[CVE-2018-14337] Check size of the integer multiply before actual overflow 03/211003/1 accepted/tizen_5.5_base_mobile_hotfix tizen_5.5_base_mobile_hotfix accepted/tizen/5.5/base/20191030.083244 accepted/tizen/5.5/base/mobile/hotfix/20201023.085004 accepted/tizen/base/20190805.091713 submit/tizen_5.5_base/20191030.000001 submit/tizen_5.5_base_mobile_hotfix/20201023.171501 submit/tizen_base/20190802.013037 tizen_5.5.m2_release
authorSeonah Moon <seonah1.moon@samsung.com>
Mon, 29 Jul 2019 02:24:28 +0000 (11:24 +0900)
committerSeonah Moon <seonah1.moon@samsung.com>
Mon, 29 Jul 2019 02:24:32 +0000 (11:24 +0900)
commitb317ea41cb2e443282fad0849b9aac5735f2a6b0
treeea3a09df85b1bb5cfad70642e8c1f69714140c2a
parent87bd838a407f83f4e8ebc8fcbbb3cbad21d64349
[CVE-2018-14337] Check size of the integer multiply before actual overflow

detected by AVAS

https://github.com/mruby/mruby/commit/bfd11aab35ab942363359a989712e9a6f35b9295

Change-Id: Iab964c43d43bf427dfa6f5f64653df1ae22ba56f
third-party/mruby/mrbgems/mruby-sprintf/src/sprintf.c