-
-
Notifications
You must be signed in to change notification settings - Fork 227
GHSA SYNC: Advisories (2 mruby and 1 mrubyc brand new) plus schema change #971
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Merged
postmodern
merged 4 commits into
rubysec:master
from
jasnow:ghsa-syncbot-2026-01-23-19_38_20
Jan 31, 2026
Merged
Changes from all commits
Commits
Show all changes
4 commits
Select commit
Hold shift + click to select a range
File filter
Filter by extension
Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| Original file line number | Diff line number | Diff line change |
|---|---|---|
| @@ -0,0 +1,38 @@ | ||
| --- | ||
| gem: activerecord | ||
| framework: rails | ||
| cve: 2013-3221 | ||
| ghsa: f57c-hx33-hvh8 | ||
| url: https://nvd.nist.gov/vuln/detail/CVE-2013-3221 | ||
| title: Data-type injection vulnerability | ||
| date: 2013-04-21 | ||
| description: | | ||
| The Active Record component in Ruby on Rails 2.3.x, 3.0.x, 3.1.x, | ||
| and 3.2.x does not ensure that the declared data type of a database | ||
| column is used during comparisons of input values to stored values | ||
| in that column, which makes it easier for remote attackers to | ||
| conduct data-type injection attacks against Ruby on Rails applications | ||
| via a crafted value, as demonstrated by unintended interaction | ||
| between the "typed XML" feature and a MySQL database. | ||
|
|
||
| ## RELEASE INFO | ||
| - Phrack writeup says that 'couple of days after the advisory the | ||
| issue was "fixed" in Rails 3.2.12 as by the following commit' 921a296. | ||
| But "Indeed the vector is completely fixed as of Rails 4.2 almost | ||
| two years after the original advisory." | ||
| cvss_v2: 6.4 | ||
| patched_versions: | ||
| - ">= 4.2.0" | ||
| related: | ||
| url: | ||
| - https://nvd.nist.gov/vuln/detail/CVE-2013-3221 | ||
| - https://github.com/rails/rails/commit/c9909db9f2f81575ef2ea2ed3b4e8743c8d6f1b9 | ||
| - https://github.com/rails/rails/commit/921a296a3390192a71abeec6d9a035cc6d1865c8 | ||
| - https://groups.google.com/group/rubyonrails-security/msg/1f3bc0b88a60c1ce | ||
| - http://pl.reddit.com/r/netsec/comments/17yajp/mysql_madness_and_rails | ||
| - http://openwall.com/lists/oss-security/2013/02/06/7 | ||
| - http://openwall.com/lists/oss-security/2013/04/24/7 | ||
| - https://gist.github.com/marianposaceanu/5442275 | ||
| - https://web.archive.org/web/20160307143147/http://www.phenoelit.org/blog/archives/2013/02/index.html | ||
| - https://github.com/advisories/GHSA-f57c-hx33-hvh8 | ||
| - https://phrack.org/issues/69/12 |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| Original file line number | Diff line number | Diff line change |
|---|---|---|
| @@ -0,0 +1,35 @@ | ||
| --- | ||
| engine: mruby | ||
| cve: 2025-12875 | ||
| ghsa: q269-xqww-45mm | ||
| url: https://nvd.nist.gov/vuln/detail/CVE-2025-12875 | ||
| title: Out-of-bounds write vulnerability | ||
| date: 2025-11-07 | ||
| description: | | ||
| A weakness has been identified in mruby 3.4.0. This vulnerability | ||
| affects the function ary_fill_exec of the file | ||
| mrbgems/mruby-array-ext/src/array.c. Executing manipulation of | ||
| the argument start/length can lead to out-of-bounds write. The | ||
| attack needs to be launched locally. The exploit has been made | ||
| available to the public and could be exploited. | ||
| This patch is called 93619f06dd378db6766666b30c08978311c7ec94. | ||
| It is best practice to apply a patch to resolve this issue. | ||
|
|
||
| ## RELEASE INFO | ||
| - Commit 93619f0 10/22//2025 for ISS#6650 (Found in | ||
| unreleased mruby3.5 NEWS.md file) | ||
| cvss_v2: 4.3 | ||
| cvss_v3: 7.8 | ||
| cvss_v4: 4.8 | ||
| patched_versions: | ||
| - ">= 3.5.0" | ||
| related: | ||
| url: | ||
| - https://nvd.nist.gov/vuln/detail/CVE-2025-12875 | ||
