OESA-2023-1138

Source
https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2023-1138
Import Source
https://repo.openeuler.org/security/data/osv/OESA-2023-1138.json
JSON Data
https://api.osv.dev/v1/vulns/OESA-2023-1138
Upstream
Published
2023-03-04T11:04:59Z
Modified
2025-09-03T06:18:34.879576Z
Summary
mujs security update
Details

MuJS is a lightweight Javascript interpreter designed for embedding in other software to extend them with scripting capabilities.

Security Fix(es):

A logical issue in O_getOwnPropertyDescriptor() in Artifex MuJS 1.0.0 through 1.3.x before 1.3.2 allows an attacker to achieve Remote Code Execution through memory corruption, via the loading of a crafted JavaScript file.(CVE-2022-44789)

Database specific
{
    "severity": "High"
}
References

Affected packages

openEuler:22.03-LTS-SP1 / mujs

Package

Name
mujs
Purl
pkg:rpm/openEuler/mujs&distro=openEuler-22.03-LTS-SP1

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.2.0-3.oe2203sp1

Ecosystem specific

{
    "aarch64": [
        "mujs-1.2.0-3.oe2203sp1.aarch64.rpm",
        "mujs-debuginfo-1.2.0-3.oe2203sp1.aarch64.rpm",
        "mujs-debugsource-1.2.0-3.oe2203sp1.aarch64.rpm",
        "mujs-devel-1.2.0-3.oe2203sp1.aarch64.rpm"
    ],
    "src": [
        "mujs-1.2.0-3.oe2203sp1.src.rpm"
    ],
    "x86_64": [
        "mujs-1.2.0-3.oe2203sp1.x86_64.rpm",
        "mujs-devel-1.2.0-3.oe2203sp1.x86_64.rpm",
        "mujs-debuginfo-1.2.0-3.oe2203sp1.x86_64.rpm",
        "mujs-debugsource-1.2.0-3.oe2203sp1.x86_64.rpm"
    ]
}