
Cloud Vulnerability DB
A community-led vulnerabilities database
A Heap-based Buffer Overflow vulnerability was discovered in Homebrew mruby versions prior to 3.2, identified as CVE-2022-0570. The vulnerability was reported and tracked in early 2022, affecting the mruby programming language implementation (NVD, CVE).
The vulnerability is classified as a Heap-based Buffer Overflow (CWE-122) with a CVSS v3.1 base score of 9.8 (CRITICAL) according to NIST assessment, with the vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H. The issue was specifically related to a bug in the gen_values() function within the code generation component, affecting the handling of method calls with 15 arguments and argument packing in arrays (GitHub Patch).
The vulnerability received a critical severity rating due to its potential for complete compromise of system confidentiality, integrity, and availability. With a CVSS score of 9.8, it represents a serious security risk that could allow attackers to execute arbitrary code or cause system crashes (NVD).
The vulnerability was fixed in mruby version 3.2. Users are advised to upgrade to this version or later to mitigate the risk. The fix involved correcting the limit handling for method calls with multiple arguments and improving array argument packing (GitHub Patch).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."