Nixpkgs Security Tracker

Login with GitHub

Details of issue NIXPKGS-2026-0063

NIXPKGS-2026-0063
published on 21 Jan 2026
updated 1 day, 12 hours ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed
    4 packages
    • python312Packages.quickjs
    • python313Packages.quickjs
    • python312Packages.llm-tools-quickjs
    • python313Packages.llm-tools-quickjs
  • @LeSuisse accepted as draft
  • @LeSuisse published on GitHub
quickjs-ng quickjs quickjs.c js_typed_array_constructor_ta heap-based overflow

A flaw has been found in quickjs-ng quickjs up to 0.11.0. Affected by this vulnerability is the function js_typed_array_constructor_ta of the file quickjs.c. This manipulation causes heap-based buffer overflow. The attack is possible to be carried out remotely. The exploit has been published and may be used. Patch name: 53aebe66170d545bb6265906fe4324e4477de8b4. It is suggested to install a patch to address this issue.

Affected products

quickjs
  • ==0.10
  • ==0.1
  • ==0.7
  • ==0.8
  • ==0.2
  • ==0.4
  • ==0.6
  • ==0.9
  • ==0.3
  • ==0.5
  • ==0.11.0

Matching in nixpkgs

Package maintainers: 2