHSA-2023:1368
- RLSA-2023:0808
- RLSA-2023:0810
- RLSA-2023:0821
- RLSA-2023:0824
- RLSA-2023:1252
- RLSA-2023:1368
- SSA:2023-047-01
- SUSE-SU-2023:0434-1
- SUSE-SU-2023:0443-1
- SUSE-SU-2023:0461-1
- SUSE-SU-2023:0466-1
- SUSE-SU-2023:0468-1
- SUSE-SU-2023:0469-1
- SUSE-SU-2023:0599-1
- USN-5880-1
- USN-5892-1
- USN-5892-2
- USN-5943-1
- USN-6120-1
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:slackbuild/slackware/mozilla-firefox?arch=x86_64&distro=slackware64-current | slackware | mozilla-firefox | < 110.0 | slackware64-current | x86_64 | |
Affected | pkg:slackbuild/slackware/mozilla-firefox?arch=x86_64&distro=slackware64-15.0 | slackware | mozilla-firefox | < 102.8.0esr | slackware64-15.0 | x86_64 | |
Affected | pkg:slackbuild/slackware/mozilla-firefox?arch=i686&distro=slackware-current | slackware | mozilla-firefox | < 110.0 | slackware-current | i686 | |
Affected | pkg:slackbuild/slackware/mozilla-firefox?arch=i686&distro=slackware-15.0 | slackware | mozilla-firefox | < 102.8.0esr | slackware-15.0 | i686 |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |