CVE-2022-1212Use After Free in Mruby

CWE-416Use After Free4 documents4 sources
Severity
9.8CRITICALNVD
EPSS
0.3%
top 44.03%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedApr 5
Latest updateApr 6

Description

Use-After-Free in str_escape in mruby/mruby in GitHub repository mruby/mruby prior to 3.2. Possible arbitrary code execution if being exploited.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9

Affected Packages4 packages

debiandebian/mruby< mruby 3.0.0-4 (bookworm)
CVEListV5mruby/mruby_mrubyunspecified3.2
Debianmruby/mruby< 3.0.0-4+2
NVDmruby/mruby3.0.0+1

Patches

🔴Vulnerability Details

2
GHSA
GHSA-xh66-6mj6-94rg: Use-After-Free in str_escape in mruby/mruby in GitHub repository mruby/mruby prior to 32022-04-06
OSV
CVE-2022-1212: Use-After-Free in str_escape in mruby/mruby in GitHub repository mruby/mruby prior to 32022-04-05

📋Vendor Advisories

1
Debian
CVE-2022-1212: mruby - Use-After-Free in str_escape in mruby/mruby in GitHub repository mruby/mruby pri...2022