CVE-2020-14163

An issue was discovered in ecma/operations/ecma-container-object.c in JerryScript 2.2.0. Operations with key/value pairs did not consider the case where garbage collection is triggered after the key operation but before the value operation, as demonstrated by improper read access to memory in ecma_gc_set_object_visited in ecma/base/ecma-gc.c.
Configurations

Configuration 1 (hide)

cpe:2.3:a:jerryscript:jerryscript:2.2.0:*:*:*:*:*:*:*

History

21 Nov 2024, 05:02

Type Values Removed Values Added
References () https://github.com/jerryscript-project/jerryscript/commit/c2b662170245a16f46ce02eae68815c325d99821 - Patch, Vendor Advisory () https://github.com/jerryscript-project/jerryscript/commit/c2b662170245a16f46ce02eae68815c325d99821 - Patch, Vendor Advisory
References () https://github.com/jerryscript-project/jerryscript/issues/3804 - Third Party Advisory () https://github.com/jerryscript-project/jerryscript/issues/3804 - Third Party Advisory

Information

Published : 2020-06-15 21:15

Updated : 2024-11-21 05:02


NVD link : CVE-2020-14163

Mitre link : CVE-2020-14163

CVE.ORG link : CVE-2020-14163


JSON object : View

Products Affected

jerryscript

  • jerryscript
CWE
CWE-125

Out-of-bounds Read