CVE-2020-6838
Publication date 11 January 2020
Last updated 11 July 2025
Ubuntu priority
Cvss 3 Severity Score
Description
In mruby 2.1.0, there is a use-after-free in hash_values_at in mrbgems/mruby-hash-ext/src/hash-ext.c.
Status
| Package | Ubuntu Release | Status |
|---|---|---|
| mruby | 26.04 LTS resolute |
Needs evaluation
|
| 25.10 questing |
Needs evaluation
|
|
| 24.04 LTS noble |
Needs evaluation
|
|
| 22.04 LTS jammy |
Needs evaluation
|
|
| 20.04 LTS focal | Ignored end of standard support, was needs-triage | |
| 18.04 LTS bionic | Ignored end of standard support, was needs-triage | |
| 16.04 LTS xenial | Ignored end of standard support, was needs-triage | |
| 14.04 LTS trusty | Not in release |
Severity score breakdown
| Parameter | Value |
|---|---|
| Base score |
|
| Attack vector | Network |
| Attack complexity | Low |
| Privileges required | None |
| User interaction | None |
| Scope | Unchanged |
| Confidentiality | High |
| Integrity impact | High |
| Availability impact | High |
| Vector | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
References
Other references
- https://github.com/mruby/mruby/issues/4926
- https://github.com/mruby/mruby/commit/fc8fb41451b07b3fda0726ba80e88e509ad02452
- https://github.com/mruby/mruby/commit/70e574689664c10ed2c47581999cc2ce3e3c5afb
- https://github.com/mruby/mruby/commit/2742ded32fe18f88833d76b297f5c2170b6880c3
- https://www.cve.org/CVERecord?id=CVE-2020-6838