Source: mruby Version: 1.2.0+20161228+git30d5424a-1 Severity: important Tags: upstream patch security Forwarded: https://github.com/mruby/mruby/issues/3486 Control: fixed -1 1.2.0+20170601+git51e0e690-1
Hi, the following vulnerability was published for mruby. CVE-2017-9527[0]: | The mark_context_stack function in gc.c in mruby through 1.2.0 allows | attackers to cause a denial of service (heap-based use-after-free and | application crash) or possibly have unspecified other impact via a | crafted .rb file. If you fix the vulnerability please also make sure to include the CVE (Common Vulnerabilities & Exposures) id in your changelog entry. For further information see: [0] https://security-tracker.debian.org/tracker/CVE-2017-9527 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9527 [1] https://github.com/mruby/mruby/issues/3486 [2] https://github.com/mruby/mruby/commit/5c114c91d4ff31859fcd84cf8bf349b737b90d99 Please adjust the affected versions in the BTS as needed. Regards, Salvatore