<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for mozjs115</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE-SU-2024:4411-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2024-12-23T12:45:58Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2024-12-23T12:45:58Z</InitialReleaseDate>
    <CurrentReleaseDate>2024-12-23T12:45:58Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for mozjs115</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for mozjs115 fixes the following issues:

- CVE-2024-11498: Fixed resource exhaustion via Stack overflow in libjxl (bsc#1233786)
- CVE-2024-11403: Fixed out of Bounds Memory Read/Write in libjxl (bsc#1233766)
- CVE-2024-50602: Fixed DoS via XML_ResumeParser in libexpat (bsc#1232602)
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">SUSE-2024-4411,SUSE-SLE-Module-Desktop-Applications-15-SP6-2024-4411,openSUSE-SLE-15.6-2024-4411</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244411-1/</URL>
      <Description>Link for SUSE-SU-2024:4411-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://lists.suse.com/pipermail/sle-security-updates/2024-December/020046.html</URL>
      <Description>E-Mail link for SUSE-SU-2024:4411-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1232599</URL>
      <Description>SUSE Bug 1232599</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1232602</URL>
      <Description>SUSE Bug 1232602</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1233766</URL>
      <Description>SUSE Bug 1233766</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1233786</URL>
      <Description>SUSE Bug 1233786</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-11403/</URL>
      <Description>SUSE CVE CVE-2024-11403 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-11498/</URL>
      <Description>SUSE CVE CVE-2024-11498 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-50602/</URL>
      <Description>SUSE CVE CVE-2024-50602 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Module for Desktop Applications 15 SP6">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Module for Desktop Applications 15 SP6">
        <FullProductName ProductID="SUSE Linux Enterprise Module for Desktop Applications 15 SP6" CPE="cpe:/o:suse:sle-module-desktop-applications:15:sp6">SUSE Linux Enterprise Module for Desktop Applications 15 SP6</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="openSUSE Leap 15.6">
      <Branch Type="Product Name" Name="openSUSE Leap 15.6">
        <FullProductName ProductID="openSUSE Leap 15.6" CPE="cpe:/o:opensuse:leap:15.6">openSUSE Leap 15.6</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="libmozjs-115-0-115.4.0-150600.3.6.1">
      <FullProductName ProductID="libmozjs-115-0-115.4.0-150600.3.6.1">libmozjs-115-0-115.4.0-150600.3.6.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mozjs115-115.4.0-150600.3.6.1">
      <FullProductName ProductID="mozjs115-115.4.0-150600.3.6.1">mozjs115-115.4.0-150600.3.6.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mozjs115-devel-115.4.0-150600.3.6.1">
      <FullProductName ProductID="mozjs115-devel-115.4.0-150600.3.6.1">mozjs115-devel-115.4.0-150600.3.6.1</FullProductName>
    </Branch>
    <Relationship ProductReference="libmozjs-115-0-115.4.0-150600.3.6.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for Desktop Applications 15 SP6">
      <FullProductName ProductID="SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libmozjs-115-0-115.4.0-150600.3.6.1">libmozjs-115-0-115.4.0-150600.3.6.1 as a component of SUSE Linux Enterprise Module for Desktop Applications 15 SP6</FullProductName>
    </Relationship>
    <Relationship ProductReference="mozjs115-devel-115.4.0-150600.3.6.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for Desktop Applications 15 SP6">
      <FullProductName ProductID="SUSE Linux Enterprise Module for Desktop Applications 15 SP6:mozjs115-devel-115.4.0-150600.3.6.1">mozjs115-devel-115.4.0-150600.3.6.1 as a component of SUSE Linux Enterprise Module for Desktop Applications 15 SP6</FullProductName>
    </Relationship>
    <Relationship ProductReference="libmozjs-115-0-115.4.0-150600.3.6.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.6">
      <FullProductName ProductID="openSUSE Leap 15.6:libmozjs-115-0-115.4.0-150600.3.6.1">libmozjs-115-0-115.4.0-150600.3.6.1 as a component of openSUSE Leap 15.6</FullProductName>
