Package: mruby
X-Debbugs-CC: [email protected]
Severity: important
Tags: security

Hi,

The following vulnerability was published for mruby.

CVE-2025-7207[0]:
| A vulnerability, which was classified as problematic, was found in
| mruby up to 3.4.0-rc2. Affected is the function scope_new of the
| file mrbgems/mruby-compiler/core/codegen.c of the component nregs
| Handler. The manipulation leads to heap-based buffer overflow. An
| attack has to be approached locally. The exploit has been disclosed
| to the public and may be used. The name of the patch is
| 1fdd96104180cc0fb5d3cb086b05ab6458911bb9. It is recommended to apply
| a patch to fix this issue.

https://github.com/mruby/mruby/issues/6509
https://github.com/mruby/mruby/commit/1fdd96104180cc0fb5d3cb086b05ab6458911bb9


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2025-7207
    https://www.cve.org/CVERecord?id=CVE-2025-7207

Please adjust the affected versions in the BTS as needed.

Reply via email to