Bug 2426471 - CVE-2025-15284 seamonkey: qs: Denial of Service via improper input validation in array parsing [epel-9]
Summary: CVE-2025-15284 seamonkey: qs: Denial of Service via improper input validation...
Keywords:
Status: CLOSED NOTABUG
Alias: None
Product: Fedora EPEL
Classification: Fedora
Component: seamonkey
Version: epel9
Hardware: Unspecified
OS: Unspecified
high
high
Target Milestone: ---
Assignee: Jan Horak
QA Contact: Fedora Extras Quality Assurance
URL:
Whiteboard: {"flaws": ["91fa4e1f-23b0-47de-8cb9-e...
Depends On:
Blocks: CVE-2025-15284
TreeView+ depends on / blocked
 
Reported: 2025-12-31 17:49 UTC by Marco Benatto
Modified: 2026-01-03 14:21 UTC (History)
3 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed: 2026-01-03 14:21:11 UTC
Type: ---
Embargoed:


Attachments (Terms of Use)

Description Marco Benatto 2025-12-31 17:49:28 UTC
Disclaimer: Community trackers are created by Red Hat Product Security team on a best effort basis. Package maintainers are required to ascertain if the flaw indeed affects their package, before starting the update process.

The following link provides references to all essential vulnerability management information. If something is wrong or missing, please contact a member of PSIRT.
https://spaces.redhat.com/display/PRODSEC/Vulnerability+Management+-+Essential+Documents+for+Engineering+Teams

Comment 1 Dmitry Butskoy 2026-01-03 14:21:11 UTC
SeaMonkey does not use nodejs qs in any way now.


Note You need to log in before you can comment on or make changes to this bug.