Description
A flaw has been found in quickjs-ng quickjs up to 0.12.1. This affects the function js_iterator_concat_return of the file quickjs.c. This manipulation causes use after free. The attack requires local access. The exploit has been published and may be used. Patch name: daab4ad4bae4ef071ed0294618d6244e92def4cd. Applying a patch is the recommended action to fix this issue.
Problem types
Product status
0.12.1
Timeline
| 2026-03-11: | Advisory disclosed |
| 2026-03-11: | VulDB entry created |
| 2026-03-11: | VulDB entry last update |
Credits
im-razvan (VulDB User)
References
vuldb.com/?id.350414 (VDB-350414 | quickjs-ng quickjs quickjs.c js_iterator_concat_return use after free)
vuldb.com/?ctiid.350414 (VDB-350414 | CTI Indicators (IOB, IOC, IOA))
vuldb.com/?submit.769600 (Submit #769600 | quickjs-ng QuickJS 0.12.1 Use-After-Free)
github.com/quickjs-ng/quickjs/issues/1368
github.com/quickjs-ng/quickjs/pull/1370
github.com/quickjs-ng/quickjs/issues/1368
github.com/...ommit/daab4ad4bae4ef071ed0294618d6244e92def4cd
github.com/quickjs-ng/quickjs/