Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2026-0822

Опубликовано: 10 янв. 2026
Источник: redhat
CVSS3: 6.3
EPSS Низкий

Описание

A vulnerability was identified in quickjs-ng quickjs up to 0.11.0. This issue affects the function js_typed_array_sort of the file quickjs.c. The manipulation leads to heap-based buffer overflow. Remote exploitation of the attack is possible. The exploit is publicly available and might be used. The identifier of the patch is 53eefbcd695165a3bd8c584813b472cb4a69fbf5. To fix this issue, it is recommended to deploy a patch.

A flaw was found in quickjs-ng. A remote attacker could exploit a heap-based buffer overflow vulnerability by manipulating the js_typed_array_sort function in quickjs.c. This could lead to information disclosure, denial of service, or potentially arbitrary code execution. An exploit for this vulnerability is publicly available.

Отчет

This vulnerability is rated Moderate for Red Hat. A heap-based buffer overflow in the js_typed_array_sort function of quickjs.c in quickjs-ng can be exploited remotely with user interaction. This flaw could lead to information disclosure, denial of service, or arbitrary code execution in affected Red Hat Community Projects, such as radare2 in EPEL and Fedora.

Меры по смягчению последствий

Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.

Дополнительная информация

Статус:

Important
Дефект:
CWE-787
https://bugzilla.redhat.com/show_bug.cgi?id=2428463quickjs-ng: quickjs-ng: Heap-based buffer overflow in js_typed_array_sort function

EPSS

Процентиль: 20%
0.00063
Низкий

6.3 Medium

CVSS3

Связанные уязвимости

CVSS3: 6.3
ubuntu
3 месяца назад

A vulnerability was identified in quickjs-ng quickjs up to 0.11.0. This issue affects the function js_typed_array_sort of the file quickjs.c. The manipulation leads to heap-based buffer overflow. Remote exploitation of the attack is possible. The exploit is publicly available and might be used. The identifier of the patch is 53eefbcd695165a3bd8c584813b472cb4a69fbf5. To fix this issue, it is recommended to deploy a patch.

CVSS3: 6.3
nvd
3 месяца назад

A vulnerability was identified in quickjs-ng quickjs up to 0.11.0. This issue affects the function js_typed_array_sort of the file quickjs.c. The manipulation leads to heap-based buffer overflow. Remote exploitation of the attack is possible. The exploit is publicly available and might be used. The identifier of the patch is 53eefbcd695165a3bd8c584813b472cb4a69fbf5. To fix this issue, it is recommended to deploy a patch.

CVSS3: 6.3
debian
3 месяца назад

A vulnerability was identified in quickjs-ng quickjs up to 0.11.0. Thi ...

CVSS3: 6.3
github
3 месяца назад

A vulnerability was identified in quickjs-ng quickjs up to 0.11.0. This issue affects the function js_typed_array_sort of the file quickjs.c. The manipulation leads to heap-based buffer overflow. Remote exploitation of the attack is possible. The exploit is publicly available and might be used. The identifier of the patch is 53eefbcd695165a3bd8c584813b472cb4a69fbf5. To fix this issue, it is recommended to deploy a patch.

EPSS

Процентиль: 20%
0.00063
Низкий

6.3 Medium

CVSS3