First published: Thu Jul 13 2023(Updated: )
Several security issues were discovered in the SpiderMonkey JavaScript library. If a user were tricked into opening malicious JavaScript applications or processing malformed data, a remote attacker could exploit a variety of issues related to JavaScript security, including denial of service attacks, and arbitrary code execution.
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/libmozjs-102-0 | <102.13.0-0ubuntu0.23.04.1 | 102.13.0-0ubuntu0.23.04.1 |
=23.04 | ||
All of | ||
ubuntu/libmozjs-102-0 | <102.13.0-0ubuntu0.22.10.1 | 102.13.0-0ubuntu0.22.10.1 |
=22.10 | ||
All of | ||
ubuntu/libmozjs-102-0 | <102.13.0-0ubuntu0.22.04.1 | 102.13.0-0ubuntu0.22.04.1 |
=22.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this security issue is USN-6227-1.
The title of this security issue is 'USN-6227-1: SpiderMonkey vulnerabilities'.
The libmozjs-102-0 package in Ubuntu versions 23.04, 22.10, and 22.04 is affected by this vulnerability.
If a user opens malicious JavaScript applications or processes malformed data, a remote attacker could exploit JavaScript security issues, including denial of service attacks.
You can find more information about this vulnerability at the following references: [CVE-2023-37202](https://ubuntu.com/security/CVE-2023-37202), [CVE-2023-37211](https://ubuntu.com/security/CVE-2023-37211), and [USN-6201-1](https://ubuntu.com/security/notices/USN-6201-1).