Description
In versions of mruby up to and including 1.4.0, an integer overflow exists in src/vm.c::mrb_vm_exec() when handling OP_GETUPVAR in the presence of deep scope nesting, resulting in a use-after-free. An attacker that can cause Ruby code to be run can use this to possibly execute arbitrary code.
References (3)
Core 3
Core References
Exploit, Issue Tracking, Third Party Advisory x_refsource_misc
https://github.com/mruby/mruby/issues/3995
Patch, Third Party Advisory x_refsource_misc
https://github.com/mruby/mruby/commit/1905091634a6a2925c911484434448e568330626
Mailing List, Third Party Advisory mailing-list
x_refsource_mlist
https://lists.debian.org/debian-lts-announce/2022/05/msg00006.html
Scores
CVSS v3
9.8
EPSS
0.0129
EPSS Percentile
79.8%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Details
CWE
CWE-190
Status
published
Products (2)
debian/debian_linux
9.0
mruby/mruby
< 1.4.0
Published
Apr 17, 2018
Tracked Since
Feb 18, 2026