Required CVE Record Information
Description
The CHECK macro in mrbgems/mruby-sprintf/src/sprintf.c in mruby 1.4.1 contains a signed integer overflow, possibly leading to out-of-bounds memory access because the mrb_str_resize function in string.c does not check for a negative length.
Updated:
This container includes required additional information provided by the CVE Program for this vulnerability.
References 2 Total
- https://github.com/mruby/mruby/issues/4062 x_transferred
- lists.debian.org: [debian-lts-announce] 20220506 [SECURITY] [DLA 2996-1] mruby security update mailing-listx_transferred