USN-7575-1: MuJS vulnerabilities
Publication date
18 June 2025
Overview
Several security issues were fixed in MuJS.
Releases
Packages
- mujs - Lightweight Javascript interpreter
Details
It was discovered that MuJS did not correctly handle try/finally
statements, which could lead to a buffer overflow. An attacker could
possibly use this issue to cause a denial of service or execute
arbitrary code. (CVE-2021-45005)
Han Zheng discovered that MuJS did not correctly handle recursion, which
could lead to stack exhaustion. An attacker could possibly use this
issue to cause a denial of service. (CVE-2022-30974)
Han Zheng discovered that MuJS did not correctly handle certain memory
operations. An attacker could possibly use this issue to cause a denial
of service. (CVE-2022-30975)
It was discovered that MuJS did not correctly handle try/finally
statements, which could lead to a buffer overflow. An attacker could
possibly use this issue to cause a denial of service or execute
arbitrary code. (CVE-2021-45005)
Han Zheng discovered that MuJS did not correctly handle recursion, which
could lead to stack exhaustion. An attacker could possibly use this
issue to cause a denial of service. (CVE-2022-30974)
Han Zheng discovered that MuJS did not correctly handle certain memory
operations. An attacker could possibly use this issue to cause a denial
of service. (CVE-2022-30975)
Update instructions
In general, a standard system update will make all the necessary changes.
Learn more about how to get the fixes.The problem can be corrected by updating your system to the following package versions:
Ubuntu Release | Package Version | ||
---|---|---|---|
22.04 jammy | libmujs-dev – 1.1.3-3ubuntu0.1~esm1 | ||
libmujs1 – 1.1.3-3ubuntu0.1~esm1 | |||
mujs – 1.1.3-3ubuntu0.1~esm1 |
Reduce your security exposure
Ubuntu Pro provides ten-year security coverage to 25,000+ packages in Main and Universe repositories, and it is free for up to five machines.