The mark_context_stack function in gc.c in mruby through 1.2.0 allows attackers to cause a denial of service (heap-based use-after-free and application crash) or possibly have unspecified other impact via a crafted .rb file.
                
            References
                    | Link | Resource | 
|---|---|
| https://github.com/mruby/mruby/commit/5c114c91d4ff31859fcd84cf8bf349b737b90d99 | Issue Tracking Patch Third Party Advisory | 
| https://github.com/mruby/mruby/issues/3486 | Exploit Issue Tracking Patch Third Party Advisory | 
| https://lists.debian.org/debian-lts-announce/2022/05/msg00006.html | Mailing List Third Party Advisory | 
| https://github.com/mruby/mruby/commit/5c114c91d4ff31859fcd84cf8bf349b737b90d99 | Issue Tracking Patch Third Party Advisory | 
| https://github.com/mruby/mruby/issues/3486 | Exploit Issue Tracking Patch Third Party Advisory | 
| https://lists.debian.org/debian-lts-announce/2022/05/msg00006.html | Mailing List Third Party Advisory | 
Configurations
                    History
                    21 Nov 2024, 03:36
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () https://github.com/mruby/mruby/commit/5c114c91d4ff31859fcd84cf8bf349b737b90d99 - Issue Tracking, Patch, Third Party Advisory | |
| References | () https://github.com/mruby/mruby/issues/3486 - Exploit, Issue Tracking, Patch, Third Party Advisory | |
| References | () https://lists.debian.org/debian-lts-announce/2022/05/msg00006.html - Mailing List, Third Party Advisory | 
12 May 2022, 20:08
| Type | Values Removed | Values Added | 
|---|---|---|
| CPE | cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:* | |
| References | (MLIST) https://lists.debian.org/debian-lts-announce/2022/05/msg00006.html - Mailing List, Third Party Advisory | |
| References | (CONFIRM) https://github.com/mruby/mruby/issues/3486 - Exploit, Issue Tracking, Patch, Third Party Advisory | 
06 May 2022, 11:15
| Type | Values Removed | Values Added | 
|---|---|---|
| References | 
        
        
  | 
Information
                Published : 2017-06-11 17:29
Updated : 2025-04-20 01:37
NVD link : CVE-2017-9527
Mitre link : CVE-2017-9527
CVE.ORG link : CVE-2017-9527
JSON object : View
Products Affected
                mruby
- mruby
 
debian
- debian_linux
 
CWE
                
                    
                        
                        CWE-416
                        
            Use After Free
