CVE-2025-62490 Affecting quickjs package, versions *


Severity

Recommended
low

Based on default assessment until relevant scores are available.

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-DEBIAN13-QUICKJS-13601382
  • published17 Oct 2025
  • disclosed16 Oct 2025

Introduced: 16 Oct 2025

NewCVE-2025-62490  (opens in a new tab)

How to fix?

There is no fixed version for Debian:13 quickjs.

NVD Description

Note: Versions mentioned in the description apply only to the upstream quickjs package and not the quickjs package as distributed by Debian. See How to fix? for Debian:13 relevant fixed versions and status.

In quickjs, in js_print_object, when printing an array, the function first fetches the array length and then loops over it. The issue is, printing a value is not side-effect free. An attacker-defined callback could run during js_print_value, during which the array could get resized and len1 become out of bounds. This results in a use-after-free.A second instance occurs in the same function during printing of a map or set objects. The code iterates over ms->records list, but once again, elements could be removed from the list during js_print_value call.