{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2026-1979","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2026-02-05T13:44:19.662Z","datePublished":"2026-02-06T04:32:09.200Z","dateUpdated":"2026-02-23T09:21:06.088Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2026-02-23T09:21:06.088Z"},"title":"mruby JMPNOT-to-JMPIF Optimization vm.c mrb_vm_exec use after free","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-416","lang":"en","description":"Use After Free"}]},{"descriptions":[{"type":"CWE","cweId":"CWE-119","lang":"en","description":"Memory Corruption"}]}],"affected":[{"vendor":"n/a","product":"mruby","versions":[{"version":"3.0","status":"affected"},{"version":"3.1","status":"affected"},{"version":"3.2","status":"affected"},{"version":"3.3","status":"affected"},{"version":"3.4.0","status":"affected"}],"cpes":["cpe:2.3:a:mruby:mruby:*:*:*:*:*:*:*:*"],"modules":["JMPNOT-to-JMPIF Optimization"]}],"descriptions":[{"lang":"en","value":"A flaw has been found in mruby up to 3.4.0. This affects the function mrb_vm_exec of the file src/vm.c of the component JMPNOT-to-JMPIF Optimization. Executing a manipulation can lead to use after free. The attack needs to be launched locally. The exploit has been published and may be used. This patch is called e50f15c1c6e131fa7934355eb02b8173b13df415. It is advisable to implement a patch to correct this issue."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":4.8,"vectorString":"CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P","baseSeverity":"MEDIUM"}},{"cvssV3_1":{"version":"3.1","baseScore":5.3,"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C","baseSeverity":"MEDIUM"}},{"cvssV3_0":{"version":"3.0","baseScore":5.3,"vectorString":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C","baseSeverity":"MEDIUM"}},{"cvssV2_0":{"version":"2.0","baseScore":4.3,"vectorString":"AV:L/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:OF/RC:C"}}],"timeline":[{"time":"2026-02-05T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2026-02-05T01:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2026-02-07T13:18:56.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"Oneafter (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/?id.344501","name":"VDB-344501 | mruby JMPNOT-to-JMPIF Optimization vm.c mrb_vm_exec use after free","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.344501","name":"VDB-344501 | CTI Indicators (IOB, IOC, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/?submit.743377","name":"Submit #743377 | mruby  cda2567 Use After Free","tags":["third-party-advisory"]},{"url":"https://github.com/mruby/mruby/issues/6701","tags":["issue-tracking"]},{"url":"https://github.com/mruby/mruby/issues/6701#issue-3802609843","tags":["exploit","issue-tracking"]},{"url":"https://github.com/sysfce2/mruby/commit/e50f15c1c6e131fa7934355eb02b8173b13df415","tags":["patch"]},{"url":"https://github.com/mruby/mruby/","tags":["product"]}],"tags":["x_open-source"]},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2026-02-06T20:26:13.479778Z","id":"CVE-2026-1979","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-02-06T20:26:21.865Z"}}]}}