A security vulnerability has been detected in mrubyc up to 3.4. This impacts the function mrbc_raw_realloc of the file src/alloc.c. Such manipulation of the argument ptr leads to null pointer dereference. An attack has to be approached locally. The name of the patch is 009111904807b8567262036bf45297c3da8f1c87. It is advisable to implement a patch to correct this issue.
References
| Link | Resource |
|---|---|
| https://github.com/mrubyc/mrubyc/commit/009111904807b8567262036bf45297c3da8f1c87 | Patch |
| https://github.com/mrubyc/mrubyc/issues/244 | Issue Tracking |
| https://github.com/mrubyc/mrubyc/issues/244#issuecomment-3400382026 | Issue Tracking |
| https://vuldb.com/?ctiid.332925 | Permissions Required VDB Entry |
| https://vuldb.com/?id.332925 | Third Party Advisory VDB Entry |
| https://vuldb.com/?submit.692130 | Third Party Advisory VDB Entry |
Configurations
History
01 Dec 2025, 19:58
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
S-itoc
S-itoc mruby\/c |
|
| CPE | cpe:2.3:a:s-itoc:mruby\/c:*:*:*:*:*:*:*:* | |
| References | () https://github.com/mrubyc/mrubyc/commit/009111904807b8567262036bf45297c3da8f1c87 - Patch | |
| References | () https://github.com/mrubyc/mrubyc/issues/244 - Issue Tracking | |
| References | () https://github.com/mrubyc/mrubyc/issues/244#issuecomment-3400382026 - Issue Tracking | |
| References | () https://vuldb.com/?ctiid.332925 - Permissions Required, VDB Entry | |
| References | () https://vuldb.com/?id.332925 - Third Party Advisory, VDB Entry | |
| References | () https://vuldb.com/?submit.692130 - Third Party Advisory, VDB Entry |
19 Nov 2025, 16:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-11-19 16:15
Updated : 2025-12-01 19:58
NVD link : CVE-2025-13397
Mitre link : CVE-2025-13397
CVE.ORG link : CVE-2025-13397
JSON object : View
Products Affected
s-itoc
- mruby\/c
