Fedora 37: mujs 2022-c4b56e4400 | LinuxSecurity.com
--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2022-c4b56e4400
2022-12-20 01:27:52.482891
--------------------------------------------------------------------------------

Name        : mujs
Product     : Fedora 37
Version     : 1.3.2
Release     : 1.fc37
URL         : https://mujs.com/
Summary     : An embeddable Javascript interpreter
Description :
MuJS is a lightweight Javascript interpreter designed for embedding in
other software to extend them with scripting capabilities.

--------------------------------------------------------------------------------
Update Information:

- Fix CVE-2022-44789 (rhbz#2148261) - Fix CVE-2022-30975 (rhbz#2088596) - Fix
CVE-2022-30974 (rhbz#2088591)
--------------------------------------------------------------------------------
ChangeLog:

* Thu Dec  1 2022 Alain Vigne  1.3.2-1
- upstream release 1.3.2
- Fix CVE-2022-44789 (rhbz#2148261)
- Fix CVE-2022-30975 (rhbz#2088596)
- Fix CVE-2022-30974 (rhbz#2088591)
--------------------------------------------------------------------------------
References:

  [ 1 ] Bug #2088590 - CVE-2022-30974 mujs: stack consumption because of unlimited recursion in compile() in regexp.c [fedora-all]
        https://bugzilla.redhat.com/show_bug.cgi?id=2088590
  [ 2 ] Bug #2088594 - CVE-2022-30975 mujs: NULL pointer dereference in jsP_dumpsyntax() in jsdump.c [fedora-all]
        https://bugzilla.redhat.com/show_bug.cgi?id=2088594
--------------------------------------------------------------------------------

This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade --advisory FEDORA-2022-c4b56e4400' at the command
line. For more information, refer to the dnf documentation available at
https://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------
_______________________________________________
package-announce mailing list -- [email protected]
To unsubscribe send an email to [email protected]
Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: https://lists.fedoraproject.org/archives/list/[email protected]
Do not reply to spam, report it: https://pagure.io/fedora-infrastructure/new_issue

Fedora 37: mujs 2022-c4b56e4400

December 20, 2022
- Fix CVE-2022-44789 (rhbz#2148261) - Fix CVE-2022-30975 (rhbz#2088596) - Fix CVE-2022-30974 (rhbz#2088591)

Summary

MuJS is a lightweight Javascript interpreter designed for embedding in

other software to extend them with scripting capabilities.

Update Information:

- Fix CVE-2022-44789 (rhbz#2148261) - Fix CVE-2022-30975 (rhbz#2088596) - Fix CVE-2022-30974 (rhbz#2088591)

Change Log

* Thu Dec 1 2022 Alain Vigne 1.3.2-1 - upstream release 1.3.2 - Fix CVE-2022-44789 (rhbz#2148261) - Fix CVE-2022-30975 (rhbz#2088596) - Fix CVE-2022-30974 (rhbz#2088591)

References

[ 1 ] Bug #2088590 - CVE-2022-30974 mujs: stack consumption because of unlimited recursion in compile() in regexp.c [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=2088590 [ 2 ] Bug #2088594 - CVE-2022-30975 mujs: NULL pointer dereference in jsP_dumpsyntax() in jsdump.c [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=2088594

Update Instructions

This update can be installed with the "dnf" update program. Use su -c 'dnf upgrade --advisory FEDORA-2022-c4b56e4400' at the command line. For more information, refer to the dnf documentation available at https://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label

Severity
Name : mujs
Product : Fedora 37
Version : 1.3.2
Release : 1.fc37
URL : https://mujs.com/
Summary : An embeddable Javascript interpreter

We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.