Debian Mruby vulnerabilities
42 known vulnerabilities affecting debian/mruby.
Total CVEs
42
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
CRITICAL7HIGH10MEDIUM5LOW20
Vulnerabilities
Page 2 of 3
CVE-2022-0326LOWCVSS 5.52022
CVE-2022-0326 [MEDIUM] CVE-2022-0326: mruby - NULL Pointer Dereference in Homebrew mruby prior to 3.2.
NULL Pointer Dereference in Homebrew mruby prior to 3.2.
Scope: local
bookworm: resolved
bullseye: resolved
forky: resolved
sid: resolved
trixie: resolved
debian
CVE-2022-0632LOWCVSS 5.52022
CVE-2022-0632 [MEDIUM] CVE-2022-0632: mruby - NULL Pointer Dereference in Homebrew mruby prior to 3.2.
NULL Pointer Dereference in Homebrew mruby prior to 3.2.
Scope: local
bookworm: resolved
bullseye: resolved
forky: resolved
sid: resolved
trixie: resolved
debian
CVE-2022-1106LOWCVSS 9.12022
CVE-2022-1106 [CRITICAL] CVE-2022-1106: mruby - use after free in mrb_vm_exec in GitHub repository mruby/mruby prior to 3.2.
use after free in mrb_vm_exec in GitHub repository mruby/mruby prior to 3.2.
Scope: local
bookworm: resolved
bullseye: resolved
forky: resolved
sid: resolved
trixie: resolved
debian
CVE-2022-0525LOWCVSS 9.12022
CVE-2022-0525 [CRITICAL] CVE-2022-0525: mruby - Out-of-bounds Read in Homebrew mruby prior to 3.2.
Out-of-bounds Read in Homebrew mruby prior to 3.2.
Scope: local
bookworm: resolved
bullseye: resolved
forky: resolved
sid: resolved
trixie: resolved
debian
CVE-2022-0631LOWCVSS 9.82022
CVE-2022-0631 [CRITICAL] CVE-2022-0631: mruby - Heap-based Buffer Overflow in Homebrew mruby prior to 3.2.
Heap-based Buffer Overflow in Homebrew mruby prior to 3.2.
Scope: local
bookworm: resolved
bullseye: resolved
forky: resolved
sid: resolved
trixie: resolved
debian
CVE-2021-46020HIGHCVSS 7.5fixed in mruby 3.1.0-1 (bookworm)2021
CVE-2021-46020 [HIGH] CVE-2021-46020: mruby - An untrusted pointer dereference in mrb_vm_exec() of mruby v3.0.0 can lead to a ...
An untrusted pointer dereference in mrb_vm_exec() of mruby v3.0.0 can lead to a segmentation fault or application crash.
Scope: local
bookworm: resolved (fixed in 3.1.0-1)
bullseye: open
forky: resolved (fixed in 3.1.0-1)
sid: resolved (fixed in 3.1.0-1)
trixie: resolved (fixed in 3.1.0-1)
debian
CVE-2021-46023HIGHCVSS 7.5fixed in mruby 3.1.0-1 (bookworm)2021
CVE-2021-46023 [HIGH] CVE-2021-46023: mruby - An Untrusted Pointer Dereference was discovered in function mrb_vm_exec in mruby...
An Untrusted Pointer Dereference was discovered in function mrb_vm_exec in mruby before 3.1.0-rc. The vulnerability causes a segmentation fault and application crash.