| - https://github.com/mruby/mruby/blob/master/NEWS.md | ||
| - https://github.com/mruby/mruby/commit/93619f06dd378db6766666b30c08978311c7ec94 | ||
| - https://github.com/mruby/mruby/issues/6650 | ||
| - https://vuldb.com/?ctiid.331511 | ||
| - https://vuldb.com/?id.331511 | ||
| - https://vuldb.com/?submit.680879 | ||
| - https://github.com/advisories/GHSA-q269-xqww-45mm | ||
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| Original file line number | Diff line number | Diff line change |
|---|---|---|
| @@ -0,0 +1,35 @@ | ||
| --- | ||
| engine: mruby | ||
| cve: 2025-13120 | ||
| ghsa: j383-q79v-268x | ||
| url: https://nvd.nist.gov/vuln/detail/CVE-2025-13120 | ||
| title: Use-after-realloc vulnerablity in mruby 3.4.0 | ||
| date: 2025-11-13 | ||
| description: | | ||
| A vulnerability has been found in mruby up to 3.4.0. This | ||
| vulnerability affects the function sort_cmp of the file src/array.c. | ||
| Such manipulation leads to use after free. An attack has to be | ||
| approached locally. The exploit has been disclosed to the public | ||
| and may be used. | ||
| The name of the patch is eb398971bfb43c38db3e04528b68ac9a7ce509bc. | ||
| It is advisable to implement a patch to correct this issue. | ||
|
|
||
| ## RELEASE INFO | ||
| - Commit eb39897 10/27//2025 for ISS#6649 (Found in | ||
| unreleased mruby3.5 NEWS.md file) | ||
| cvss_v2: 4.3 | ||
| cvss_v3: 5.5 | ||
| cvss_v4: 4.8 | ||
| patched_versions: | ||
| - ">= 3.5.0" | ||
|
Member
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. Oops. mruby 3.5.0 has not been released yet. |
||
| related: | ||
| url: | ||
| - https://nvd.nist.gov/vuln/detail/CVE-2025-13120 | ||
| - https://github.com/mruby/mruby/blob/master/NEWS.md | ||
| - https://github.com/mruby/mruby/commit/eb398971bfb43c38db3e04528b68ac9a7ce509bc | ||
| - https://github.com/mruby/mruby/issues/6649 | ||
| - https://github.com/makesoftwaresafe/mruby/pull/263 | ||
| - https://vuldb.com/?ctiid.332325 | ||
| - https://vuldb.com/?id.332325 | ||
| - https://vuldb.com/?submit.683435 | ||
| - https://github.com/advisories/GHSA-j383-q79v-268x | ||
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| Original file line number | Diff line number | Diff line change |
|---|---|---|
| @@ -0,0 +1,31 @@ | ||
| --- | ||
| engine: mrubyc | ||
| cve: 2025-13397 | ||
| ghsa: 99jr-qh2r-jwfm | ||
| url: https://nvd.nist.gov/vuln/detail/CVE-2025-13397 | ||
| title: null pointer dereference vulnerability in mrubyc 3.4 | ||
| date: 2025-11-19 | ||
| description: | | ||
| A security vulnerability has been detected in mrubyc up to 3.4. | ||
| This impacts the function mrbc_raw_realloc of the file src/alloc.c. | ||
| Such manipulation of the argument ptr leads to null pointer | ||
| dereference. An attack has to be approached locally. | ||
| The name of the patch is 009111904807b8567262036bf45297c3da8f1c87. | ||
| It is advisable to implement a patch to correct this issue. | ||
|
|
||
| ## RELEASE INFO | ||
| - Release 3.4 commit stopped on 6/26/2025 and ommit 0091119 was | ||
| on 10/14/2025 so not in 3.4. Do not see any CHANGELOG or NEWS files. | ||
| cvss_v2: .17 | ||
| cvss_v3: 5.5 | ||
| cvss_v4: 4.8 | ||
| notes: "Never patched" | ||
| related: | ||
| url: | ||
| - https://nvd.nist.gov/vuln/detail/CVE-2025-13397 | ||
| - https://github.com/mrubyc/mrubyc/commit/009111904807b8567262036bf45297c3da8f1c87 | ||
| - https://github.com/mrubyc/mrubyc/issues/244 | ||
| - https://vuldb.com/?ctiid.332925 | ||
| - https://vuldb.com/?id.332925 | ||
| - https://vuldb.com/?submit.692130 | ||
| - https://github.com/advisories/GHSA-99jr-qh2r-jwfm |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Oops. mruby 3.5.0 has not been released yet.
patched_versions:should be omitted until 3.5.0 is released. Instructing users to upgrade to a version that does not exist yet is not helpful.