CVE-2026-1145
A flaw has been found in quickjs-ng quickjs up to 0.11.0. Affected by this vulnerability is the function jstypedarrayconstructorta of the file quickjs.c. This manipulation causes heap-based buffer overflow. The attack is possible to be carried out remotely. The exploit has been published and may be used. Patch name: 53aebe66170d545bb6265906fe4324e4477de8b4. It is suggested to install a patch to address this issue.
Package Versions Affected
Automatically patch vulnerabilities without upgrading
CVSS Version



Related Resources
References
https://github.com/quickjs-ng/quickjs/, https://vuldb.com/?ctiid.341738, https://vuldb.com/?id.341738, https://vuldb.com/?submit.735539, https://github.com/quickjs-ng/quickjs/issues/1305, https://github.com/quickjs-ng/quickjs/issues/1305#issue-3785444372, https://github.com/quickjs-ng/quickjs/pull/1306, https://vuldb.com/?ctiid.341738, https://github.com/paralin/quickjs/commit/53aebe66170d545bb6265906fe4324e4477de8b4, https://github.com/quickjs-ng/quickjs/pull/1306, https://github.com/quickjs-ng/quickjs/issues/1305, https://github.com/quickjs-ng/quickjs/issues/1305#issue-3785444372
