[GLSA-201701-35] Mozilla SeaMonkey: Multiple vulnerabilities
Multiple vulnerabilities have been found in Mozilla SeaMonkey, the worst of which could lead to the remote execution of arbitrary code.
Background
Mozilla SeaMonkey is a free and open-source Internet suite. It is the
continuation of the former Mozilla Application Suite, based on the same
source code.
Description
Multiple vulnerabilities have been discovered in Mozilla SeaMonkey.
Please review the CVE identifiers referenced below for details.
Impact
A remote attacker could possibly execute arbitrary code with the
privileges of the process, cause a Denial of Service condition, or obtain
sensitive information.
Workaround
There is no known workaround at this time.
Resolution
All Mozilla SeaMonkey users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=www-client/seamonkey-2.46-r1"
All Mozilla SeaMonkey-bin users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=www-client/seamonkey-bin-2.46"
Package | Affected Version |
---|---|
pkg:ebuild/www-client/seamonkey?distro=gentoo | < 2.46-r1 |
pkg:ebuild/www-client/seamonkey-bin?distro=gentoo | < 2.46 |
Package | Unaffected Version |
---|---|
pkg:ebuild/www-client/seamonkey?distro=gentoo | >= 2.46-r1 |
pkg:ebuild/www-client/seamonkey-bin?distro=gentoo | >= 2.46 |
- ID
- GLSA-201701-35
- Severity
- normal
- URL
- https://security.gentoo.org/glsa/201701-35
- Published
-
2017-01-13T00:00:00
(7 years ago) - Modified
-
2017-01-13T00:00:00
(7 years ago) - Rights
- Gentoo Foundation, Inc.
- Other Advisories
-
- ALAS-2016-696
- ASA-201612-1
- ASA-201612-2
- CISA-2023:0622
- DSA-3477-1
- DSA-3479-1
- DSA-3491-1
- DSA-3728-1
- DSA-3730-1
- ELSA-2016-0197
- ELSA-2016-0594
- ELSA-2016-2843
- ELSA-2016-2850
- FEDORA-2016-338a7e9925
- FEDORA-2016-4154a4d0ba
- FREEBSD:18F39FB6-7400-4063-ACAF-0806E92C094F
- FREEBSD:8F10FA04-CF6A-11E5-96D6-14DAE9D210B8
- GLSA-201605-06
- GLSA-201701-15
- GLSA-201701-63
- MFSA-2016-92
- openSUSE-SU-2016:3019-1
- RHSA-2016:0197
- RHSA-2016:0258
- RHSA-2016:0594
- RHSA-2016:0695
- RHSA-2016:2843
- RHSA-2016:2850
- SSA:2016-336-01
- SSA:2016-336-02
- SUSE-SU-2016:0554-1
- SUSE-SU-2016:0564-1
- SUSE-SU-2016:0584-1
- SUSE-SU-2016:0779-1
- SUSE-SU-2016:3048-1
- SUSE-SU-2016:3080-1
- SUSE-SU-2016:3105-1
- USN-2902-1
- USN-2904-1
- USN-3140-1
- USN-3141-1
- VU:791496
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:ebuild/www-client/seamonkey?distro=gentoo | www-client | seamonkey | < 2.46-r1 | gentoo | ||
Unaffected | pkg:ebuild/www-client/seamonkey?distro=gentoo | www-client | seamonkey | >= 2.46-r1 | gentoo | ||
Affected | pkg:ebuild/www-client/seamonkey-bin?distro=gentoo | www-client | seamonkey-bin | < 2.46 | gentoo | ||
Unaffected | pkg:ebuild/www-client/seamonkey-bin?distro=gentoo | www-client | seamonkey-bin | >= 2.46 | gentoo |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |