CVE-2018-14337 (NVD)

2018-07-17

The CHECK macro in mrbgems/mruby-sprintf/src/sprintf.c in mruby 1.4.1 contains a signed integer overflow, possibly leading to out-of-bounds memory access because the mrb_str_resize function in string.c does not check for a negative length.

Products Debian_linux, Mruby
Type Integer Overflow or Wraparound (CWE-190)
First patch - None (likely due to unavailable code)
Links https://github.com/mruby/mruby/issues/4062
https://lists.debian.org/debian-lts-announce/2022/05/msg00006.html