Skip to content

Commit bb0622b

Browse files
committed
GHSA SYNC: 1 modified and 1 brand new advisory
1 parent ac90497 commit bb0622b

File tree

2 files changed

+54
-0
lines changed

2 files changed

+54
-0
lines changed

rubies/mruby/CVE-2025-7207.yml

Lines changed: 42 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,42 @@
1+
---
2+
engine: mruby
3+
cve: 2025-7207
4+
ghsa: 48pr-6hvf-39v3
5+
url: https://nvd.nist.gov/vuln/detail/CVE-2025-7207
6+
title: Heap-based buffer overflow vulnerability in mruby 3.4.0-rc2
7+
date: 2025-07-08
8+
description: |
9+
A vulnerability, which was classified as problematic, was found
10+
in mruby up to 3.4.0-rc2. Affected is the function scope_new of
11+
the file mrbgems/mruby-compiler/core/codegen.c of the component
12+
nregs Handler. The manipulation leads to heap-based buffer overflow.
13+
An attack has to be approached locally. The exploit has been
14+
disclosed to the public and may be used. The name of the patch
15+
is 1fdd96104180cc0fb5d3cb086b05ab6458911bb9. It is recommended
16+
to apply a patch to fix this issue.
17+
18+
- Text (not a link)
19+
- https://github.com/user-attachments/files/19619499/mruby_crash.txt
20+
21+
## RELEASE NOTES
22+
- Found Issue #6509 listed in **unreleased** mruby 3.5 NEWS.md
23+
file listed below.
24+
cvss_v2: 1.7
25+
cvss_v3: 5.5
26+
cvss_v4: 4.4
27+
patched_versions:
28+
- ">= 3.5.0"
29+
related:
30+
url:
31+
- https://nvd.nist.gov/vuln/detail/CVE-2025-7207
32+
- https://github.com/mruby/mruby/blob/master/NEWS.md
33+
- https://github.com/mruby/mruby/commit/1fdd96104180cc0fb5d3cb086b05ab6458911bb9
34+
- https://github.com/mruby/mruby/issues/6509#event-17145516649
35+
- https://github.com/mruby/mruby/issues/6509
36+
- https://vuldb.com/?ctiid.315156
37+
- https://vuldb.com/?id.315156
38+
- https://vuldb.com/?submit.607683
39+
- https://www.wiz.io/vulnerability-database/cve/cve-2025-7207
40+
- https://github.com/advisories/GHSA-48pr-6hvf-39v3
41+
notes: |
42+
- mruby 3.5.0 has not be released as 1/23/2026.

rubies/ruby/CVE-2024-27282.yml

Lines changed: 12 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,7 @@
11
---
22
engine: ruby
33
cve: 2024-27282
4+
ghsa: 63cq-cj6g-qfr2
45
url: https://www.ruby-lang.org/en/news/2024/04/23/arbitrary-memory-address-read-regexp-cve-2024-27282/
56
title: Arbitrary memory address read vulnerability with Regex search
67
date: 2024-04-23
@@ -15,8 +16,19 @@ description: |
1516
* For Ruby 3.1 users: Update to 3.1.5
1617
* For Ruby 3.2 users: Update to 3.2.4
1718
* For Ruby 3.3 users: Update to 3.3.1
19+
cvss_v3: 6.6
1820
patched_versions:
1921
- "~> 3.0.7"
2022
- "~> 3.1.5"
2123
- "~> 3.2.4"
2224
- ">= 3.3.1"
25+
related:
26+
url:
27+
- https://nvd.nist.gov/vuln/detail/CVE-2024-27282
28+
- https://www.ruby-lang.org/en/news/2024/04/23/arbitrary-memory-address-read-regexp-cve-2024-27282
29+
- https://hackerone.com/reports/2122624
30+
- https://lists.debian.org/debian-lts-announce/2024/09/msg00000.html
31+
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/27LUWREIFTP3MQAW7QE4PJM4DPAQJWXF
32+
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XYDHPHEZI7OQXTQKTDZHGZNPIJH7ZV5N
33+
- https://security.netapp.com/advisory/ntap-20241011-0007
34+
- https://github.com/advisories/GHSA-63cq-cj6g-qfr2

0 commit comments

Comments
 (0)