Linux Security
    Linux Security
    Linux Security

    Slackware: 2020-009-01: mozilla-firefox Security Update

    Date
    470
    Posted By
    New mozilla-firefox packages are available for Slackware 14.2 and -current to fix a security issue.
    
    -----BEGIN PGP SIGNED MESSAGE-----
    Hash: SHA1
    
    [slackware-security]  mozilla-firefox (SSA:2020-009-01)
    
    New mozilla-firefox packages are available for Slackware 14.2 and -current to
    fix a security issue.
    
    
    Here are the details from the Slackware 14.2 ChangeLog:
    +--------------------------+
    patches/packages/mozilla-firefox-68.4.1esr-i686-1_slack14.2.txz:  Upgraded.
      This release fixes a critial security issue:
      Mozilla Foundation Security Advisory 2020-03: Incorrect alias information
      in IonMonkey JIT compiler for setting array elements could lead to a type
      confusion. We are aware of targeted attacks in the wild abusing this flaw.
      For more information, see:
        https://www.mozilla.org/en-US/security/advisories/mfsa2020-03/
        https://www.mozilla.org/en-US/firefox/68.4.1/releasenotes/
        https://www.mozilla.org/security/known-vulnerabilities/firefoxESR.html
    
    
    Where to find the new packages:
    +-----------------------------+
    
    Thanks to the friendly folks at the OSU Open Source Lab
    (https://osuosl.org) for donating FTP and rsync hosting
    to the Slackware project!  :-)
    
    Also see the "Get Slack" section on https://slackware.com for
    additional mirror sites near you.
    
    Updated package for Slackware 14.2:
    ftp://ftp.slackware.com/pub/slackware/slackware-14.2/patches/packages/mozilla-firefox-68.4.1esr-i686-1_slack14.2.txz
    
    Updated package for Slackware x86_64 14.2:
    ftp://ftp.slackware.com/pub/slackware/slackware64-14.2/patches/packages/mozilla-firefox-68.4.1esr-x86_64-1_slack14.2.txz
    
    Updated package for Slackware -current:
    ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/xap/mozilla-firefox-68.4.1esr-i686-1.txz
    
    Updated package for Slackware x86_64 -current:
    ftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/xap/mozilla-firefox-68.4.1esr-x86_64-1.txz
    
    
    MD5 signatures:
    +-------------+
    
    Slackware 14.2 package:
    42bc8620e8198534049346b7f32d82bb  mozilla-firefox-68.4.1esr-i686-1_slack14.2.txz
    
    Slackware x86_64 14.2 package:
    5ea87b7096989b8d7e504c94433d70c9  mozilla-firefox-68.4.1esr-x86_64-1_slack14.2.txz
    
    Slackware -current package:
    085d4e56e0bfaec30dacf432af505dda  xap/mozilla-firefox-68.4.1esr-i686-1.txz
    
    Slackware x86_64 -current package:
    283e5f4f41cfbd43ec6e849700802708  xap/mozilla-firefox-68.4.1esr-x86_64-1.txz
    
    
    Installation instructions:
    +------------------------+
    
    Upgrade the package as root:
    # upgradepkg mozilla-firefox-68.4.1esr-i686-1_slack14.2.txz
    
    
    +-----+
    

    Advisories

    LinuxSecurity Poll

    Which aspect of server security are you most interested in learning more about?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /main-polls/38-which-aspect-of-server-security-are-you-most-interested-in-learning-more-about?task=poll.vote&format=json
    38
    radio
    [{"id":"131","title":"Preventing information leakage","votes":"1","type":"x","order":"1","pct":100,"resources":[]},{"id":"132","title":"Firewall considerations","votes":"0","type":"x","order":"2","pct":0,"resources":[]},{"id":"133","title":"Permissions ","votes":"0","type":"x","order":"3","pct":0,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350


    VIEW MORE POLLS

    bottom 200

    Please enable / Bitte aktiviere JavaScript!
    Veuillez activer / Por favor activa el Javascript![ ? ]