CVE-2024-13903
Publication date 21 March 2025
Last updated 21 March 2025
Ubuntu priority
Cvss 3 Severity Score
A vulnerability was found in quickjs-ng QuickJS up to 0.8.0. It has been declared as problematic. Affected by this vulnerability is the function JS_GetRuntime of the file quickjs.c of the component qjs. The manipulation leads to stack-based buffer overflow. The attack can be launched remotely. Upgrading to version 0.9.0 is able to address this issue. The patch is named 99c02eb45170775a9a679c32b45dd4000ea67aff. It is recommended to upgrade the affected component.
Status
Package | Ubuntu Release | Status |
---|---|---|
quickjs | 24.10 oracular |
Needs evaluation
|
24.04 LTS noble |
Needs evaluation
|
|
22.04 LTS jammy | Not in release | |
20.04 LTS focal | Not in release |
Severity score breakdown
Parameter | Value |
---|---|
Base score |
|
Attack vector | Network |
Attack complexity | Low |
Privileges required | None |
User interaction | Required |
Scope | Unchanged |
Confidentiality | None |
Integrity impact | None |
Availability impact | Low |
Vector | CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L |
References
Other references
- https://www.cve.org/CVERecord?id=CVE-2024-13903
- https://github.com/quickjs-ng/quickjs/issues/775
- https://github.com/quickjs-ng/quickjs/commit/99c02eb45170775a9a679c32b45dd4000ea67aff
- https://github.com/quickjs-ng/quickjs/releases/tag/v0.9.0
- https://vuldb.com/?ctiid.300571
- https://vuldb.com/?id.300571
- https://vuldb.com/?submit.517394