Debian Package Tracker
Register | Log in
Subscribe

quickjs

small and embeddable Javascript engine

Choose email to subscribe with

general
  • source: quickjs (main)
  • version: 2025.04.26-1
  • maintainer: Debian Accessibility Team (archive) (DMD)
  • uploaders: Sebastian Humenda [DMD] [DM]
  • arch: any
  • std-ver: 4.6.2
  • VCS: Git (Browse, QA)
versions [more versions can be listed by madison] [old versions available from snapshot.debian.org]
[pool directory]
  • testing: 2024.01.13-5
  • unstable: 2025.04.26-1
versioned links
  • 2024.01.13-5: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 2025.04.26-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
binaries
  • libquickjs
  • quickjs
action needed
3 security issues in trixie high

There are 3 open security issues in trixie.

3 important issues:
  • CVE-2024-13903: A vulnerability was found in quickjs-ng QuickJS up to 0.8.0. It has been declared as problematic. Affected by this vulnerability is the function JS_GetRuntime of the file quickjs.c of the component qjs. The manipulation leads to stack-based buffer overflow. The attack can be launched remotely. Upgrading to version 0.9.0 is able to address this issue. The patch is named 99c02eb45170775a9a679c32b45dd4000ea67aff. It is recommended to upgrade the affected component.
  • CVE-2025-46687: quickjs-ng through 0.9.0 has a missing length check in JS_ReadString for a string, leading to a heap-based buffer overflow. QuickJS before 2025-04-26 is also affected.
  • CVE-2025-46688: quickjs-ng through 0.9.0 has an incorrect size calculation in JS_ReadBigInt for a BigInt, leading to a heap-based buffer overflow. QuickJS before 2025-04-26 is also affected.
Created: 2025-03-21 Last update: 2025-05-06 10:03
1 security issue in sid high

There is 1 open security issue in sid.

1 important issue:
  • CVE-2024-13903: A vulnerability was found in quickjs-ng QuickJS up to 0.8.0. It has been declared as problematic. Affected by this vulnerability is the function JS_GetRuntime of the file quickjs.c of the component qjs. The manipulation leads to stack-based buffer overflow. The attack can be launched remotely. Upgrading to version 0.9.0 is able to address this issue. The patch is named 99c02eb45170775a9a679c32b45dd4000ea67aff. It is recommended to upgrade the affected component.
Created: 2025-03-21 Last update: 2025-05-06 10:03
lintian reports 2 warnings normal
Lintian reports 2 warnings about this package. You should make the package lintian clean getting rid of them.
Created: 2025-05-06 Last update: 2025-05-06 04:31
debian/patches: 1 patch to forward upstream low

Among the 2 debian patches available in version 2025.04.26-1 of the package, we noticed the following issues:

  • 1 patch where the metadata indicates that the patch has not yet been forwarded upstream. You should either forward the patch upstream or update the metadata to document its real status.
Created: 2023-02-26 Last update: 2025-05-06 10:03
Standards version of the package is outdated. wishlist
The package should be updated to follow the last version of Debian Policy (Standards-Version 4.7.2 instead of 4.6.2).
Created: 2024-04-07 Last update: 2025-05-05 23:33
testing migrations
  • excuses:
    • Migration status for quickjs (2024.01.13-5 to 2025.04.26-1): Waiting for test results or another package, or too young (no action required now - check later)
    • Issues preventing migration:
    • ∙ ∙ Too young, only 3 of 10 days old
    • Additional info:
    • ∙ ∙ Piuparts tested OK - https://piuparts.debian.org/sid/source/q/quickjs.html
    • ∙ ∙ Reproducible on amd64 - info ♻
    • ∙ ∙ Reproducible on arm64 - info ♻
    • ∙ ∙ Waiting for reproducibility test results on armhf - info ♻
    • ∙ ∙ Reproducible on i386 - info ♻
    • Not considered
news
[rss feed]
  • [2025-05-05] Accepted quickjs 2025.04.26-1 (source) into unstable (Sebastian Humenda)
  • [2024-07-24] quickjs 2024.01.13-5 MIGRATED to testing (Debian testing watch)
  • [2024-07-19] Accepted quickjs 2024.01.13-5 (source) into unstable (Sebastian Humenda)
  • [2024-03-28] quickjs 2024.01.13-4 MIGRATED to testing (Debian testing watch)
  • [2024-03-23] Accepted quickjs 2024.01.13-4 (source) into unstable (Samuel Thibault)
  • [2024-03-22] Accepted quickjs 2024.01.13-3 (source) into unstable (Samuel Thibault)
  • [2024-03-22] Accepted quickjs 2024.01.13-2 (source) into unstable (Sebastian Humenda)
  • [2024-03-20] Accepted quickjs 2024.01.13-1 (source) into unstable (Sebastian Humenda)
  • [2023-02-20] Accepted quickjs 2021.03.27-1 (source amd64) into unstable (Debian FTP Masters) (signed by: Samuel Thibault)
bugs [bug history graph]
  • all: 2
  • RC: 0
  • I&N: 1
  • M&W: 1
  • F&P: 0
  • patch: 0
links
  • homepage
  • lintian (0, 2)
  • buildd: logs, reproducibility, cross
  • popcon
  • browse source code
  • edit tags
  • other distros
  • security tracker
  • screenshots
  • debian patches
ubuntu Ubuntu logo [Information about Ubuntu for Debian Developers]
  • version: 2025.04.26-1

Debian Package Tracker — Copyright 2013-2025 The Distro Tracker Developers
Report problems to the tracker.debian.org pseudo-package in the Debian BTS.
Documentation — Bugs — Git Repository — Contributing