<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">libmruby3_4_0-3.4.0-1.1 on GA media</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2025:16395</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2025-07-09T00:00:00Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2025-07-09T00:00:00Z</InitialReleaseDate>
    <CurrentReleaseDate>2025-07-09T00:00:00Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">libmruby3_4_0-3.4.0-1.1 on GA media</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">These are all security issues fixed in the libmruby3_4_0-3.4.0-1.1 package on the GA media of openSUSE Tumbleweed.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-Tumbleweed-2025-16395</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-0623/</URL>
      <Description>SUSE CVE CVE-2022-0623 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-0717/</URL>
      <Description>SUSE CVE CVE-2022-0717 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-1276/</URL>
      <Description>SUSE CVE CVE-2022-1276 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-7207/</URL>
      <Description>SUSE CVE CVE-2025-7207 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Tumbleweed">
      <Branch Type="Product Name" Name="openSUSE Tumbleweed">
        <FullProductName ProductID="openSUSE Tumbleweed" CPE="cpe:/o:opensuse:tumbleweed">openSUSE Tumbleweed</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="libmruby3_4_0-3.4.0-1.1">
      <FullProductName ProductID="libmruby3_4_0-3.4.0-1.1">libmruby3_4_0-3.4.0-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libmruby_core3_4_0-3.4.0-1.1">
      <FullProductName ProductID="libmruby_core3_4_0-3.4.0-1.1">libmruby_core3_4_0-3.4.0-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mruby-3.4.0-1.1">
      <FullProductName ProductID="mruby-3.4.0-1.1">mruby-3.4.0-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mruby-devel-3.4.0-1.1">
      <FullProductName ProductID="mruby-devel-3.4.0-1.1">mruby-devel-3.4.0-1.1</FullProductName>
    </Branch>
    <Relationship ProductReference="libmruby3_4_0-3.4.0-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libmruby3_4_0-3.4.0-1.1">libmruby3_4_0-3.4.0-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libmruby_core3_4_0-3.4.0-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libmruby_core3_4_0-3.4.0-1.1">libmruby_core3_4_0-3.4.0-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="mruby-3.4.0-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:mruby-3.4.0-1.1">mruby-3.4.0-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="mruby-devel-3.4.0-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:mruby-devel-3.4.0-1.1">mruby-devel-3.4.0-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Out-of-bounds Read in Homebrew mruby prior to 3.2.</Note>
    </Notes>
    <CVE>CVE-2022-0623</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libmruby3_4_0-3.4.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmruby_core3_4_0-3.4.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mruby-3.4.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mruby-devel-3.4.0-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.4</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-0623.html</URL>
        <Description>CVE-2022-0623</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1196106</URL>
        <Description>SUSE Bug 1196106</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Out-of-bounds Read in GitHub repository mruby/mruby prior to 3.2.</Note>
    </Notes>
    <CVE>CVE-2022-0717</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libmruby3_4_0-3.4.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmruby_core3_4_0-3.4.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mruby-3.4.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mruby-devel-3.4.0-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.4</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-0717.html</URL>
        <Description>CVE-2022-0717</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1196366</URL>
        <Description>SUSE Bug 1196366</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Out-of-bounds Read in mrb_get_args in GitHub repository mruby/mruby prior to 3.2. Possible arbitrary code execution if being exploited.</Note>
    </Notes>
    <CVE>CVE-2022-1276</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libmruby3_4_0-3.4.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmruby_core3_4_0-3.4.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mruby-3.4.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mruby-devel-3.4.0-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-1276.html</URL>
        <Description>CVE-2022-1276</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1198288</URL>
        <Description>SUSE Bug 1198288</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A vulnerability, which was classified as problematic, was found in mruby up to 3.4.0-rc2. Affected is the function scope_new of the file mrbgems/mruby-compiler/core/codegen.c of the component nregs Handler. The manipulation leads to heap-based buffer overflow. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. The name of the patch is 1fdd96104180cc0fb5d3cb086b05ab6458911bb9. It is recommended to apply a patch to fix this issue.</Note>
    </Notes>
    <CVE>CVE-2025-7207</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libmruby3_4_0-3.4.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libmruby_core3_4_0-3.4.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mruby-3.4.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mruby-devel-3.4.0-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-7207.html</URL>
        <Description>CVE-2025-7207</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1246138</URL>
        <Description>SUSE Bug 1246138</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
