CVE-2026-1145

Name
CVE-2026-1145
Description
A flaw has been found in quickjs-ng quickjs up to 0.11.0. Affected by this vulnerability is the function js_typed_array_constructor_ta of the file quickjs.c. This manipulation causes heap-based buffer overflow. The attack is possible to be carried out remotely. The exploit has been published and may be used. Patch name: 53aebe66170d545bb6265906fe4324e4477de8b4. It is suggested to install a patch to address this issue.
NVD Severity
unknown
Other trackers
Mailing lists
Exploits
Forges
GitHub (code, issues), Aports (code, issues)

References

Type URI
patch https://github.com/paralin/quickjs/commit/53aebe66170d545bb6265906fe4324e4477de8b4
issue-tracking https://github.com/quickjs-ng/quickjs/issues/1305
exploit https://github.com/quickjs-ng/quickjs/issues/1305#issue-3785444372
issue-tracking https://github.com/quickjs-ng/quickjs/pull/1306
signature https://vuldb.com/?ctiid.341738
vdb-entry https://vuldb.com/?id.341738
third-party-advisory https://vuldb.com/?submit.735539

Match rules

CPE URI Source package Min version Max version
quickjs == 0.1 == None
quickjs == 0.2 == None
quickjs == 0.3 == None
quickjs == 0.4 == None
quickjs == 0.5 == None
quickjs == 0.6 == None
quickjs == 0.7 == None
quickjs == 0.8 == None
quickjs == 0.9 == None
quickjs == 0.10 == None
quickjs == 0.11.0 == None
cpe:2.3:a:quickjs-ng:quickjs:*:*:*:*:*:*:*:* quickjs >= None <= 0.11.0

Vulnerable and fixed packages

Source package Branch Version Maintainer Status
quickjs edge-community 2021-03-27-r5 None possibly vulnerable
quickjs edge-community 0.20250913-r0 Patrycja Rosa <alpine@ptrcnull.me> possibly vulnerable
quickjs edge-community 0.20250426-r0 Patrycja Rosa <alpine@ptrcnull.me> possibly vulnerable
quickjs edge-community 0.20240113-r0 Patrycja Rosa <alpine@ptrcnull.me> possibly vulnerable
quickjs 3.23-community 0.20250426-r0 Patrycja Rosa <alpine@ptrcnull.me> possibly vulnerable