First published: Tue Apr 15 2025(Updated: )
It was discovered that QuickJS could be forced to reference uninitialized memory in certain instances. An attacker could possibly use this issue to cause QuickJS to crash, resulting in a denial of service, or execute arbitrary code. (CVE-2023-48183) It was discovered that QuickJS incorrectly managed memory in certain circumstances. An attacker could possibly use this issue to exhaust system resources, resulting in a denial of service. (CVE-2023-48184) It was discovered that QuickJS could be forced to crash due to a failing test. An attacker could possibly use this issue to cause a denial of service. (CVE-2024-33263)
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/libquickjs | <2021.03.27-1ubuntu0.1~esm1 | 2021.03.27-1ubuntu0.1~esm1 |
Ubuntu | =24.04 | |
All of | ||
ubuntu/quickjs | <2021.03.27-1ubuntu0.1~esm1 | 2021.03.27-1ubuntu0.1~esm1 |
Ubuntu | =24.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Contains the following vulnerabilities)
USN-7439-1 addresses a vulnerability in QuickJS that can potentially lead to a denial of service or allow arbitrary code execution.
To fix USN-7439-1, upgrade the affected packages libquickjs and quickjs to version 2021.03.27-1ubuntu0.1~esm1 or later.
The impacts of USN-7439-1 include possible crashes of QuickJS and potential exploitation for executing malicious code.
Ubuntu 24.04 is the only version specifically noted as affected by the vulnerability in USN-7439-1.
USN-7439-1 was published to address the QuickJS vulnerability involving uninitialized memory.