Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2026-1979— mruby JMPNOT-to-JMPIF Optimization vm.c mrb_vm_exec use after free

CVSS 5.3 · Medium EPSS 0.03% · P8
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2026-1979

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
mruby JMPNOT-to-JMPIF Optimization vm.c mrb_vm_exec use after free
Source: NVD (National Vulnerability Database)
Vulnerability Description
A flaw has been found in mruby up to 3.4.0. This affects the function mrb_vm_exec of the file src/vm.c of the component JMPNOT-to-JMPIF Optimization. Executing a manipulation can lead to use after free. The attack needs to be launched locally. The exploit has been published and may be used. This patch is called e50f15c1c6e131fa7934355eb02b8173b13df415. It is advisable to implement a patch to correct this issue.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
Source: NVD (National Vulnerability Database)
Vulnerability Type
释放后使用
Source: NVD (National Vulnerability Database)
Vulnerability Title
mruby 资源管理错误漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
mruby是makesoftwaresafe开源的一款Ruby语言的轻量级实现。 mruby 3.4.0及之前版本存在资源管理错误漏洞,该漏洞源于JMPNOT-to-JMPIF Optimization组件中src/vm.c文件的mrb_vm_exec函数存在缺陷,可能导致释放后重用。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
-mruby 3.0 cpe:2.3:a:mruby:mruby:*:*:*:*:*:*:*:*

II. Public POCs for CVE-2026-1979

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2026-1979

登录查看更多情报信息。

Same Patch Batch · n/a · 2026-02-06 · 10 CVEs total

CVE-2026-20625.3 MEDIUMOpen5GS PGW S5U Address sgwc_sxa_handle_session_modification_response null pointer derefer
CVE-2026-19765.3 MEDIUMFree5GC SMF SessionDeletionResponse null pointer dereference
CVE-2026-19755.3 MEDIUMFree5GC pfcp_reports.go identityTriggerType null pointer dereference
CVE-2026-19745.3 MEDIUMFree5GC SMF datapath.go ResolveNodeIdToIp denial of service
CVE-2026-19735.3 MEDIUMFree5GC SMF establishPfcpSession null pointer dereference
CVE-2026-19983.3 LOWmicropython runtime.c mp_import_all memory corruption
CVE-2026-19913.3 LOWlibuvc UVC Descriptor device.c uvc_scan_streaming null pointer dereference
CVE-2026-19903.3 LOWoatpp Type.hpp ObjectWrapper null pointer dereference
CVE-2025-70963GoPhish 安全漏洞

IV. Related Vulnerabilities

V. Comments for CVE-2026-1979

No comments yet


Leave a comment