Arch Linux alert ASA-202107-10 (mruby)
| From: | Jonas Witschel via arch-security <arch-security@lists.archlinux.org> | |
| To: | arch-security@lists.archlinux.org | |
| Subject: | [ASA-202107-10] mruby: arbitrary code execution | |
| Date: | Sat, 03 Jul 2021 18:25:37 +0200 | |
| Message-ID: | <20210703162537.iw4o2tqc6fs3bere@archlinux.org> | |
| Cc: | Jonas Witschel <diabonas@archlinux.org> |
Arch Linux Security Advisory ASA-202107-10 ========================================== Severity: Medium Date : 2021-07-01 CVE-ID : CVE-2020-36401 Package : mruby Type : arbitrary code execution Remote : Yes Link : https://security.archlinux.org/AVG-2116 Summary ======= The package mruby before version 3.0.0-1 is vulnerable to arbitrary code execution. Resolution ========== Upgrade to 3.0.0-1. # pacman -Syu "mruby>=3.0.0-1" The problem has been fixed upstream in version 3.0.0. Workaround ========== None. Description =========== mruby 2.1.2 has a double free in mrb_default_allocf (called from mrb_free and obj_free). Impact ====== An attacker could execute arbitrary code through a use after free. References ========== https://github.com/google/oss-fuzz-vulns/blob/main/vulns/... https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=23801 https://github.com/mruby/mruby/commit/97319697c8f9f6ff27b... https://security.archlinux.org/CVE-2020-36401
