User after free in mrb_vm_exec in GitHub repository mruby/mruby prior to 3.2.
References
Link | Resource |
---|---|
https://github.com/mruby/mruby/commit/aaa28a508903041dd7399d4159a8ace9766b022f | Patch Third Party Advisory |
https://huntr.dev/bounties/6597ece9-07af-415b-809b-919ce0a17cf3 | Exploit Patch Third Party Advisory |
Configurations
History
31 Mar 2022, 01:03
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:mruby:mruby:*:*:*:*:*:*:*:* | |
References | (CONFIRM) https://huntr.dev/bounties/6597ece9-07af-415b-809b-919ce0a17cf3 - Exploit, Patch, Third Party Advisory | |
References | (MISC) https://github.com/mruby/mruby/commit/aaa28a508903041dd7399d4159a8ace9766b022f - Patch, Third Party Advisory | |
CWE | CWE-416 | |
CVSS |
v2 : v3 : |
v2 : 6.8
v3 : 8.2 |
26 Mar 2022, 04:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2022-03-26 04:15
Updated : 2024-02-04 22:29
NVD link : CVE-2022-1071
Mitre link : CVE-2022-1071
CVE.ORG link : CVE-2022-1071
JSON object : View
Products Affected
mruby
- mruby
CWE
CWE-416
Use After Free