A flaw has been found in quickjs-ng quickjs up to 0.11.0. Affected by this vulnerability is the function jstypedarrayconstructorta of the file quickjs.c. This manipulation causes heap-based buffer overflow. The attack is possible to be carried out remotely. The exploit has been published and may be used. Patch name: 53aebe66170d545bb6265906fe4324e4477de8b4. It is suggested to install a patch to address this issue.
[
{
"target": {
"function": "js_typed_array_constructor_ta",
"file": "quickjs.c"
},
"id": "CVE-2026-1145-40e2724c",
"digest": {
"function_hash": "326923451874279899459817696478252837695",
"length": 1177.0
},
"source": "https://github.com/paralin/quickjs/commit/53aebe66170d545bb6265906fe4324e4477de8b4",
"signature_version": "v1",
"deprecated": false,
"signature_type": "Function"
},
{
"target": {
"file": "quickjs.c"
},
"id": "CVE-2026-1145-b58e4998",
"digest": {
"line_hashes": [
"45372074689032643083731297437076335259",
"333766548650432247447348785694021693565",
"281369126161482718698234805438615858363",
"310271018290203849350849518804908040112"
],
"threshold": 0.9
},
"source": "https://github.com/paralin/quickjs/commit/53aebe66170d545bb6265906fe4324e4477de8b4",
"signature_version": "v1",
"deprecated": false,
"signature_type": "Line"
}
]
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-1145.json"