diff options
author | Hans de Graaff <graaff@gentoo.org> | 2024-12-08 09:37:14 +0100 |
---|---|---|
committer | Hans de Graaff <graaff@gentoo.org> | 2024-12-08 09:37:14 +0100 |
commit | 1d924bf2ce696d3bced1206436edce45727db8d9 (patch) | |
tree | 672402e535e02c2bd4d063f052c43f8e6c6b3e49 | |
parent | [ GLSA 202412-12 ] PostgreSQL: Multiple Vulnerabilities (diff) | |
download | glsa-1d924bf2ce696d3bced1206436edce45727db8d9.tar.gz glsa-1d924bf2ce696d3bced1206436edce45727db8d9.tar.bz2 glsa-1d924bf2ce696d3bced1206436edce45727db8d9.zip |
[ GLSA 202412-13 ] Spidermonkey: Multiple Vulnerabilities
Bug: https://bugs.gentoo.org/935552
Bug: https://bugs.gentoo.org/936217
Bug: https://bugs.gentoo.org/937469
Bug: https://bugs.gentoo.org/941176
Signed-off-by: GLSAMaker <glsamaker@gentoo.org>
Signed-off-by: Hans de Graaff <graaff@gentoo.org>
-rw-r--r-- | glsa-202412-13.xml | 88 |
1 files changed, 88 insertions, 0 deletions
diff --git a/glsa-202412-13.xml b/glsa-202412-13.xml new file mode 100644 index 00000000..77a0f6a0 --- /dev/null +++ b/glsa-202412-13.xml @@ -0,0 +1,88 @@ +<?xml version="1.0" encoding="UTF-8"?> +<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd"> +<glsa id="202412-13"> + <title>Spidermonkey: Multiple Vulnerabilities</title> + <synopsis>Multiple vulnerabilities have been discovered in Spidermonkey, the worst of which could lead to arbitrary code execution.</synopsis> + <product type="ebuild">spidermonkey</product> + <announced>2024-12-08</announced> + <revised count="1">2024-12-08</revised> + <bug>935552</bug> + <bug>936217</bug> + <bug>937469</bug> + <bug>941176</bug> + <access>local and remote</access> + <affected> + <package name="dev-lang/spidermonkey" auto="yes" arch="*"> + <unaffected range="ge" slot="115">115.15.0</unaffected> + <vulnerable range="lt" slot="115">115.15.0</vulnerable> + </package> + </affected> + <background> + <p>SpiderMonkey is Mozilla’s JavaScript and WebAssembly Engine, used in Firefox, Servo and various other projects. It is written in C++, Rust and JavaScript. You can embed it into C++ and Rust projects, and it can be run as a stand-alone shell.</p> + </background> + <description> + <p>Multiple vulnerabilities have been discovered in Spidermonkey. Please review the CVE identifiers referenced below for details.</p> + </description> + <impact type="high"> + <p>Please review the referenced CVE identifiers for details.</p> + </impact> + <workaround> + <p>There is no known workaround at this time.</p> + </workaround> + <resolution> + <p>All Spidermonkey users should upgrade to the latest version:</p> + + <code> + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-lang/spidermonkey-115.15.0:115" + </code> + </resolution> + <references> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2024-5693">CVE-2024-5693</uri> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2024-5696">CVE-2024-5696</uri> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2024-5700">CVE-2024-5700</uri> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2024-6601">CVE-2024-6601</uri> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2024-6602">CVE-2024-6602</uri> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2024-6603">CVE-2024-6603</uri> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2024-6604">CVE-2024-6604</uri> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2024-7518">CVE-2024-7518</uri> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2024-7519">CVE-2024-7519</uri> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2024-7520">CVE-2024-7520</uri> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2024-7521">CVE-2024-7521</uri> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2024-7522">CVE-2024-7522</uri> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2024-7523">CVE-2024-7523</uri> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2024-7524">CVE-2024-7524</uri> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2024-7525">CVE-2024-7525</uri> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2024-7526">CVE-2024-7526</uri> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2024-7527">CVE-2024-7527</uri> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2024-7528">CVE-2024-7528</uri> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2024-7529">CVE-2024-7529</uri> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2024-7531">CVE-2024-7531</uri> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2024-8381">CVE-2024-8381</uri> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2024-8382">CVE-2024-8382</uri> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2024-8383">CVE-2024-8383</uri> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2024-8384">CVE-2024-8384</uri> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2024-8385">CVE-2024-8385</uri> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2024-8386">CVE-2024-8386</uri> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2024-8387">CVE-2024-8387</uri> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2024-8389">CVE-2024-8389</uri> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2024-8394">CVE-2024-8394</uri> + <uri>MFSA-2024-25</uri> + <uri>MFSA-2024-26</uri> + <uri>MFSA-2024-28</uri> + <uri>MFSA2024-29</uri> + <uri>MFSA2024-30</uri> + <uri>MFSA2024-31</uri> + <uri>MFSA2024-33</uri> + <uri>MFSA2024-34</uri> + <uri>MFSA2024-35</uri> + <uri>MFSA2024-38</uri> + <uri>MFSA2024-39</uri> + <uri>MFSA2024-40</uri> + <uri>MFSA2024-41</uri> + <uri>MFSA2024-43</uri> + <uri>MFSA2024-44</uri> + </references> + <metadata tag="requester" timestamp="2024-12-08T08:30:35.080391Z">graaff</metadata> + <metadata tag="submitter" timestamp="2024-12-08T08:30:35.086284Z">graaff</metadata> +</glsa> |