
Cloud Vulnerability DB
A community-led vulnerabilities database
Jerryscript version 3.0.0 was discovered to contain a SEGV (Segmentation Violation) vulnerability in the ecmarefobject_inline function located in /jerry-core/ecma/base/ecma-gc.c. The vulnerability was identified and disclosed on December 9, 2021 (GitHub Issue).
The vulnerability manifests as a segmentation fault triggered by a read memory access at an unknown address (0x41b58ab0). The issue occurs within the ecmarefobjectinline function in the garbage collection component of the JerryScript engine. When tested on Ubuntu 18.04.5 LTS with Linux kernel 5.4.0-44-generic x8664, the vulnerability can be reproduced using specific JavaScript code involving Promise operations and Object.assign functionality (GitHub Issue).
When exploited, the vulnerability causes the JerryScript engine to crash due to a segmentation violation, resulting in a denial of service condition. The crash occurs during memory access operations in the garbage collection process, potentially affecting applications that rely on JerryScript for JavaScript execution (GitHub Issue).
The issue was tracked and resolved through GitHub issue #4871 and subsequently fixed in later versions of JerryScript. Users should upgrade to a version newer than 3.0.0 to mitigate this vulnerability (GitHub Issue).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."