OSV-2021-1145

See a problem?
Import Source
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/serenity/OSV-2021-1145.yaml
JSON Data
https://api.osv.dev/v1/vulns/OSV-2021-1145
Published
2021-08-19T00:01:22.170463Z
Modified
2022-04-13T03:04:32.186428Z
Summary
Use-after-poison in JS::Reference::put_value
Details

OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=37312

Crash type: Use-after-poison READ 8
Crash state:
JS::Reference::put_value
JS::AssignmentExpression::execute
JS::ExpressionStatement::execute
References

Affected packages

OSS-Fuzz / serenity

Package

Name
serenity
Purl
pkg:generic/serenity

Affected ranges

Type
GIT
Repo
https://github.com/SerenityOS/serenity
Events

Ecosystem specific

{
    "severity": "HIGH"
}

Database specific

{
    "fixed_range": "9bdb44c5d26d8f702264c47a82c75fbb368a7ffc:8fce5caa4938697734c855d2905d0c65073510f0"
}