UBUNTU-CVE-2023-29532

Source
https://ubuntu.com/security/CVE-2023-29532
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2023/UBUNTU-CVE-2023-29532.json
JSON Data
https://api.test.osv.dev/v1/vulns/UBUNTU-CVE-2023-29532
Upstream
Published
2023-06-19T10:15:00Z
Modified
2025-10-24T05:01:55Z
Severity
  • 5.5 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N CVSS Calculator
  • 5.5 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N CVSS Calculator
  • Ubuntu - negligible
Summary
[none]
Details

A local attacker can trick the Mozilla Maintenance Service into applying an unsigned update file by pointing the service at an update file on a malicious SMB server. The update file can be replaced after the signature check, before the use, because the write-lock requested by the service does not work on a SMB server. Note: This attack requires local system access and only affects Windows. Other operating systems are not affected. This vulnerability affects Firefox < 112, Firefox ESR < 102.10, and Thunderbird < 102.10.

References

Affected packages

Ubuntu:18.04:LTS
mozjs52

Package

Name
mozjs52
Purl
pkg:deb/ubuntu/mozjs52@52.9.1-0ubuntu0.18.04.1?arch=source&distro=bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

52.*
52.3.1-0ubuntu3
52.3.1-7fakesync1
52.8.1-0ubuntu0.18.04.1
52.9.1-0ubuntu0.18.04.1

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "52.9.1-0ubuntu0.18.04.1",
            "binary_name": "libmozjs-52-0"
        },
        {
            "binary_version": "52.9.1-0ubuntu0.18.04.1",
            "binary_name": "libmozjs-52-dev"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2023/UBUNTU-CVE-2023-29532.json"
mozjs38

Package

Name
mozjs38
Purl
pkg:deb/ubuntu/mozjs38@38.8.0~repack1-0ubuntu4?arch=source&distro=bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

38.*
38.8.0~repack1-0ubuntu1
38.8.0~repack1-0ubuntu3
38.8.0~repack1-0ubuntu4

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "38.8.0~repack1-0ubuntu4",
            "binary_name": "libmozjs-38-0"
        },
        {
            "binary_version": "38.8.0~repack1-0ubuntu4",
            "binary_name": "libmozjs-38-dev"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2023/UBUNTU-CVE-2023-29532.json"
Ubuntu:20.04:LTS
mozjs68

Package

Name
mozjs68
Purl
pkg:deb/ubuntu/mozjs68@68.6.0-1ubuntu1?arch=source&distro=focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

68.*
68.5.0-1~fakesync
68.5.0-2~fakesync
68.6.0-1
68.6.0-1ubuntu1

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "68.6.0-1ubuntu1",
            "binary_name": "libmozjs-68-0"
        },
        {
            "binary_version": "68.6.0-1ubuntu1",
            "binary_name": "libmozjs-68-dev"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2023/UBUNTU-CVE-2023-29532.json"
mozjs52

Package

Name
mozjs52
Purl
pkg:deb/ubuntu/mozjs52@52.9.1-1ubuntu3?arch=source&distro=focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

52.*
52.9.1-1build1
52.9.1-1ubuntu3

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "52.9.1-1ubuntu3",
            "binary_name": "libmozjs-52-0"
        },
        {
            "binary_version": "52.9.1-1ubuntu3",
            "binary_name": "libmozjs-52-dev"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2023/UBUNTU-CVE-2023-29532.json"
Ubuntu:22.04:LTS
mozjs78

Package

Name
mozjs78
Purl
pkg:deb/ubuntu/mozjs78@78.15.0-4ubuntu1?arch=source&distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

78.*
78.13.0-1
78.15.0-2
78.15.0-4ubuntu1

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "78.15.0-4ubuntu1",
            "binary_name": "libmozjs-78-0"
        },
        {
            "binary_version": "78.15.0-4ubuntu1",
            "binary_name": "libmozjs-78-dev"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2023/UBUNTU-CVE-2023-29532.json"
mozjs91

Package

Name
mozjs91
Purl
pkg:deb/ubuntu/mozjs91@91.10.0-0ubuntu1?arch=source&distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

91.*
91.5.1-0ubuntu1
91.6.0-1
91.6.0-2
91.7.0-2
91.10.0-0ubuntu1

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "91.10.0-0ubuntu1",
            "binary_name": "libmozjs-91-0"
        },
        {
            "binary_version": "91.10.0-0ubuntu1",
            "binary_name": "libmozjs-91-dev"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2023/UBUNTU-CVE-2023-29532.json"