-
CVSS Score
-A Semantic Attack on Google Gemini - Read the Latest Research
The vulnerability stems from a conditional compilation guard (#ifdef TARGET_64) that excluded critical type validation for tagged integers in non-64-bit environments. The patch removes this guard, enabling the missing value check universally. The code in JavascriptArray.cpp's array element handling logic (likely SetItem or related methods) failed to properly validate() whether a tagged integer represented a 'missing' array value, leading to type confusion and out-of-bounds writes. The CWE-787 classification and commit message confirming a type confusion bug align with this analysis.
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| Microsoft.ChakraCore | nuget | < 1.11.2 | 1.11.2 |