CVE-2026-1979

Source
https://cve.org/CVERecord?id=CVE-2026-1979
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-1979.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2026-1979
Downstream
Published
2026-02-06T05:16:12.667Z
Modified
2026-03-01T02:23:21.940246Z
Severity
  • 5.5 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
[none]
Details

A flaw has been found in mruby up to 3.4.0. This affects the function mrbvmexec of the file src/vm.c of the component JMPNOT-to-JMPIF Optimization. Executing a manipulation can lead to use after free. The attack needs to be launched locally. The exploit has been published and may be used. This patch is called e50f15c1c6e131fa7934355eb02b8173b13df415. It is advisable to implement a patch to correct this issue.

References

Affected packages

Git / github.com/sysfce2/mruby

Affected ranges

Type
GIT
Repo
https://github.com/sysfce2/mruby
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

1.*
1.0.0
1.1.0
1.2.0
1.3.0
1.4.0
1.4.1
2.*
2.0.0
2.0.1
2.1.0
2.1.0-rc
2.1.1
2.1.1-rc
2.1.1-rc2
2.1.2
2.1.2-rc
2.1.2-rc2
3.*
3.0.0
3.0.0-preview
3.0.0-rc
3.1.0
3.1.0-rc
3.1.0-rc2
3.2.0
3.2.0-rc
3.2.0-rc2
3.2.0-rc3
3.2.0-rc4
3.3.0
3.3.0-rc
3.3.0-rc2

Database specific

vanir_signatures
[
    {
        "signature_type": "Line",
        "deprecated": false,
        "id": "CVE-2026-1979-19a22880",
        "target": {
            "file": "mrbgems/mruby-compiler/core/codegen.c"
        },
        "digest": {
            "threshold": 0.9,
            "line_hashes": [
                "309700451298586127084147669564925157237",
                "206465718435458731545810550109385677489",
                "232266857713372375953676997730443733663",
                "120459724042526479545393141050980971602",
                "88368804593802825400990602459277649762"
            ]
        },
        "signature_version": "v1",
        "source": "https://github.com/sysfce2/mruby/commit/e50f15c1c6e131fa7934355eb02b8173b13df415"
    },
    {
        "signature_type": "Function",
        "deprecated": false,
        "id": "CVE-2026-1979-82aaa20e",
        "target": {
            "file": "mrbgems/mruby-compiler/core/codegen.c",
            "function": "codegen"
        },
        "digest": {
            "length": 9440.0,
            "function_hash": "60665796433931384598915782097009808259"
        },
        "signature_version": "v1",
        "source": "https://github.com/sysfce2/mruby/commit/e50f15c1c6e131fa7934355eb02b8173b13df415"
    }
]
source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-1979.json"