CVE-2026-0822

Source
https://cve.org/CVERecord?id=CVE-2026-0822
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-0822.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2026-0822
Downstream
Published
2026-01-10T14:15:50.087Z
Modified
2026-01-24T05:51:15.982535Z
Severity
  • 8.8 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

A vulnerability was identified in quickjs-ng quickjs up to 0.11.0. This issue affects the function jstypedarray_sort of the file quickjs.c. The manipulation leads to heap-based buffer overflow. Remote exploitation of the attack is possible. The exploit is publicly available and might be used. The identifier of the patch is 53eefbcd695165a3bd8c584813b472cb4a69fbf5. To fix this issue, it is recommended to deploy a patch.

References

Affected packages

Git / github.com/quickjs-ng/quickjs

Affected ranges

Type
GIT
Repo
https://github.com/quickjs-ng/quickjs
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

v0.*
v0.1.0
v0.10.0
v0.10.1
v0.11.0
v0.2.0
v0.3.0
v0.4.0
v0.4.1
v0.5.0
v0.6.0
v0.6.1
v0.7.0
v0.8.0
v0.9.0

Database specific

vanir_signatures
[
    {
        "deprecated": false,
        "source": "https://github.com/quickjs-ng/quickjs/commit/53eefbcd695165a3bd8c584813b472cb4a69fbf5",
        "id": "CVE-2026-0822-89981903",
        "target": {
            "file": "quickjs.c"
        },
        "digest": {
            "line_hashes": [
                "221265189483854466724266969930705650894",
                "180157400394902877492423119575988212633",
                "261417149805360733305587717256667277687",
                "209855180575166395571799064762558216326",
                "23064162127539292901409734587764150986",
                "48484169574108672671285473899009696117",
                "142713990470531305388359032091295829894",
                "2439747913529096147954548738777968535",
                "26395099272372617053503706308609930138",
                "231457594110955144858437229810931710561",
                "92454995866815835388687160018591987887",
                "242048044833880687552293670674941078791",
                "92887302569926741762017848493348504078",
                "82011142331433907117601593595520058278",
                "275437486605230205373542517716647795944",
                "300522167539562657618326229525062663538",
                "46640522689517796123308765348437623652",
                "58437417712862688762537152636758147191",
                "300372507892049409852952611198413020046",
                "249757613675946163825232858288875836929",
                "90816810553454879909098284059390106878",
                "223215570689575246926567017415893634641"
            ],
            "threshold": 0.9
        },
        "signature_type": "Line",
        "signature_version": "v1"
    },
    {
        "deprecated": false,
        "source": "https://github.com/quickjs-ng/quickjs/commit/53eefbcd695165a3bd8c584813b472cb4a69fbf5",
        "id": "CVE-2026-0822-e68ee6ab",
        "target": {
            "file": "quickjs.c",
            "function": "js_typed_array_sort"
        },
        "digest": {
            "function_hash": "49609613582561837376649369269503961586",
            "length": 3253.0
        },
        "signature_type": "Function",
        "signature_version": "v1"
    }
]
source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-0822.json"