Scope: local
bookworm: resolved (fixed in 3.1.0-1)
bullseye: open
forky: resolved (fixed in 3.1.0-1)
sid: resolved (fixed in 3.1.0-1)
trixie: resolved (fixed in 3.1.0-1)
debian
CVE-2021-4110HIGHCVSS 7.5fixed in mruby 3.0.0-2 (bookworm)2021
CVE-2021-4110 [HIGH] CVE-2021-4110: mruby - mruby is vulnerable to NULL Pointer Dereference
mruby is vulnerable to NULL Pointer Dereference
Scope: local
bookworm: resolved (fixed in 3.0.0-2)
bullseye: open
forky: resolved (fixed in 3.0.0-2)
sid: resolved (fixed in 3.0.0-2)
trixie: resolved (fixed in 3.0.0-2)
debian
CVE-2021-4188LOWCVSS 7.52021
CVE-2021-4188 [HIGH] CVE-2021-4188: mruby - mruby is vulnerable to NULL Pointer Dereference
mruby is vulnerable to NULL Pointer Dereference
Scope: local
bookworm: resolved
bullseye: resolved
forky: resolved
sid: resolved
trixie: resolved
debian
CVE-2020-15866CRITICALCVSS 9.8fixed in mruby 2.1.2-1 (bookworm)2020
CVE-2020-15866 [CRITICAL] CVE-2020-15866: mruby - mruby through 2.1.2-rc has a heap-based buffer overflow in the mrb_yield_with_cl...
mruby through 2.1.2-rc has a heap-based buffer overflow in the mrb_yield_with_class function in vm.c because of incorrect VM stack handling. It can be triggered via the stack_copy function.
Scope: local
bookworm: resolved (fixed in 2.1.2-1)
bullseye: resolved (fixed in 2.1.2-1)
forky: resolved (fixed in 2.1.2-1)
sid: resolved (fixed in 2.1.2-1)
trixie: resolved (f
debian
CVE-2020-36401HIGHCVSS 7.8fixed in mruby 2.1.2-3 (bookworm)2020
CVE-2020-36401 [HIGH] CVE-2020-36401: mruby - mruby 2.1.2 has a double free in mrb_default_allocf (called from mrb_free and ob...
mruby 2.1.2 has a double free in mrb_default_allocf (called from mrb_free and obj_free).
Scope: local
bookworm: resolved (fixed in 2.1.2-3)
bullseye: resolved (fixed in 2.1.2-3)
forky: resolved (fixed in 2.1.2-3)
sid: resolved (fixed in 2.1.2-3)
trixie: resolved (fixed in 2.1.2-3)
debian
CVE-2020-6838LOWCVSS 9.82020
CVE-2020-6838 [CRITICAL] CVE-2020-6838: mruby - In mruby 2.1.0, there is a use-after-free in hash_values_at in mrbgems/mruby-has...
In mruby 2.1.0, there is a use-after-free in hash_values_at in mrbgems/mruby-hash-ext/src/hash-ext.c.
Scope: local
bookworm: resolved
bullseye: resolved
forky: resolved
sid: resolved
trixie: resolved
debian
CVE-2020-6839LOWCVSS 9.82020
CVE-2020-6839 [CRITICAL] CVE-2020-6839: mruby - In mruby 2.1.0, there is a stack-based buffer overflow in mrb_str_len_to_dbl in ...
In mruby 2.1.0, there is a stack-based buffer overflow in mrb_str_len_to_dbl in string.c.
Scope: local
bookworm: resolved
bullseye: resolved
forky: resolved
sid: resolved
trixie: resolved
debian
CVE-2020-6840LOWCVSS 9.82020
CVE-2020-6840 [CRITICAL] CVE-2020-6840: mruby - In mruby 2.1.0, there is a use-after-free in hash_slice in mrbgems/mruby-hash-ex...
In mruby 2.1.0, there is a use-after-free in hash_slice in mrbgems/mruby-hash-ext/src/hash-ext.c.
Scope: local
bookworm: resolved
bullseye: resolved
forky: resolved
sid: resolved
trixie: resolved
debian
CVE-2018-10199CRITICALCVSS 9.8fixed in mruby 1.4.0+20180418+git54905e98-1 (bookworm)2018
CVE-2018-10199 [CRITICAL] CVE-2018-10199: mruby - In versions of mruby up to and including 1.4.0, a use-after-free vulnerability e...
In versions of mruby up to and including 1.4.0, a use-after-free vulnerability exists in src/io.c::File#initilialize_copy(). An attacker that can cause Ruby code to be run can possibly use this to execute arbitrary code.
