A vulnerability was determined in quickjs-ng quickjs up to 0.11.0. This vulnerability affects the function jstypedarray_constructor of the file quickjs.c. Executing a manipulation can lead to heap-based buffer overflow. The attack may be launched remotely. The exploit has been publicly disclosed and may be utilized. This patch is called c5d80831e51e48a83eab16ea867be87f091783c5. A patch should be applied to remediate this issue.
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-0821.json"
[
{
"source": "https://github.com/quickjs-ng/quickjs/commit/c5d80831e51e48a83eab16ea867be87f091783c5",
"digest": {
"line_hashes": [
"156966015778241022997155822889589072122",
"327637216839275509669170862799182210209",
"20361890462439713804690032294639562237",
"236119915891077895144408613444768543000"
],
"threshold": 0.9
},
"signature_version": "v1",
"deprecated": false,
"signature_type": "Line",
"target": {
"file": "quickjs.c"
},
"id": "CVE-2026-0821-748b75a9"
},
{
"source": "https://github.com/quickjs-ng/quickjs/commit/c5d80831e51e48a83eab16ea867be87f091783c5",
"digest": {
"length": 1800.0,
"function_hash": "284441466894633094989861512996126270919"
},
"signature_version": "v1",
"deprecated": false,
"signature_type": "Function",
"target": {
"file": "quickjs.c",
"function": "js_typed_array_constructor"
},
"id": "CVE-2026-0821-f21fd842"
}
]