CVE-2022-28738

A double free was found in the Regexp compiler in Ruby 3.x before 3.0.4 and 3.1.x before 3.1.2. If a victim attempts to create a Regexp from untrusted user input, an attacker may be able to write to unexpected memory locations.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:ruby-lang:ruby:*:*:*:*:*:*:*:*
cpe:2.3:a:ruby-lang:ruby:*:*:*:*:*:*:*:*

History

21 Nov 2024, 06:57

Type Values Removed Values Added
References () https://hackerone.com/reports/1220911 - Permissions Required, Third Party Advisory () https://hackerone.com/reports/1220911 - Permissions Required, Third Party Advisory
References () https://security-tracker.debian.org/tracker/CVE-2022-28738 - Patch, Third Party Advisory () https://security-tracker.debian.org/tracker/CVE-2022-28738 - Patch, Third Party Advisory
References () https://security.gentoo.org/glsa/202401-27 - () https://security.gentoo.org/glsa/202401-27 -
References () https://security.netapp.com/advisory/ntap-20220624-0002/ - Third Party Advisory () https://security.netapp.com/advisory/ntap-20220624-0002/ - Third Party Advisory
References () https://www.ruby-lang.org/en/news/2022/04/12/double-free-in-regexp-compilation-cve-2022-28738/ - Vendor Advisory () https://www.ruby-lang.org/en/news/2022/04/12/double-free-in-regexp-compilation-cve-2022-28738/ - Vendor Advisory

24 Jan 2024, 05:15

Type Values Removed Values Added
References
  • () https://security.gentoo.org/glsa/202401-27 -

Information

Published : 2022-05-09 18:15

Updated : 2024-11-21 06:57


NVD link : CVE-2022-28738

Mitre link : CVE-2022-28738

CVE.ORG link : CVE-2022-28738


JSON object : View

Products Affected

ruby-lang

  • ruby
CWE
CWE-415

Double Free