Scope: local
bookworm: resolved (fixed in 1.4.0+20180418+git54905e98-1)
bullseye: resolved (fixed in 1.4.0+20180418+git54905e98-1)
forky: resolve
debian
CVE-2018-11743CRITICALCVSS 9.8fixed in mruby 1.4.1+20180622+git640fca32-1 (bookworm)2018
CVE-2018-11743 [CRITICAL] CVE-2018-11743: mruby - The init_copy function in kernel.c in mruby 1.4.1 makes initialize_copy calls fo...
The init_copy function in kernel.c in mruby 1.4.1 makes initialize_copy calls for TT_ICLASS objects, which allows attackers to cause a denial of service (mrb_hash_keys uninitialized pointer and application crash) or possibly have unspecified other impact.
Scope: local
bookworm: resolved (fixed in 1.4.1+20180622+git640fca32-1)
bullseye: resolved (fixed in 1.4.1+201
debian
CVE-2018-10191CRITICALCVSS 9.8fixed in mruby 1.4.0+20180418+git54905e98-1 (bookworm)2018
CVE-2018-10191 [CRITICAL] CVE-2018-10191: mruby - In versions of mruby up to and including 1.4.0, an integer overflow exists in sr...
In versions of mruby up to and including 1.4.0, an integer overflow exists in src/vm.c::mrb_vm_exec() when handling OP_GETUPVAR in the presence of deep scope nesting, resulting in a use-after-free. An attacker that can cause Ruby code to be run can use this to possibly execute arbitrary code.
Scope: local
bookworm: resolved (fixed in 1.4.0+20180418+git54905e98-1)
debian
CVE-2018-12248HIGHCVSS 7.5fixed in mruby 1.4.1+20180622+git640fca32-1 (bookworm)2018
CVE-2018-12248 [HIGH] CVE-2018-12248: mruby - An issue was discovered in mruby 1.4.1. There is a heap-based buffer over-read a...
An issue was discovered in mruby 1.4.1. There is a heap-based buffer over-read associated with OP_ENTER because mrbgems/mruby-fiber/src/fiber.c does not extend the stack in cases of many arguments to fiber.
Scope: local
bookworm: resolved (fixed in 1.4.1+20180622+git640fca32-1)
bullseye: resolved (fixed in 1.4.1+20180622+git640fca32-1)
forky: resolved (fixed in 1.4.1+
debian
CVE-2018-12249HIGHCVSS 7.5fixed in mruby 1.4.1+20180622+git640fca32-1 (bookworm)2018
CVE-2018-12249 [HIGH] CVE-2018-12249: mruby - An issue was discovered in mruby 1.4.1. There is a NULL pointer dereference in m...
An issue was discovered in mruby 1.4.1. There is a NULL pointer dereference in mrb_class_real because "class BasicObject" is not properly supported in class.c.
Scope: local
bookworm: resolved (fixed in 1.4.1+20180622+git640fca32-1)
bullseye: resolved (fixed in 1.4.1+20180622+git640fca32-1)
forky: resolved (fixed in 1.4.1+20180622+git640fca32-1)
sid: resolved (fixed in
debian
CVE-2018-14337LOWCVSS 7.5fixed in mruby 2.0.0-1 (bookworm)2018
CVE-2018-14337 [HIGH] CVE-2018-14337: mruby - The CHECK macro in mrbgems/mruby-sprintf/src/sprintf.c in mruby 1.4.1 contains a...
The CHECK macro in mrbgems/mruby-sprintf/src/sprintf.c in mruby 1.4.1 contains a signed integer overflow, possibly leading to out-of-bounds memory access because the mrb_str_resize function in string.c does not check for a negative length.
Scope: local
bookworm: resolved (fixed in 2.0.0-1)
bullseye: resolved (fixed in 2.0.0-1)
forky: resolved (fixed in 2.0.0-1)
sid: r
debian