{"id":"USN-6010-1","summary":"firefox vulnerabilities","details":"Multiple security issues were discovered in Firefox. If a user were\ntricked into opening a specially crafted website, an attacker could\npotentially exploit these to cause a denial of service, obtain sensitive\ninformation across domains, or execute arbitrary code. (CVE-2023-29537,\nCVE-2023-29540, CVE-2023-29543, CVE-2023-29544, CVE-2023-29547,\nCVE-2023-29548, CVE-2023-29549, CVE-2023-29550, CVE-2023-29551)\n\nIrvan Kurniawan discovered that Firefox did not properly manage fullscreen\nnotifications using a combination of window.open, fullscreen requests,\nwindow.name assignments, and setInterval calls. An attacker could\npotentially exploit this issue to perform spoofing attacks. (CVE-2023-29533)\n\nLukas Bernhard discovered that Firefox did not properly manage memory\nwhen doing Garbage Collector compaction. An attacker could potentially\nexploits this issue to cause a denial of service. (CVE-2023-29535)\n\nZx from qriousec discovered that Firefox did not properly validate the\naddress to free a pointer provided to the memory manager. An attacker could\npotentially exploits this issue to cause a denial of service.\n(CVE-2023-29536)\n\nAlexis aka zoracon discovered that Firefox did not properly validate the\nURI received by the WebExtension during a load request. An attacker could\npotentially exploits this to obtain sensitive information. (CVE-2023-29538)\n\nTrung Pham discovered that Firefox did not properly validate the filename\ndirective in the Content-Disposition header. An attacker could possibly\nexploit this to perform reflected file download attacks potentially\ntricking users to install malware. (CVE-2023-29539)\n\nAmeen Basha M K discovered that Firefox did not properly validate downloads\nof files ending in .desktop. An attacker could potentially exploits this\nissue to execute arbitrary code. (CVE-2023-29541)\n","modified":"2026-04-22T10:58:08.935017Z","published":"2023-04-12T06:47:31Z","related":["UBUNTU-CVE-2023-29533","UBUNTU-CVE-2023-29535","UBUNTU-CVE-2023-29536","UBUNTU-CVE-2023-29537","UBUNTU-CVE-2023-29538","UBUNTU-CVE-2023-29539","UBUNTU-CVE-2023-29540","UBUNTU-CVE-2023-29541","UBUNTU-CVE-2023-29543","UBUNTU-CVE-2023-29544","UBUNTU-CVE-2023-29547","UBUNTU-CVE-2023-29548","UBUNTU-CVE-2023-29549","UBUNTU-CVE-2023-29550","UBUNTU-CVE-2023-29551"],"upstream":["CVE-2023-29533","CVE-2023-29535","CVE-2023-29536","CVE-2023-29537","CVE-2023-29538","CVE-2023-29539","CVE-2023-29540","CVE-2023-29541","CVE-2023-29543","CVE-2023-29544","CVE-2023-29547","CVE-2023-29548","CVE-2023-29549","CVE-2023-29550","CVE-2023-29551","UBUNTU-CVE-2023-29533","UBUNTU-CVE-2023-29535","UBUNTU-CVE-2023-29536","UBUNTU-CVE-2023-29537","UBUNTU-CVE-2023-29538","UBUNTU-CVE-2023-29539","UBUNTU-CVE-2023-29540","UBUNTU-CVE-2023-29541","UBUNTU-CVE-2023-29543","UBUNTU-CVE-2023-29544","UBUNTU-CVE-2023-29547","UBUNTU-CVE-2023-29548","UBUNTU-CVE-2023-29549","UBUNTU-CVE-2023-29550","UBUNTU-CVE-2023-29551"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-6010-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-29533"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-29535"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-29536"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