| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| Microsoft.ChakraCore | nuget | < 1.11.1 | 1.11.1 |
The vulnerability stems from improper implicit call checks in loop landing pad handling. The commit diff shows critical changes in OptHoistUpdateValueType where: 1) A new IsImplicitCallBailOutCurrentlyNeeded check was added, 2) BailOutOnImplicitCallsPreOp instrumentation was inserted, and 3) Bailout instruction placement was modified. The original code lacked proper guards for implicit calls during JIT optimization of loop operations, which could lead to type confusion or memory corruption when handling objects. The CWE-787 (OOB Write) classification and Microsoft's description of 'handling objects in memory' corroborate that missing checks in this optimization function enabled memory corruption vectors.
A Semantic Attack on Google Gemini - Read the Latest Research