Описание
The CHECK macro in mrbgems/mruby-sprintf/src/sprintf.c in mruby 1.4.1 contains a signed integer overflow, possibly leading to out-of-bounds memory access because the mrb_str_resize function in string.c does not check for a negative length.
| Релиз | Статус | Примечание |
|---|---|---|
| artful | ignored | end of life |
| bionic | ignored | end of standard support, was needs-triage |
| cosmic | ignored | end of life |
| devel | not-affected | 2.0.0-1 |
| disco | not-affected | 2.0.0-1 |
| eoan | not-affected | 2.0.0-1 |
| esm-apps/bionic | needs-triage | |
| esm-apps/focal | not-affected | 2.0.0-1 |
| esm-apps/jammy | not-affected | 2.0.0-1 |
| esm-apps/noble | not-affected | 2.0.0-1 |
Показывать по
EPSS
5 Medium
CVSS2
7.5 High
CVSS3
Связанные уязвимости
The CHECK macro in mrbgems/mruby-sprintf/src/sprintf.c in mruby 1.4.1 contains a signed integer overflow, possibly leading to out-of-bounds memory access because the mrb_str_resize function in string.c does not check for a negative length.
The CHECK macro in mrbgems/mruby-sprintf/src/sprintf.c in mruby 1.4.1 ...
The CHECK macro in mrbgems/mruby-sprintf/src/sprintf.c in mruby 1.4.1 contains a signed integer overflow, possibly leading to out-of-bounds memory access because the mrb_str_resize function in string.c does not check for a negative length.
EPSS
5 Medium
CVSS2
7.5 High
CVSS3