Description
A flaw has been found in mruby up to 3.4.0. This affects the function mrb_vm_exec of the file src/vm.c of the component JMPNOT-to-JMPIF Optimization. Executing a manipulation can lead to use after free. The attack needs to be launched locally. The exploit has been published and may be used. This patch is called e50f15c1c6e131fa7934355eb02b8173b13df415. It is advisable to implement a patch to correct this issue.
Problem types
Timeline
| 2026-02-05: | Advisory disclosed |
| 2026-02-05: | VulDB entry created |
| 2026-02-07: | VulDB entry last update |
Credits
Oneafter (VulDB User)
References
vuldb.com/?id.344501 (VDB-344501 | mruby JMPNOT-to-JMPIF Optimization vm.c mrb_vm_exec use after free)
vuldb.com/?ctiid.344501 (VDB-344501 | CTI Indicators (IOB, IOC, IOA))
vuldb.com/?submit.743377 (Submit #743377 | mruby cda2567 Use After Free)
github.com/mruby/mruby/issues/6701
github.com/mruby/mruby/issues/6701
github.com/...ommit/e50f15c1c6e131fa7934355eb02b8173b13df415
github.com/mruby/mruby/