Описание
A flaw has been found in quickjs-ng quickjs up to 0.11.0. Affected by this vulnerability is the function js_typed_array_constructor_ta of the file quickjs.c. This manipulation causes heap-based buffer overflow. The attack is possible to be carried out remotely. The exploit has been published and may be used. Patch name: 53aebe66170d545bb6265906fe4324e4477de8b4. It is suggested to install a patch to address this issue.
A flaw has been found in quickjs-ng quickjs up to 0.11.0. Affected by this vulnerability is the function js_typed_array_constructor_ta of the file quickjs.c. This manipulation causes heap-based buffer overflow. The attack is possible to be carried out remotely. The exploit has been published and may be used. Patch name: 53aebe66170d545bb6265906fe4324e4477de8b4. It is suggested to install a patch to address this issue.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2026-1145
- https://github.com/quickjs-ng/quickjs/issues/1305
- https://github.com/quickjs-ng/quickjs/issues/1305#issue-3785444372
- https://github.com/quickjs-ng/quickjs/pull/1306
- https://github.com/paralin/quickjs/commit/53aebe66170d545bb6265906fe4324e4477de8b4
- https://vuldb.com/?ctiid.341738
- https://vuldb.com/?id.341738
- https://vuldb.com/?submit.735539
Связанные уязвимости
A flaw has been found in quickjs-ng quickjs up to 0.11.0. Affected by this vulnerability is the function js_typed_array_constructor_ta of the file quickjs.c. This manipulation causes heap-based buffer overflow. The attack is possible to be carried out remotely. The exploit has been published and may be used. Patch name: 53aebe66170d545bb6265906fe4324e4477de8b4. It is suggested to install a patch to address this issue.
A flaw has been found in quickjs-ng quickjs up to 0.11.0. Affected by ...