    </Relationship>
    <Relationship ProductReference="mozjs115-115.4.0-150600.3.6.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.6">
      <FullProductName ProductID="openSUSE Leap 15.6:mozjs115-115.4.0-150600.3.6.1">mozjs115-115.4.0-150600.3.6.1 as a component of openSUSE Leap 15.6</FullProductName>
    </Relationship>
    <Relationship ProductReference="mozjs115-devel-115.4.0-150600.3.6.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.6">
      <FullProductName ProductID="openSUSE Leap 15.6:mozjs115-devel-115.4.0-150600.3.6.1">mozjs115-devel-115.4.0-150600.3.6.1 as a component of openSUSE Leap 15.6</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">There exists an out of bounds read/write in LibJXL versions prior to commit  9cc451b91b74ba470fd72bd48c121e9f33d24c99. The JPEG decoder used by the JPEG XL encoder  when doing JPEG recompression (i.e. if using JxlEncoderAddJPEGFrame on untrusted input) does not properly check bounds in the presence of incomplete codes. This could lead to an out-of-bounds write. In jpegli which is released as part of the same project, the same vulnerability is present. However, the relevant buffer is part of a bigger structure, and the code makes no assumptions on the values that could be overwritten. The issue could however cause jpegli to read uninitialised memory, or addresses of functions.</Note>
    </Notes>
    <CVE>CVE-2024-11403</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libmozjs-115-0-115.4.0-150600.3.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Desktop Applications 15 SP6:mozjs115-devel-115.4.0-150600.3.6.1</ProductID>
        <ProductID>openSUSE Leap 15.6:libmozjs-115-0-115.4.0-150600.3.6.1</ProductID>
        <ProductID>openSUSE Leap 15.6:mozjs115-115.4.0-150600.3.6.1</ProductID>
        <ProductID>openSUSE Leap 15.6:mozjs115-devel-115.4.0-150600.3.6.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244411-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-11403.html</URL>
        <Description>CVE-2024-11403</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1233763</URL>
        <Description>SUSE Bug 1233763</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">There exists a stack buffer overflow in libjxl.  A specifically-crafted file can cause the JPEG XL decoder to use large amounts of stack space (up to 256mb is possible, maybe 512mb), potentially exhausting the stack. An attacker can craft a file that will cause excessive memory usage. We recommend upgrading past commit  65fbec56bc578b6b6ee02a527be70787bbd053b0.</Note>
    </Notes>
    <CVE>CVE-2024-11498</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libmozjs-115-0-115.4.0-150600.3.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Desktop Applications 15 SP6:mozjs115-devel-115.4.0-150600.3.6.1</ProductID>
        <ProductID>openSUSE Leap 15.6:libmozjs-115-0-115.4.0-150600.3.6.1</ProductID>
        <ProductID>openSUSE Leap 15.6:mozjs115-115.4.0-150600.3.6.1</ProductID>
        <ProductID>openSUSE Leap 15.6:mozjs115-devel-115.4.0-150600.3.6.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244411-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-11498.html</URL>
        <Description>CVE-2024-11498</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1233784</URL>
        <Description>SUSE Bug 1233784</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in libexpat before 2.6.4. There is a crash within the XML_ResumeParser function because XML_StopParser can stop/suspend an unstarted parser.</Note>
    </Notes>
    <CVE>CVE-2024-50602</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libmozjs-115-0-115.4.0-150600.3.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Desktop Applications 15 SP6:mozjs115-devel-115.4.0-150600.3.6.1</ProductID>
        <ProductID>openSUSE Leap 15.6:libmozjs-115-0-115.4.0-150600.3.6.1</ProductID>
        <ProductID>openSUSE Leap 15.6:mozjs115-115.4.0-150600.3.6.1</ProductID>
        <ProductID>openSUSE Leap 15.6:mozjs115-devel-115.4.0-150600.3.6.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20244411-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-50602.html</URL>
        <Description>CVE-2024-50602</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1232579</URL>
        <Description>SUSE Bug 1232579</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