-29537"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-29538"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-29539"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-29540"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-29541"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-29543"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-29544"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-29547"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-29548"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-29549"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-29550"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-29551"}],"affected":[{"package":{"name":"firefox","ecosystem":"Ubuntu:18.04:LTS","purl":"pkg:deb/ubuntu/firefox@112.0+build2-0ubuntu0.18.04.1?arch=source&distro=bionic"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"112.0+build2-0ubuntu0.18.04.1"}]}],"versions":["56.0+build6-0ubuntu1","57.0.1+build2-0ubuntu1","59.0.1+build1-0ubuntu1","59.0.2+build1-0ubuntu1","60.0+build2-0ubuntu1","60.0.1+build2-0ubuntu0.18.04.1","60.0.2+build1-0ubuntu0.18.04.1","61.0+build3-0ubuntu0.18.04.1","61.0.1+build1-0ubuntu0.18.04.1","62.0+build2-0ubuntu0.18.04.3","62.0+build2-0ubuntu0.18.04.4","62.0+build2-0ubuntu0.18.04.5","62.0.3+build1-0ubuntu0.18.04.1","63.0+build2-0ubuntu0.18.04.2","63.0.3+build1-0ubuntu0.18.04.1","64.0+build3-0ubuntu0.18.04.1","65.0+build2-0ubuntu0.18.04.1","65.0.1+build2-0ubuntu0.18.04.1","66.0+build3-0ubuntu0.18.04.1","66.0.1+build1-0ubuntu0.18.04.1","66.0.2+build1-0ubuntu0.18.04.1","66.0.3+build1-0ubuntu0.18.04.1","66.0.4+build3-0ubuntu0.18.04.1","66.0.5+build1-0ubuntu0.18.04.1","67.0+build2-0ubuntu0.18.04.1","67.0.1+build1-0ubuntu0.18.04.1","67.0.2+build2-0ubuntu0.18.04.1","67.0.3+build1-0ubuntu0.18.04.1","67.0.4+build1-0ubuntu0.18.04.1","68.0+build3-0ubuntu0.18.04.1","68.0.1+build1-0ubuntu0.18.04.1","68.0.2+build1-0ubuntu0.18.04.1","69.0+build2-0ubuntu0.18.04.1","69.0.1+build1-0ubuntu0.18.04.1","69.0.2+build1-0ubuntu0.18.04.1","70.0+build2-0ubuntu0.18.04.1","70.0.1+build1-0ubuntu0.18.04.1","71.0+build5-0ubuntu0.18.04.1","72.0.1+build1-0ubuntu0.18.04.1","72.0.2+build1-0ubuntu0.18.04.1","73.0+build3-0ubuntu0.18.04.1","73.0.1+build1-0ubuntu0.18.04.1","74.0+build3-0ubuntu0.18.04.1","74.0.1+build1-0ubuntu0.18.04.1","75.0+build3-0ubuntu0.18.04.1","76.0+build2-0ubuntu0.18.04.1","76.0.1+build1-0ubuntu0.18.04.1","77.0.1+build1-0ubuntu0.18.04.1","78.0.1+build1-0ubuntu0.18.04.1","78.0.2+build2-0ubuntu0.18.04.1","79.0+build1-0ubuntu0.18.04.1","80.0+build2-0ubuntu0.18.04.1","80.0.1+build1-0ubuntu0.18.04.1","81.0+build2-0ubuntu0.18.04.1","81.0.2+build1-0ubuntu0.18.04.1","82.0+build2-0ubuntu0.18.04.1","82.0.2+build1-0ubuntu0.18.04.1","82.0.3+build1-0ubuntu0.18.04.1","83.0+build2-0ubuntu0.18.04.2","84.0+build3-0ubuntu0.18.04.1","84.0.1+build1-0ubuntu0.18.04.1","84.0.2+build1-0ubuntu0.18.04.1","85.0+build1-0ubuntu0.18.04.1","85.0.1+build1-0ubuntu0.18.04.1","86.0+build3-0ubuntu0.18.04.1","86.0.1+build1-0ubuntu0.18.04.1","87.0+build3-0ubuntu0.18.04.2","88.0+build2-0ubuntu0.18.04.2","88.0.1+build1-0ubuntu0.18.04.2","89.0+build2-0ubuntu0.18.04.2","89.0.1+build1-0ubuntu0.18.04.1","89.0.2+build1-0ubuntu0.18.04.1","90.0+build1-0ubuntu0.18.04.1","90.0.2+build1-0ubuntu0.18.04.1","