CVE-2022-1212

NameCVE-2022-1212
DescriptionUse-After-Free in str_escape in mruby/mruby in GitHub repository mruby/mruby prior to 3.2. Possible arbitrary code execution if being exploited.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
Debian Bugs1009044

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
mruby (PTS)buster2.0.0-1vulnerable
bullseye2.1.2-3vulnerable
bookworm3.1.0-3fixed
sid, trixie3.3.0-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
mrubysourcestretch(not affected)
mrubysource(unstable)3.0.0-41009044

Notes

[bullseye] - mruby <no-dsa> (Minor issue)
[buster] - mruby <no-dsa> (Minor issue)
[stretch] - mruby <not-affected> (Vulnerable code not present)
https://huntr.dev/bounties/9fcc06d0-08e4-49c8-afda-2cae40946abe/
https://github.com/mruby/mruby/commit/3cf291f72224715942beaf8553e42ba8891ab3c6

Search for package or bug name: Reporting problems