Impact
The flaw is in the JMPNOT-to-JMPIF Optimization function mrb_vm_exec and allows a use‑after‑free condition when specific code manipulations are executed. Attacking code can corrupt memory after the freed resource is referenced, which may result in unintended behavior or compromise program integrity. The vulnerability is limited to local execution and does not expose remote code execution directly.
Affected Systems
mruby versions up to 3.4.0 are affected. The bug resides in the core vm.c component and has been publicly reported with a fix committed at e50f15c1c6e131fa7934355eb02b8173b13df415. Any installation of mruby 3.4.0 or earlier that has not applied this patch is vulnerable.
Risk and Exploitability
The CVSS score of 4.8 reflects a moderate risk. EPSS indicates a low exploitation probability (<1%). The vulnerability is not listed in the CISA KEV catalog. The exploit is local, requiring the attacker to run code on the host, and currently no remote exploitation vectors are documented. The published exploit demonstrates that a local attacker can trigger the use‑after‑free, potentially leading to memory corruption.
OpenCVE Enrichment