Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2025-13120

Опубликовано: 13 нояб. 2025
Источник: debian
EPSS Низкий

Описание

A vulnerability has been found in mruby up to 3.4.0. This vulnerability affects the function sort_cmp of the file src/array.c. Such manipulation leads to use after free. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. The name of the patch is eb398971bfb43c38db3e04528b68ac9a7ce509bc. It is advisable to implement a patch to correct this issue.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
mrubyunfixedpackage
mrubyno-dsatrixiepackage
mrubyno-dsabookwormpackage
mrubypostponedbullseyepackage

Примечания

  • https://github.com/mruby/mruby/issues/6649

  • Fixed by: https://github.com/mruby/mruby/commit/eb398971bfb43c38db3e04528b68ac9a7ce509bc

EPSS

Процентиль: 3%
0.00016
Низкий

Связанные уязвимости

CVSS3: 5.3
ubuntu
3 месяца назад

A vulnerability has been found in mruby up to 3.4.0. This vulnerability affects the function sort_cmp of the file src/array.c. Such manipulation leads to use after free. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. The name of the patch is eb398971bfb43c38db3e04528b68ac9a7ce509bc. It is advisable to implement a patch to correct this issue.

CVSS3: 5.3
nvd
3 месяца назад

A vulnerability has been found in mruby up to 3.4.0. This vulnerability affects the function sort_cmp of the file src/array.c. Such manipulation leads to use after free. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. The name of the patch is eb398971bfb43c38db3e04528b68ac9a7ce509bc. It is advisable to implement a patch to correct this issue.

msrc
3 месяца назад

mruby array.c sort_cmp use after free

CVSS3: 5.3
github
3 месяца назад

A vulnerability has been found in mruby up to 3.4.0. This vulnerability affects the function sort_cmp of the file src/array.c. Such manipulation leads to use after free. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. The name of the patch is eb398971bfb43c38db3e04528b68ac9a7ce509bc. It is advisable to implement a patch to correct this issue.

EPSS

Процентиль: 3%
0.00016
Низкий