A weakness has been identified in mruby 3.4.0. This vulnerability affects the function ary_fill_exec of the file mrbgems/mruby-array-ext/src/array.c. Executing manipulation of the argument start/length can lead to out-of-bounds write. The attack needs to be launched locally. The exploit has been made available to the public and could be exploited. This patch is called 93619f06dd378db6766666b30c08978311c7ec94. It is best practice to apply a patch to resolve this issue.
Metrics
Affected Vendors & Products
References
History
Fri, 07 Nov 2025 20:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A weakness has been identified in mruby 3.4.0. This vulnerability affects the function ary_fill_exec of the file mrbgems/mruby-array-ext/src/array.c. Executing manipulation of the argument start/length can lead to out-of-bounds write. The attack needs to be launched locally. The exploit has been made available to the public and could be exploited. This patch is called 93619f06dd378db6766666b30c08978311c7ec94. It is best practice to apply a patch to resolve this issue. | |
| Title | mruby array.c ary_fill_exec out-of-bounds write | |
| Weaknesses | CWE-119 CWE-787 |
|
| References |
|
|
| Metrics |
cvssV2_0
|
Status: PUBLISHED
Assigner: VulDB
Published: 2025-11-07T20:32:07.100Z
Updated: 2025-11-07T20:32:07.100Z
Reserved: 2025-11-07T15:09:38.806Z
Link: CVE-2025-12875
No data.
Status : Received
Published: 2025-11-07T21:15:40.557
Modified: 2025-11-07T21:15:40.557
Link: CVE-2025-12875
No data.