Name | CVE-2025-62490 |
Description | In quickjs, in js_print_object, when printing an array, the function first fetches the array length and then loops over it. The issue is, printing a value is not side-effect free. An attacker-defined callback could run during js_print_value, during which the array could get resized and len1 become out of bounds. This results in a use-after-free.A second instance occurs in the same function during printing of a map or set objects. The code iterates over ms->records list, but once again, elements could be removed from the list during js_print_value call. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Debian ELTS, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
Debian Bugs | 1118231 |
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|---|---|---|
quickjs (PTS) | forky, sid, trixie | 2025.04.26-1 | vulnerable |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|---|---|---|---|---|---|
quickjs | source | (unstable) | (unfixed) | 1118231 |
https://issuetracker.google.com/434196651
Fixed in the 2025-09-13 release (https://bellard.org/quickjs/Changelog)