Skip to content

Commit a888ef6

Browse files
authored
GHSA SYNC: 1 brand new advisory (#970)
1 parent 9be358e commit a888ef6

File tree

1 file changed

+35
-0
lines changed

1 file changed

+35
-0
lines changed

rubies/mruby/CVE-2025-7207.yml

Lines changed: 35 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,35 @@
1+
---
2+
engine: mruby
3+
cve: 2025-7207
4+
ghsa: 48pr-6hvf-39v3
5+
url: https://nvd.nist.gov/vuln/detail/CVE-2025-7207
6+
title: Heap-based buffer overflow vulnerability in mruby 3.4.0
7+
date: 2025-07-08
8+
description: |
9+
A vulnerability, which was classified as problematic, was found
10+
in mruby up to 3.4.0. Affected is the function scope_new of
11+
the file mrbgems/mruby-compiler/core/codegen.c of the component
12+
nregs Handler. The manipulation leads to heap-based buffer overflow.
13+
An attack has to be approached locally. The exploit has been
14+
disclosed to the public and may be used. The name of the patch
15+
is 1fdd96104180cc0fb5d3cb086b05ab6458911bb9. It is recommended
16+
to apply a patch to fix this issue.
17+
cvss_v2: 1.7
18+
cvss_v3: 5.5
19+
cvss_v4: 4.4
20+
notes: |
21+
- Not patched - mruby 3.5.0 has not been released as of 2026/02/07.
22+
- Found Issue #6509 listed in **unreleased** mruby 3.5 file listed below.
23+
related:
24+
url:
25+
- https://nvd.nist.gov/vuln/detail/CVE-2025-7207
26+
- https://github.com/mruby/mruby/blob/6f321251785c2396cb7e6a576ac2080c1adb4491/NEWS.md
27+
- https://github.com/mruby/mruby/commit/1fdd96104180cc0fb5d3cb086b05ab6458911bb9.patch
28+
- https://github.com/mruby/mruby/commit/1fdd96104180cc0fb5d3cb086b05ab6458911bb9
29+
- https://github.com/mruby/mruby/issues/6509#event-17145516649
30+
- https://github.com/mruby/mruby/issues/6509
31+
- https://vuldb.com/?ctiid.315156
32+
- https://vuldb.com/?id.315156
33+
- https://vuldb.com/?submit.607683
34+
- https://www.wiz.io/vulnerability-database/cve/cve-2025-7207
35+
- https://github.com/advisories/GHSA-48pr-6hvf-39v3

0 commit comments

Comments
 (0)