CVE-2022-28738
Published: 9 May 2022
A double free was found in the Regexp compiler in Ruby 3.x before 3.0.4 and 3.1.x before 3.1.2. If a victim attempts to create a Regexp from untrusted user input, an attacker may be able to write to unexpected memory locations.
Priority
Status
Package | Release | Status |
---|---|---|
ruby2.5 Launchpad, Ubuntu, Debian |
bionic |
Not vulnerable
|
upstream |
Not vulnerable
(debian: Vulnerable code not present)
|
|
ruby2.7 Launchpad, Ubuntu, Debian |
focal |
Not vulnerable
|
impish |
Not vulnerable
|
|
upstream |
Not vulnerable
(debian: Vulnerable code not present)
|
|
jammy |
Does not exist
|
|
ruby3.0 Launchpad, Ubuntu, Debian |
kinetic |
Not vulnerable
|
upstream |
Released
(3.0.4-1)
|
|
jammy |
Released
(3.0.2-7ubuntu2.1)
|
|
ruby2.3 Launchpad, Ubuntu, Debian |
upstream |
Not vulnerable
(debian: Vulnerable code not present)
|
Severity score breakdown
Parameter | Value |
---|---|
Base score | 9.8 |
Attack vector | Network |
Attack complexity | Low |
Privileges required | None |
User interaction | None |
Scope | Unchanged |
Confidentiality | High |
Integrity impact | High |
Availability impact | High |
Vector | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
References
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28738
- https://github.com/ruby/ruby/commit/052ec6d2585c3ace95671013d336f5543624ef3d (v3_0_4)
- https://github.com/ruby/ruby/commit/73f45e5e96ccc13a131f7c0122cf8600ce5b930f (v3_1_2)
- https://www.ruby-lang.org/en/news/2022/04/12/double-free-in-regexp-compilation-cve-2022-28738/
- https://access.redhat.com/security/cve/CVE-2022-28738
- https://ubuntu.com/security/notices/USN-5462-1
- NVD
- Launchpad
- Debian