{"id":"USN-6120-1","summary":"mozjs102 vulnerabilities","details":"Several security issues were discovered in the SpiderMonkey JavaScript\nlibrary. If a user were tricked into opening malicious JavaScript\napplications or processing malformed data, a remote attacker could exploit\na variety of issues related to JavaScript security, including denial of\nservice attacks, and arbitrary code execution.\n","modified":"2026-04-22T11:00:24.242553Z","published":"2023-05-30T14:32:35Z","related":["UBUNTU-CVE-2023-25735","UBUNTU-CVE-2023-25739","UBUNTU-CVE-2023-25751","UBUNTU-CVE-2023-29535","UBUNTU-CVE-2023-29536","UBUNTU-CVE-2023-29548","UBUNTU-CVE-2023-29550","UBUNTU-CVE-2023-32211","UBUNTU-CVE-2023-32215"],"upstream":["CVE-2023-25735","CVE-2023-25739","CVE-2023-25751","CVE-2023-29535","CVE-2023-29536","CVE-2023-29548","CVE-2023-29550","CVE-2023-32211","CVE-2023-32215","UBUNTU-CVE-2023-25735","UBUNTU-CVE-2023-25739","UBUNTU-CVE-2023-25751","UBUNTU-CVE-2023-29535","UBUNTU-CVE-2023-29536","UBUNTU-CVE-2023-29548","UBUNTU-CVE-2023-29550","UBUNTU-CVE-2023-32211","UBUNTU-CVE-2023-32215"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-6120-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-25735"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-25739"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-25751"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-29535"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-29536"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-29548"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-29550"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-32211"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-32215"}],"affected":[{"package":{"name":"mozjs102","ecosystem":"Ubuntu:22.04:LTS","purl":"pkg:deb/ubuntu/mozjs102@102.11.0-0ubuntu0.22.04.1?arch=source&distro=jammy"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"102.11.0-0ubuntu0.22.04.1"}]}],"ecosystem_specific":{"binaries":[{"binary_version":"102.11.0-0ubuntu0.22.04.1","binary_name":"libmozjs-102-0"}],"availability":"No subscription required"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-6120-1.json","cves_map":{"cves":[{"id":"CVE-2023-25735","severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2023-25739","severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2023-25751","severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2023-29535","severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2023-29536","severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2023-29548","severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2023-29550","severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2023-32211","severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2023-32215","severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]}],"ecosystem":"Ubuntu:22.04:LTS"}}}],"schema_version":"1.7.5"}