-
CVSS Score
-The commit adds null checks for exception->GetExceptionContext() and ThrowingFunction() before calling WalkStackForCleaningUpInlineeInfo in three locations. This indicates the original code lacked these checks, allowing null dereference during exception handling. The CWE-787 (out-of-bounds write) classification suggests this null dereference could lead to memory corruption. The vulnerable code paths resided in functions responsible for exception stack walking in JavascriptExceptionOperators.cpp, where improper pointer validation occurred before stack cleanup operations.
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| Microsoft.ChakraCore | nuget | < 1.8.4 | 1.8.4 |