CVE-2022-1071Use After Free in Mruby

Severity
8.2HIGHNVD
EPSS
0.3%
top 44.82%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMar 26
Latest updateOct 18

Description

User after free in mrb_vm_exec in GitHub repository mruby/mruby prior to 3.2.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:HExploitability: 1.5 | Impact: 6.0

Affected Packages6 packages

debiandebian/mruby< mruby 3.1.0-1 (bookworm)
CVEListV5mruby/mruby_mrubyunspecified3.2
Debianmruby/mruby< 3.1.0-1+2
NVDmruby/mruby3.1

Patches

🔴Vulnerability Details

2
GHSA
GHSA-pv86-xgr9-75fj: User after free in mrb_vm_exec in GitHub repository mruby/mruby prior to 32022-03-27
OSV
CVE-2022-1071: User after free in mrb_vm_exec in GitHub repository mruby/mruby prior to 32022-03-26

📋Vendor Advisories

2
Juniper
CVE-2022-22249: An Improper Control of a Resource Through its Lifetime vulnerability in the Packet Forwarding Engine (PFE) of Juniper Networks Junos OS on MX Series a2022-10-18
Debian
CVE-2022-1071: mruby - User after free in mrb_vm_exec in GitHub repository mruby/mruby prior to 3.2.2022