CVE-2025-62490

NameCVE-2025-62490
DescriptionIn quickjs, in js_print_object, when printing an array, the function first fetches the array length and then loops over it. The issue is, printing a value is not side-effect free. An attacker-defined callback could run during js_print_value, during which the array could get resized and len1 become out of bounds. This results in a use-after-free.A second instance occurs in the same function during printing of a map or set objects. The code iterates over ms->records list, but once again, elements could be removed from the list during js_print_value call.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Debian ELTS, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
Debian Bugs1118231

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
quickjs (PTS)forky, sid, trixie2025.04.26-1vulnerable

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
quickjssource(unstable)(unfixed)1118231

Notes

https://issuetracker.google.com/434196651
Fixed in the 2025-09-13 release (https://bellard.org/quickjs/Changelog)

Search for package or bug name: Reporting problems