91.0+build2-0ubuntu0.18.04.1","91.0.1+build1-0ubuntu0.18.04.1","91.0.2+build1-0ubuntu0.18.04.1","92.0+build3-0ubuntu0.18.04.1","93.0+build1-0ubuntu0.18.04.1","94.0+build3-0ubuntu0.18.04.1","95.0+build1-0ubuntu0.18.04.1","95.0.1+build2-0ubuntu0.18.04.1","96.0+build2-0ubuntu0.18.04.1","97.0+build2-0ubuntu0.18.04.1","97.0.2+build1-0ubuntu0.18.04.1","98.0+build3-0ubuntu0.18.04.2","98.0.1+build2-0ubuntu0.18.04.1","98.0.2+build1-0ubuntu0.18.04.1","99.0+build2-0ubuntu0.18.04.2","100.0+build2-0ubuntu0.18.04.1","100.0.2+build1-0ubuntu0.18.04.1","101.0.1+build1-0ubuntu0.18.04.1","102.0+build2-0ubuntu0.18.04.1","103.0+build1-0ubuntu0.18.04.1","104.0+build3-0ubuntu0.18.04.1","105.0+build2-0ubuntu0.18.04.1","106.0.2+build1-0ubuntu0.18.04.1","106.0.5+build1-0ubuntu0.18.04.1","107.0+build2-0ubuntu0.18.04.1","108.0+build2-0ubuntu0.18.04.1","108.0.1+build1-0ubuntu0.18.04.1","108.0.2+build1-0ubuntu0.18.04.1","109.0+build2-0ubuntu0.18.04.1","109.0.1+build1-0ubuntu0.18.04.2","110.0+build3-0ubuntu0.18.04.1","110.0.1+build2-0ubuntu0.18.04.1","111.0+build2-0ubuntu0.18.04.1","111.0.1+build2-0ubuntu0.18.04.1"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_version":"112.0+build2-0ubuntu0.18.04.1","binary_name":"firefox"},{"binary_version":"112.0+build2-0ubuntu0.18.04.1","binary_name":"firefox-geckodriver"},{"binary_version":"112.0+build2-0ubuntu0.18.04.1","binary_name":"firefox-mozsymbols"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-6010-1.json","cves_map":{"cves":[{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2023-29533"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2023-29535"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2023-29536"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2023-29537"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2023-29538"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2023-29539"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2023-29540"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2023-29541"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2023-29543"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2023-29544"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2023-29547"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2023-29548"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2023-29549"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2023-29550"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2023-29551"}],"ecosystem":"Ubuntu:18.04:LTS"}}},{"package":{"name":"firefox","ecosystem":"Ubuntu:20.04:LTS","purl":"pkg:deb/ubuntu/firefox@112.0+build2-0ubuntu0.20.04.1?arch=source&distro=focal"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"112.0+build2-0ubuntu0.20.04.1"}]}],"versions":["69.0.3+build1-0ubuntu1","70.0+build2-0ubuntu1","70.0+build2-0ubuntu2","70.0.1+build1-0ubuntu2","71.0+build2-0ubuntu2","71.0+build5-0ubuntu1","72.0.1+build1-0ubuntu1","72.0.2+build1-0ubuntu1","73.0+build1-0ubuntu1","73.0+build2-0ubuntu1","73.0+build3-0ubuntu1","73.0.1+build1-0ubuntu1","74.0+build1-0ubuntu1","74.0+build2-0ubuntu1","74.0+build2-0ubuntu2","74.0+build3-0ubuntu1","75.0+build3-0ubuntu1","76.0+build2-0ubuntu0.20.04.1","76.0.1+build1-0ubuntu0.20.04.1","77.0.1+build1-0ubuntu0.20.04.1","78.0.1+build1-0ubuntu0.20.04.1","78.0.2+build2-0ubuntu0.