|
|
Log in / Subscribe / Register

Arch Linux alert ASA-202107-10 (mruby)

From:  Jonas Witschel via arch-security <arch-security@lists.archlinux.org>
To:  arch-security@lists.archlinux.org
Subject:  [ASA-202107-10] mruby: arbitrary code execution
Date:  Sat, 03 Jul 2021 18:25:37 +0200
Message-ID:  <20210703162537.iw4o2tqc6fs3bere@archlinux.org>
Cc:  Jonas Witschel <diabonas@archlinux.org>

Arch Linux Security Advisory ASA-202107-10 ========================================== Severity: Medium Date : 2021-07-01 CVE-ID : CVE-2020-36401 Package : mruby Type : arbitrary code execution Remote : Yes Link : https://security.archlinux.org/AVG-2116 Summary ======= The package mruby before version 3.0.0-1 is vulnerable to arbitrary code execution. Resolution ========== Upgrade to 3.0.0-1. # pacman -Syu "mruby>=3.0.0-1" The problem has been fixed upstream in version 3.0.0. Workaround ========== None. Description =========== mruby 2.1.2 has a double free in mrb_default_allocf (called from mrb_free and obj_free). Impact ====== An attacker could execute arbitrary code through a use after free. References ========== https://github.com/google/oss-fuzz-vulns/blob/main/vulns/... https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=23801 https://github.com/mruby/mruby/commit/97319697c8f9f6ff27b... https://security.archlinux.org/CVE-2020-36401


to post comments


Copyright © 2026, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds