[Secure-testing-team] Bug#865778: mruby: CVE-2017-9527: heap-based use-after-free
Salvatore Bonaccorso
carnil at debian.org
Sat Jun 24 18:41:19 UTC 2017
Source: mruby
Version: 1.2.0+20161228+git30d5424a-1
Severity: important
Tags: upstream patch security
Forwarded: https://github.com/mruby/mruby/issues/3486
Control: fixed -1 1.2.0+20170601+git51e0e690-1
Hi,
the following vulnerability was published for mruby.
CVE-2017-9527[0]:
| The mark_context_stack function in gc.c in mruby through 1.2.0 allows
| attackers to cause a denial of service (heap-based use-after-free and
| application crash) or possibly have unspecified other impact via a
| crafted .rb file.
If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.
For further information see:
[0] https://security-tracker.debian.org/tracker/CVE-2017-9527
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9527
[1] https://github.com/mruby/mruby/issues/3486
[2] https://github.com/mruby/mruby/commit/5c114c91d4ff31859fcd84cf8bf349b737b90d99
Please adjust the affected versions in the BTS as needed.
Regards,
Salvatore
More information about the Secure-testing-team
mailing list