CVE-2026-0822

Name
CVE-2026-0822
Description
A vulnerability was identified in quickjs-ng quickjs up to 0.11.0. This issue affects the function js_typed_array_sort of the file quickjs.c. The manipulation leads to heap-based buffer overflow. Remote exploitation of the attack is possible. The exploit is publicly available and might be used. The identifier of the patch is 53eefbcd695165a3bd8c584813b472cb4a69fbf5. To fix this issue, it is recommended to deploy a patch.
NVD Severity
unknown
Other trackers
Mailing lists
Exploits
Forges
GitHub (code, issues), Aports (code, issues)

References

Type URI
patch https://github.com/quickjs-ng/quickjs/commit/53eefbcd695165a3bd8c584813b472cb4a69fbf5
issue-tracking https://github.com/quickjs-ng/quickjs/issues/1297
exploit https://github.com/quickjs-ng/quickjs/issues/1297#issue-3780006202
issue-tracking https://github.com/quickjs-ng/quickjs/pull/1298
signature https://vuldb.com/?ctiid.340356
vdb-entry https://vuldb.com/?id.340356
third-party-advisory https://vuldb.com/?submit.731783

Match rules

CPE URI Source package Min version Max version
quickjs == 0.1 == None
quickjs == 0.2 == None
quickjs == 0.3 == None
quickjs == 0.4 == None
quickjs == 0.5 == None
quickjs == 0.6 == None
quickjs == 0.7 == None
quickjs == 0.8 == None
quickjs == 0.9 == None
quickjs == 0.10 == None
quickjs == 0.11.0 == None
cpe:2.3:a:quickjs-ng:quickjs:*:*:*:*:*:*:*:* quickjs >= None <= 0.11.0

Vulnerable and fixed packages

Source package Branch Version Maintainer Status
quickjs edge-community 2021-03-27-r5 None possibly vulnerable
quickjs edge-community 0.20250913-r0 Patrycja Rosa <alpine@ptrcnull.me> possibly vulnerable
quickjs edge-community 0.20250426-r0 Patrycja Rosa <alpine@ptrcnull.me> possibly vulnerable
quickjs edge-community 0.20240113-r0 Patrycja Rosa <alpine@ptrcnull.me> possibly vulnerable
quickjs 3.23-community 0.20250426-r0 Patrycja Rosa <alpine@ptrcnull.me> possibly vulnerable