First published: Mon Jun 15 2020(Updated: )
An issue was discovered in ecma/operations/ecma-container-object.c in JerryScript 2.2.0. Operations with key/value pairs did not consider the case where garbage collection is triggered after the key operation but before the value operation, as demonstrated by improper read access to memory in ecma_gc_set_object_visited in ecma/base/ecma-gc.c.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
JerryScript | =2.2.0 |
https://github.com/jerryscript-project/jerryscript/commit/c2b662170245a16f46ce02eae68815c325d99821
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-14163 is classified as a moderate severity vulnerability.
To address CVE-2020-14163, update to a version of JerryScript later than 2.2.0 that includes the fix.
CVE-2020-14163 affects the ecma/operations/ecma-container-object.c component in JerryScript version 2.2.0.
CVE-2020-14163 is a memory management vulnerability related to improper read access.
CVE-2020-14163 is not explicitly a remote vulnerability, but improper memory access can lead to various exploits.