First published: Thu Jan 20 2022(Updated: )
There is an Assertion 'context_p->token.type == LEXER_LITERAL' failed at /jerry-core/parser/js/js-parser-expr.c in JerryScript 3.0.0.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Jerryscript Jerryscript | =3.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2021-46343 is medium with a severity value of 5.5.
CVE-2021-46343 is a vulnerability in JerryScript version 3.0.0 where an assertion 'context_p->token.type == LEXER_LITERAL' fails in the js-parser-expr.c file.
CVE-2021-46343 affects Jerryscript version 3.0.0.
To fix CVE-2021-46343, update to a version of JerryScript that is not affected by this vulnerability.
More information about CVE-2021-46343 can be found at: https://github.com/jerryscript-project/jerryscript/issues/4921