CVE-2025-7207Improper Restriction of Operations within the Bounds of a Memory Buffer in Mruby

Severity
4.8MEDIUMNVD
EPSS
0.0%
top 87.56%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJul 9

Description

A vulnerability, which was classified as problematic, was found in mruby up to 3.4.0-rc2. Affected is the function scope_new of the file mrbgems/mruby-compiler/core/codegen.c of the component nregs Handler. The manipulation leads to heap-based buffer overflow. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. The name of the patch is 1fdd96104180cc0fb5d3cb086b05ab6458911bb9. It is recommended to apply a patch to fix this issue.

CVSS vector

CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N

Affected Packages10 packages

NVDmruby/mruby< 3.4.0+1
debiandebian/mruby< mruby 3.4.0-2 (forky)
Debianmruby/mruby< 3.4.0-2
CVEListV5mruby/mruby3.4.0-rc1, 3.4.0-rc2+1

Patches

🔴Vulnerability Details

2
OSV
CVE-2025-7207: A vulnerability, which was classified as problematic, was found in mruby up to 32025-07-09
GHSA
GHSA-48pr-6hvf-39v3: A vulnerability, which was classified as problematic, was found in mruby up to 32025-07-09

📋Vendor Advisories

4
Red Hat
mruby: mruby Heap Buffer Overflow2025-07-09
Microsoft
mruby nregs codegen.c scope_new heap-based overflow2025-07-08
Debian
CVE-2025-7207: mruby - A vulnerability, which was classified as problematic, was found in mruby up to 3...2025
Microsoft
Debian's cpio contains a path traversal vulnerability. This issue was introduced by reverting CVE-2015-1197 patches which had caused a regression in --no-absolute-filenames. Upstream has since provide2024-01-09