CVE-2022-28739

There is a buffer over-read in Ruby before 2.6.10, 2.7.x before 2.7.6, 3.x before 3.0.4, and 3.1.x before 3.1.2. It occurs in String-to-Float conversion, including Kernel#Float and String#to_f.
References
Link Resource
http://seclists.org/fulldisclosure/2022/Oct/28
http://seclists.org/fulldisclosure/2022/Oct/29
http://seclists.org/fulldisclosure/2022/Oct/30
http://seclists.org/fulldisclosure/2022/Oct/41 Mailing List Third Party Advisory
http://seclists.org/fulldisclosure/2022/Oct/42
https://hackerone.com/reports/1248108 Permissions Required Third Party Advisory
https://lists.debian.org/debian-lts-announce/2023/06/msg00012.html
https://security-tracker.debian.org/tracker/CVE-2022-28739 Third Party Advisory
https://security.gentoo.org/glsa/202401-27
https://security.netapp.com/advisory/ntap-20220624-0002/ Third Party Advisory
https://support.apple.com/kb/HT213488 Third Party Advisory
https://support.apple.com/kb/HT213493 Third Party Advisory
https://support.apple.com/kb/HT213494 Third Party Advisory
https://www.ruby-lang.org/en/news/2022/04/12/buffer-overrun-in-string-to-float-cve-2022-28739/ Vendor Advisory
http://seclists.org/fulldisclosure/2022/Oct/28
http://seclists.org/fulldisclosure/2022/Oct/29
http://seclists.org/fulldisclosure/2022/Oct/30
http://seclists.org/fulldisclosure/2022/Oct/41 Mailing List Third Party Advisory
http://seclists.org/fulldisclosure/2022/Oct/42
https://hackerone.com/reports/1248108 Permissions Required Third Party Advisory
https://lists.debian.org/debian-lts-announce/2023/06/msg00012.html
https://security-tracker.debian.org/tracker/CVE-2022-28739 Third Party Advisory
https://security.gentoo.org/glsa/202401-27
https://security.netapp.com/advisory/ntap-20220624-0002/ Third Party Advisory
https://support.apple.com/kb/HT213488 Third Party Advisory
https://support.apple.com/kb/HT213493 Third Party Advisory
https://support.apple.com/kb/HT213494 Third Party Advisory
https://www.ruby-lang.org/en/news/2022/04/12/buffer-overrun-in-string-to-float-cve-2022-28739/ Vendor Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:ruby-lang:ruby:*:*:*:*:*:*:*:*
cpe:2.3:a:ruby-lang:ruby:*:*:*:*:*:*:*:*
cpe:2.3:a:ruby-lang:ruby:*:*:*:*:*:*:*:*
cpe:2.3:a:ruby-lang:ruby:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*

History

21 Nov 2024, 06:57

Type Values Removed Values Added
References () http://seclists.org/fulldisclosure/2022/Oct/28 - () http://seclists.org/fulldisclosure/2022/Oct/28 -
References () http://seclists.org/fulldisclosure/2022/Oct/29 - () http://seclists.org/fulldisclosure/2022/Oct/29 -
References () http://seclists.org/fulldisclosure/2022/Oct/30 - () http://seclists.org/fulldisclosure/2022/Oct/30 -
References () http://seclists.org/fulldisclosure/2022/Oct/41 - Mailing List, Third Party Advisory () http://seclists.org/fulldisclosure/2022/Oct/41 - Mailing List, Third Party Advisory
References () http://seclists.org/fulldisclosure/2022/Oct/42 - () http://seclists.org/fulldisclosure/2022/Oct/42 -
References () https://hackerone.com/reports/1248108 - Permissions Required, Third Party Advisory () https://hackerone.com/reports/1248108 - Permissions Required, Third Party Advisory
References () https://lists.debian.org/debian-lts-announce/2023/06/msg00012.html - () https://lists.debian.org/debian-lts-announce/2023/06/msg00012.html -
References () https://security-tracker.debian.org/tracker/CVE-2022-28739 - Third Party Advisory () https://security-tracker.debian.org/tracker/CVE-2022-28739 - Third Party Advisory
References () https://security.gentoo.org/glsa/202401-27 - () https://security.gentoo.org/glsa/202401-27 -
References () https://security.netapp.com/advisory/ntap-20220624-0002/ - Third Party Advisory () https://security.netapp.com/advisory/ntap-20220624-0002/ - Third Party Advisory
References () https://support.apple.com/kb/HT213488 - Third Party Advisory () https://support.apple.com/kb/HT213488 - Third Party Advisory
References () https://support.apple.com/kb/HT213493 - Third Party Advisory () https://support.apple.com/kb/HT213493 - Third Party Advisory
References () https://support.apple.com/kb/HT213494 - Third Party Advisory () https://support.apple.com/kb/HT213494 - Third Party Advisory
References () https://www.ruby-lang.org/en/news/2022/04/12/buffer-overrun-in-string-to-float-cve-2022-28739/ - Vendor Advisory () https://www.ruby-lang.org/en/news/2022/04/12/buffer-overrun-in-string-to-float-cve-2022-28739/ - Vendor Advisory

24 Jan 2024, 05:15

Type Values Removed Values Added
References
  • () https://security.gentoo.org/glsa/202401-27 -

09 Jun 2023, 13:15

Type Values Removed Values Added
References
  • (MISC) http://seclists.org/fulldisclosure/2022/Oct/28 -
  • (MISC) https://lists.debian.org/debian-lts-announce/2023/06/msg00012.html -
  • (MISC) http://seclists.org/fulldisclosure/2022/Oct/42 -
  • (MISC) http://seclists.org/fulldisclosure/2022/Oct/29 -
  • (MISC) http://seclists.org/fulldisclosure/2022/Oct/30 -

Information

Published : 2022-05-09 18:15

Updated : 2024-11-21 06:57


NVD link : CVE-2022-28739

Mitre link : CVE-2022-28739

CVE.ORG link : CVE-2022-28739


JSON object : View

Products Affected

debian

  • debian_linux

apple

  • macos

ruby-lang

  • ruby
CWE
CWE-125

Out-of-bounds Read