SeaMonkey: Multiple vulnerabilities — GLSA 202012-02

Multiple vulnerabilities have been found in SeaMonkey, the worst of which could result in the arbitrary execution of code.

Affected packages

www-client/seamonkey on all architectures
Affected versions < 2.53.5.1
Unaffected versions >= 2.53.5
www-client/seamonkey-bin on all architectures
Affected versions <= 2.49.1_rc2
Unaffected versions

Background

The SeaMonkey project is a community effort to deliver production-quality releases of code derived from the application formerly known as “Mozilla Application Suite”.

Description

Multiple vulnerabilities have been discovered in SeaMonkey. Please review referenced release notes for more details.

Impact

Please review the referenced release notes for details.

Workaround

There is no known workaround at this time.

Resolution

All SeaMonkey users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=www-client/seamonkey-2.53.5.1"
 

Gentoo has discontinued support for the SeaMonkey binary package. We recommend that users unmerge the SeaMonkey binary package:

# emerge --unmerge “www-client/seamonkey-bin”

NOTE: The Gentoo developer(s) maintaining the SeaMonkey binary package have discontinued support at this time. It may be possible that a new Gentoo developer will update it at a later date. The alternative is using the standard SeaMonkey package.

References

Release date
December 07, 2020

Latest revision
December 07, 2020: 1

Severity
normal

Exploitable
local, remote

Bugzilla entries