The CHECK macro in mrbgems/mruby-sprintf/src/sprintf.c in mruby 1.4.1 contains a signed integer overflow, possibly leading to out-of-bounds memory access because the mrbstrresize function in string.c does not check for a negative length.
{ "binaries": [ { "binary_version": "1.2.0+20160315+git4f20d58a-1", "binary_name": "libmruby-dev" }, { "binary_version": "1.2.0+20160315+git4f20d58a-1", "binary_name": "mruby" } ] }
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2018/UBUNTU-CVE-2018-14337.json"
{ "binaries": [ { "binary_version": "1.4.0-1", "binary_name": "libmruby-dev" }, { "binary_version": "1.4.0-1", "binary_name": "mruby" } ] }