Security
Headlines
HeadlinesLatestCVEs

Headline

Debian Security Advisory 5291-1

Debian Linux Security Advisory 5291-1 - Multiple security issues were discovered in MuJS, a lightweight JavaScript interpreter, which could result in denial of service and potentially the execution of arbitrary code.

Packet Storm
#linux#debian#dos#js#java
-----BEGIN PGP SIGNED MESSAGE-----Hash: SHA512- -------------------------------------------------------------------------Debian Security Advisory DSA-5291-1                   [email protected]://www.debian.org/security/                       Moritz MuehlenhoffNovember 28, 2022                     https://www.debian.org/security/faq- -------------------------------------------------------------------------Package        : mujsCVE ID         : CVE-2022-30974 CVE-2022-30975 CVE-2022-44789Multiple security issues were discovered in MuJS, a lightweightJavaScript interpreter, which could result in denial of serviceand potentially the execution of arbitrary code.For the stable distribution (bullseye), these problems have been fixed inversion 1.1.0-1+deb11u2.We recommend that you upgrade your mujs packages.For the detailed security status of mujs please refer toits security tracker page at:https://security-tracker.debian.org/tracker/mujsFurther information about Debian Security Advisories, how to applythese updates to your system and frequently asked questions can befound at: https://www.debian.org/security/Mailing list: [email protected] PGP SIGNATURE-----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oEne-----END PGP SIGNATURE-----

Related news

Gentoo Linux Security Advisory 202405-06

Gentoo Linux Security Advisory 202405-6 - Multiple vulnerabilities have been discovered in mujs, the worst of which could lead to remote code execution. Versions greater than or equal to 1.3.2 are affected.

CVE-2022-44789: CVE-2022-44789/PublicReferenceURL.txt at main · alalng/CVE-2022-44789

A logical issue in O_getOwnPropertyDescriptor() in Artifex MuJS 1.0.0 through 1.3.1 allows an attacker to achieve Remote Code Execution through memory corruption, via the loading of a crafted JavaScript file.

CVE-2022-30974: [BUG] stack exhaustion in function `compile`, mujs · Issue #162 · ccxvii/mujs

compile in regexp.c in Artifex MuJS through 1.2.0 results in stack consumption because of unlimited recursion, a different issue than CVE-2019-11413.

CVE-2022-30975: [BUG] two null pointer deference mujs-pp · Issue #161 · ccxvii/mujs

In Artifex MuJS through 1.2.0, jsP_dumpsyntax in jsdump.c has a NULL pointer dereference, as demonstrated by mujs-pp.

Packet Storm: Latest News

Debian Security Advisory 5804-1