In versions of mruby up to and including 1.4.0, a use-after-free vulnerability exists in src/io.c::File#initilialize_copy(). An attacker that can cause Ruby code to be run can possibly use this to execute arbitrary code.
{ "vanir_signatures": [ { "signature_version": "v1", "signature_type": "Function", "target": { "file": "mrbgems/mruby-io/src/io.c", "function": "mrb_io_initialize_copy" }, "id": "CVE-2018-10199-3968ad5e", "digest": { "length": 1032.0, "function_hash": "176470287796102068116200247742974157189" }, "deprecated": false, "source": "https://github.com/mruby/mruby/commit/b51b21fc63c9805862322551387d9036f2b63433" }, { "signature_version": "v1", "signature_type": "Line", "target": { "file": "mrbgems/mruby-io/src/io.c" }, "id": "CVE-2018-10199-74069e8a", "digest": { "line_hashes": [ "26428399209722362404772608474695113136", "222149713925856606992976566986370645464", "242975534844887006541029859650857140185", "283945130415032626426675985272024724847", "113971097661674165332142934430449657499", "31486327155438268750255794855118764637", "333268945746951759752781923786946114447", "84224174781620867617528170324289898103", "160934137204212079820212675447251727175", "98899778162484268282287483093347673153", "29675728426105141391949315817511663971" ], "threshold": 0.9 }, "deprecated": false, "source": "https://github.com/mruby/mruby/commit/b51b21fc63c9805862322551387d9036f2b63433" } ] }