20.04.1","79.0+build1-0ubuntu0.20.04.1","80.0+build2-0ubuntu0.20.04.1","80.0.1+build1-0ubuntu0.20.04.1","81.0+build2-0ubuntu0.20.04.1","81.0.2+build1-0ubuntu0.20.04.1","82.0+build2-0ubuntu0.20.04.1","82.0.2+build1-0ubuntu0.20.04.1","82.0.3+build1-0ubuntu0.20.04.1","83.0+build2-0ubuntu0.20.04.1","84.0+build3-0ubuntu0.20.04.1","84.0.1+build1-0ubuntu0.20.04.1","84.0.2+build1-0ubuntu0.20.04.1","85.0+build1-0ubuntu0.20.04.1","85.0.1+build1-0ubuntu0.20.04.1","86.0+build3-0ubuntu0.20.04.1","86.0.1+build1-0ubuntu0.20.04.1","87.0+build3-0ubuntu0.20.04.2","88.0+build2-0ubuntu0.20.04.1","88.0.1+build1-0ubuntu0.20.04.2","89.0+build2-0ubuntu0.20.04.2","89.0.1+build1-0ubuntu0.20.04.1","89.0.2+build1-0ubuntu0.20.04.1","90.0+build1-0ubuntu0.20.04.1","90.0.2+build1-0ubuntu0.20.04.1","91.0+build2-0ubuntu0.20.04.1","91.0.1+build1-0ubuntu0.20.04.1","91.0.2+build1-0ubuntu0.20.04.1","92.0+build3-0ubuntu0.20.04.1","93.0+build1-0ubuntu0.20.04.1","94.0+build3-0ubuntu0.20.04.1","95.0+build1-0ubuntu0.20.04.1","95.0.1+build2-0ubuntu0.20.04.1","96.0+build2-0ubuntu0.20.04.1","97.0+build2-0ubuntu0.20.04.1","97.0.2+build1-0ubuntu0.20.04.1","98.0+build3-0ubuntu0.20.04.2","98.0.1+build2-0ubuntu0.20.04.1","98.0.2+build1-0ubuntu0.20.04.1","99.0+build2-0ubuntu0.20.04.2","100.0+build2-0ubuntu0.20.04.1","100.0.2+build1-0ubuntu0.20.04.1","101.0.1+build1-0ubuntu0.20.04.1","102.0+build2-0ubuntu0.20.04.1","103.0+build1-0ubuntu0.20.04.1","104.0+build3-0ubuntu0.20.04.1","105.0+build2-0ubuntu0.20.04.1","106.0.2+build1-0ubuntu0.20.04.1","106.0.5+build1-0ubuntu0.20.04.1","107.0+build2-0ubuntu0.20.04.1","108.0+build2-0ubuntu0.20.04.1","108.0.1+build1-0ubuntu0.20.04.1","108.0.2+build1-0ubuntu0.20.04.1","109.0+build2-0ubuntu0.20.04.1","109.0.1+build1-0ubuntu0.20.04.2","110.0+build3-0ubuntu0.20.04.1","110.0.1+build2-0ubuntu0.20.04.1","111.0+build2-0ubuntu0.20.04.1","111.0.1+build2-0ubuntu0.20.04.1"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_version":"112.0+build2-0ubuntu0.20.04.1","binary_name":"firefox"},{"binary_version":"112.0+build2-0ubuntu0.20.04.1","binary_name":"firefox-geckodriver"},{"binary_version":"112.0+build2-0ubuntu0.20.04.1","binary_name":"firefox-mozsymbols"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-6010-1.json","cves_map":{"cves":[{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2023-29533"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2023-29535"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2023-29536"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2023-29537"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2023-29538"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2023-29539"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2023-29540"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2023-29541"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2023-29543"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2023-29544"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2023-29547"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2023-29548"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2023-29549"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2023-29550"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2023-29551"}],"ecosystem":"Ubuntu:20.04:LTS"}}}],"schema_version":"1.7.5"}