An issue was discovered in ecma/operations/ecma-container-object.c in JerryScript 2.2.0. Operations with key/value pairs did not consider the case where garbage collection is triggered after the key operation but before the value operation, as demonstrated by improper read access to memory in ecma_gc_set_object_visited in ecma/base/ecma-gc.c.
References
Link | Resource |
---|---|
https://github.com/jerryscript-project/jerryscript/commit/c2b662170245a16f46ce02eae68815c325d99821 | Patch Vendor Advisory |
https://github.com/jerryscript-project/jerryscript/issues/3804 | Third Party Advisory |
https://github.com/jerryscript-project/jerryscript/commit/c2b662170245a16f46ce02eae68815c325d99821 | Patch Vendor Advisory |
https://github.com/jerryscript-project/jerryscript/issues/3804 | Third Party Advisory |
Configurations
History
21 Nov 2024, 05:02
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/jerryscript-project/jerryscript/commit/c2b662170245a16f46ce02eae68815c325d99821 - Patch, Vendor Advisory | |
References | () https://github.com/jerryscript-project/jerryscript/issues/3804 - Third Party Advisory |
Information
Published : 2020-06-15 21:15
Updated : 2024-11-21 05:02
NVD link : CVE-2020-14163
Mitre link : CVE-2020-14163
CVE.ORG link : CVE-2020-14163
JSON object : View
Products Affected
jerryscript
- jerryscript
CWE
CWE-125
Out-of-bounds Read