USN-7439-1

Source
https://ubuntu.com/security/notices/USN-7439-1
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-7439-1.json
JSON Data
https://api.test.osv.dev/v1/vulns/USN-7439-1
Related
Published
2025-04-15T18:24:06.896359Z
Modified
2025-04-15T18:24:06.896359Z
Summary
quickjs vulnerabilities
Details

It was discovered that QuickJS could be forced to reference uninitialized memory in certain instances. An attacker could possibly use this issue to cause QuickJS to crash, resulting in a denial of service, or execute arbitrary code. (CVE-2023-48183)

It was discovered that QuickJS incorrectly managed memory in certain circumstances. An attacker could possibly use this issue to exhaust system resources, resulting in a denial of service. (CVE-2023-48184)

It was discovered that QuickJS could be forced to crash due to a failing test. An attacker could possibly use this issue to cause a denial of service. (CVE-2024-33263)

References

Affected packages

Ubuntu:Pro:24.04:LTS / quickjs

Package

Name
quickjs
Purl
pkg:deb/ubuntu/quickjs@2021.03.27-1ubuntu0.1~esm1?arch=source&distro=esm-apps/noble

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2021.03.27-1ubuntu0.1~esm1

Affected versions

2021.*

2021.03.27-1

Ecosystem specific

{
    "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro",
    "binaries": [
        {
            "binary_version": "2021.03.27-1ubuntu0.1~esm1",
            "binary_name": "libquickjs"
        },
        {
            "binary_version": "2021.03.27-1ubuntu0.1~esm1",
            "binary_name": "quickjs"
        }
    ]
}