Description
A flaw has been found in quickjs-ng quickjs up to 0.11.0. Affected by this vulnerability is the function js_typed_array_constructor_ta of the file quickjs.c. This manipulation causes heap-based buffer overflow. The attack is possible to be carried out remotely. The exploit has been published and may be used. Patch name: 53aebe66170d545bb6265906fe4324e4477de8b4. It is suggested to install a patch to address this issue.
Problem types
Product status
0.2
0.3
0.4
0.5
0.6
0.7
0.8
0.9
0.10
0.11.0
Timeline
| 2026-01-18: | Advisory disclosed |
| 2026-01-18: | VulDB entry created |
| 2026-01-31: | VulDB entry last update |
Credits
mcsky23 (VulDB User)
References
vuldb.com/?id.341738 (VDB-341738 | quickjs-ng quickjs quickjs.c js_typed_array_constructor_ta heap-based overflow)
vuldb.com/?ctiid.341738 (VDB-341738 | CTI Indicators (IOB, IOC, IOA))
vuldb.com/?submit.735539 (Submit #735539 | quickjs-ng quickjs v0.11.0 Heap-based Buffer Overflow)
github.com/quickjs-ng/quickjs/issues/1305
github.com/quickjs-ng/quickjs/pull/1306
github.com/quickjs-ng/quickjs/issues/1305
github.com/...ommit/53aebe66170d545bb6265906fe4324e4477de8b4
github.com/quickjs-ng/quickjs/