Bug#1126752: quickjs: CVE-2026-0822

Salvatore Bonaccorso carnil at debian.org
Sun Feb 1 08:28:11 GMT 2026


Source: quickjs
Version: 2025.04.26-1
Severity: important
Tags: security upstream
Forwarded: https://github.com/quickjs-ng/quickjs/issues/1297
X-Debbugs-Cc: carnil at debian.org, Debian Security Team <team at security.debian.org>

Hi,

The following vulnerability was published for quickjs.

CVE-2026-0822[0]:
| A vulnerability was identified in quickjs-ng quickjs up to 0.11.0.
| This issue affects the function js_typed_array_sort of the file
| quickjs.c. The manipulation leads to heap-based buffer overflow.
| Remote exploitation of the attack is possible. The exploit is
| publicly available and might be used. The identifier of the patch is
| 53eefbcd695165a3bd8c584813b472cb4a69fbf5. To fix this issue, it is
| recommended to deploy a patch.


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2026-0822
    https://www.cve.org/CVERecord?id=CVE-2026-0822
[1] https://github.com/quickjs-ng/quickjs/issues/1297
[2] https://github.com/quickjs-ng/quickjs/pull/1298
[3] https://github.com/quickjs-ng/quickjs/commit/53eefbcd695165a3bd8c584813b472cb4a69fbf5

Regards,
Salvatore



More information about the Pkg-a11y-devel mailing list