File tree Expand file tree Collapse file tree 2 files changed +54
-0
lines changed
Expand file tree Collapse file tree 2 files changed +54
-0
lines changed Original file line number Diff line number Diff line change 1+ ---
2+ engine : mruby
3+ cve : 2025-7207
4+ ghsa : 48pr-6hvf-39v3
5+ url : https://nvd.nist.gov/vuln/detail/CVE-2025-7207
6+ title : Heap-based buffer overflow vulnerability in mruby 3.4.0-rc2
7+ date : 2025-07-08
8+ description : |
9+ A vulnerability, which was classified as problematic, was found
10+ in mruby up to 3.4.0-rc2. Affected is the function scope_new of
11+ the file mrbgems/mruby-compiler/core/codegen.c of the component
12+ nregs Handler. The manipulation leads to heap-based buffer overflow.
13+ An attack has to be approached locally. The exploit has been
14+ disclosed to the public and may be used. The name of the patch
15+ is 1fdd96104180cc0fb5d3cb086b05ab6458911bb9. It is recommended
16+ to apply a patch to fix this issue.
17+
18+ - Text (not a link)
19+ - https://github.com/user-attachments/files/19619499/mruby_crash.txt
20+
21+ ## RELEASE NOTES
22+ - Found Issue #6509 listed in **unreleased** mruby 3.5 NEWS.md
23+ file listed below.
24+ cvss_v2 : 1.7
25+ cvss_v3 : 5.5
26+ cvss_v4 : 4.4
27+ patched_versions :
28+ - " >= 3.5.0"
29+ related :
30+ url :
31+ - https://nvd.nist.gov/vuln/detail/CVE-2025-7207
32+ - https://github.com/mruby/mruby/blob/master/NEWS.md
33+ - https://github.com/mruby/mruby/commit/1fdd96104180cc0fb5d3cb086b05ab6458911bb9
34+ - https://github.com/mruby/mruby/issues/6509#event-17145516649
35+ - https://github.com/mruby/mruby/issues/6509
36+ - https://vuldb.com/?ctiid.315156
37+ - https://vuldb.com/?id.315156
38+ - https://vuldb.com/?submit.607683
39+ - https://www.wiz.io/vulnerability-database/cve/cve-2025-7207
40+ - https://github.com/advisories/GHSA-48pr-6hvf-39v3
41+ notes : |
42+ - mruby 3.5.0 has not be released as 1/23/2026.
Original file line number Diff line number Diff line change 11---
22engine : ruby
33cve : 2024-27282
4+ ghsa : 63cq-cj6g-qfr2
45url : https://www.ruby-lang.org/en/news/2024/04/23/arbitrary-memory-address-read-regexp-cve-2024-27282/
56title : Arbitrary memory address read vulnerability with Regex search
67date : 2024-04-23
@@ -15,8 +16,19 @@ description: |
1516 * For Ruby 3.1 users: Update to 3.1.5
1617 * For Ruby 3.2 users: Update to 3.2.4
1718 * For Ruby 3.3 users: Update to 3.3.1
19+ cvss_v3 : 6.6
1820patched_versions :
1921 - " ~> 3.0.7"
2022 - " ~> 3.1.5"
2123 - " ~> 3.2.4"
2224 - " >= 3.3.1"
25+ related :
26+ url :
27+ - https://nvd.nist.gov/vuln/detail/CVE-2024-27282
28+ - https://www.ruby-lang.org/en/news/2024/04/23/arbitrary-memory-address-read-regexp-cve-2024-27282
29+ - https://hackerone.com/reports/2122624
30+ - https://lists.debian.org/debian-lts-announce/2024/09/msg00000.html
31+ - https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/27LUWREIFTP3MQAW7QE4PJM4DPAQJWXF
32+ - https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XYDHPHEZI7OQXTQKTDZHGZNPIJH7ZV5N
33+ - https://security.netapp.com/advisory/ntap-20241011-0007
34+ - https://github.com/advisories/GHSA-63cq-cj6g-qfr2
You can’t perform that action at this time.
0 commit comments