Untriaged
Permalink
CVE-2026-3979
5.3 MEDIUM
- CVSS version: 3.1
- Attack vector (AV):
- Attack complexity (AC):
- Privileges required (PR):
- User interaction (UI):
- Scope (S):
- Confidentiality impact (C):
- Integrity impact (I):
- Availability impact (A):
quickjs-ng quickjs quickjs.c js_iterator_concat_return use after free
A flaw has been found in quickjs-ng quickjs up to 0.12.1. This affects the function js_iterator_concat_return of the file quickjs.c. This manipulation causes use after free. The attack requires local access. The exploit has been published and may be used. Patch name: daab4ad4bae4ef071ed0294618d6244e92def4cd. Applying a patch is the recommended action to fix this issue.
References
-
VDB-350414 | quickjs-ng quickjs quickjs.c js_iterator_concat_return use after free vdb-entrytechnical-description
-
-
Submit #769600 | quickjs-ng QuickJS 0.12.1 Use-After-Free third-party-advisory
-
https://github.com/quickjs-ng/quickjs/issues/1368 issue-tracking
-
-
Affected products
quickjs
- ==0.12.1
- ==0.12.0
Matching in nixpkgs
pkgs.quickjs
Small and embeddable Javascript engine
-
nixos-unstable 2025-09-13-2
- nixpkgs-unstable 2025-09-13-2
- nixos-unstable-small 2025-09-13-2
-
nixos-25.11 2025-09-13-2
- nixos-25.11-small 2025-09-13-2
- nixpkgs-25.11-darwin 2025-09-13-2
pkgs.quickjs-ng
Mighty JavaScript engine
pkgs.python312Packages.quickjs
Python wrapper around the quickjs C library
pkgs.python313Packages.quickjs
Python wrapper around the quickjs C library
pkgs.python314Packages.quickjs
Python wrapper around the quickjs C library
pkgs.haskellPackages.mquickjs-hs
Wrapper for the Micro QuickJS JavaScript Engine
pkgs.python312Packages.llm-tools-quickjs
JavaScript execution as a tool for LLM
pkgs.python313Packages.llm-tools-quickjs
JavaScript execution as a tool for LLM
pkgs.python314Packages.llm-tools-quickjs
JavaScript execution as a tool for LLM
Package maintainers
-
@stesie Stefan Siegl <stesie@brokenpipe.de>
-
@philiptaron Philip Taron <philip.taron@gmail.com>