1 results (0.009 seconds)

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 1

Tremor is an event processing system for unstructured data. A vulnerability exists between versions 0.7.2 and 0.11.6. This vulnerability is a memory safety Issue when using `patch` or `merge` on `state` and assign the result back to `state`. In this case, affected versions of Tremor and the tremor-script crate maintains references to memory that might have been freed already. And these memory regions can be accessed by retrieving the `state`, e.g. send it over TCP or HTTP. • https://github.com/tremor-rs/tremor-runtime/commit/1a2efcdbe68e5e7fd0a05836ac32d2cde78a0b2e https://github.com/tremor-rs/tremor-runtime/pull/1217 https://github.com/tremor-rs/tremor-runtime/releases/tag/v0.11.6 https://github.com/tremor-rs/tremor-runtime/security/advisories/GHSA-mc22-5q92-8v85 • CWE-416: Use After Free CWE-825: Expired Pointer Dereference •