PT-2026-30006 · Npm · Electron
Published
2026-04-03
·
Updated
2026-04-03
·
CVE-2026-34776
CVSS v3.1
5.3
Medium
| AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:L |
Impact
On macOS and Linux, apps that call
app.requestSingleInstanceLock() were vulnerable to an out-of-bounds heap read when parsing a crafted second-instance message. Leaked memory could be delivered to the app's second-instance event handler.This issue is limited to processes running as the same user as the Electron app.
Apps that do not call
app.requestSingleInstanceLock() are not affected. Windows is not affected by this issue.Workarounds
There are no app side workarounds, developers must update to a patched version of Electron.
Fixed Versions
41.0.040.8.139.8.138.8.6
For more information
If there are any questions or comments about this advisory, please email security@electronjs.org
Fix
Out of bounds Read
Found an issue in the description? Have something to add? Feel free to write us 👾
Weakness Enumeration
Related Identifiers
Affected Products
Electron