The following vulnerability was published for quickjs.[reordered]
This was reported by a quickjs fork, but I suppose it also affects
the original quickjs packaged in Debian?
diff --git a/quickjs.c b/quickjs.c
index d0ca6268f..984ab4539 100644
--- a/quickjs.c
+++ b/quickjs.c
@@ -2517,7 +2517,7 @@ JSRuntime *JS_GetRuntime(JSContext *ctx)
static void update_stack_limit(JSRuntime *rt)
{
-#if defined(__wasi__) || (defined(__ASAN__) && !defined(NDEBUG))
+#if defined(__wasi__)
rt->stack_limit = 0; /* no limit */
#else
JSRuntime *JS_GetRuntime(JSContext *ctx)
{
return ctx->rt;
}
Sysop: | Keyop |
---|---|
Location: | Huddersfield, West Yorkshire, UK |
Users: | 482 |
Nodes: | 16 (0 / 16) |
Uptime: | 69:14:00 |
Calls: | 9,571 |
Calls today: | 2 |
Files: | 13,663 |
Messages: | 6,142,216 |