CVE-2025-12875

NameCVE-2025-12875
DescriptionA weakness has been identified in mruby 3.4.0. This vulnerability affects the function ary_fill_exec of the file mrbgems/mruby-array-ext/src/array.c. Executing manipulation of the argument start/length can lead to out-of-bounds write. The attack needs to be launched locally. The exploit has been made available to the public and could be exploited. This patch is called 93619f06dd378db6766666b30c08978311c7ec94. It is best practice to apply a patch to resolve this issue.
SourceCVE (at NVD; CERT, ENISA, LWN, oss-sec, fulldisc, Debian ELTS, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
mruby (PTS)bullseye2.1.2-3vulnerable
bookworm3.1.0-3vulnerable
trixie3.3.0-1vulnerable
forky, sid3.4.0-2vulnerable

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
mrubysource(unstable)(unfixed)

Notes

https://github.com/mruby/mruby/issues/6650
Fixed by: https://github.com/mruby/mruby/commit/93619f06dd378db6766666b30c08978311c7ec94

Search for package or bug name: Reporting problems