In versions of mruby up to and including 1.4.0, a use-after-free vulnerability exists in src/io.c::File#initilialize_copy(). An attacker that can cause Ruby code to be run can possibly use this to execute arbitrary code.
{ "binaries": [ { "binary_name": "libmruby-dev", "binary_version": "1.2.0+20160315+git4f20d58a-1" }, { "binary_name": "mruby", "binary_version": "1.2.0+20160315+git4f20d58a-1" } ] }
{ "binaries": [ { "binary_name": "libmruby-dev", "binary_version": "1.4.0-1" }, { "binary_name": "mruby", "binary_version": "1.4.0-1" } ] }
{ "binaries": [ { "binary_name": "libmruby-dev", "binary_version": "2.0.0-1" }, { "binary_name": "mruby", "binary_version": "2.0.0-1" } ] }
{ "binaries": [ { "binary_name": "libmruby-dev", "binary_version": "3.0.0-3" }, { "binary_name": "mruby", "binary_version": "3.0.0-3" } ] }
{ "binaries": [ { "binary_name": "libmruby-dev", "binary_version": "3.2.0-2" }, { "binary_name": "mruby", "binary_version": "3.2.0-2" } ] }
{ "binaries": [ { "binary_name": "libmruby-dev", "binary_version": "3.3.0-1" }, { "binary_name": "mruby", "binary_version": "3.3.0-1" } ] }