CVE-2022-28739
Published: 9 May 2022
There is a buffer over-read in Ruby before 2.6.10, 2.7.x before 2.7.6, 3.x before 3.0.4, and 3.1.x before 3.1.2. It occurs in String-to-Float conversion, including Kernel#Float and String#to_f.
Priority
Status
Package | Release | Status |
---|---|---|
ruby3.0 Launchpad, Ubuntu, Debian |
kinetic |
Not vulnerable
|
upstream |
Released
(3.0.4-1)
|
|
jammy |
Released
(3.0.2-7ubuntu2.1)
|
|
ruby2.7 Launchpad, Ubuntu, Debian |
jammy |
Does not exist
|
upstream |
Needs triage
|
|
focal |
Released
(2.7.0-5ubuntu1.7)
|
|
impish |
Released
(2.7.4-1ubuntu3.2)
|
|
ruby2.5 Launchpad, Ubuntu, Debian |
upstream |
Needs triage
|
bionic |
Released
(2.5.1-1ubuntu1.12)
|
|
ruby2.3 Launchpad, Ubuntu, Debian |
upstream |
Needs triage
|
Severity score breakdown
Parameter | Value |
---|---|
Base score | 7.5 |
Attack vector | Network |
Attack complexity | Low |
Privileges required | None |
User interaction | None |
Scope | Unchanged |
Confidentiality | High |
Integrity impact | None |
Availability impact | None |
Vector | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N |
References
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28739
- https://github.com/ruby/ruby/commit/69f9992ed41920389d4185141a14f02f89a4d306 (v2_6_10)
- https://github.com/ruby/ruby/commit/c9c2245c0a25176072e02db9254f0e0c84c805cd (v2_7_6)
- https://github.com/ruby/ruby/commit/3fa771ddedac25560be57f4055f1767e6c810f58 (v3_0_4)
- https://github.com/ruby/ruby/commit/8d142ecff9af7d60728b8cfa9138e8623985c428 (v3_1_2)
- https://www.ruby-lang.org/en/news/2022/04/12/buffer-overrun-in-string-to-float-cve-2022-28739/
- https://access.redhat.com/security/cve/CVE-2022-28739
- https://ubuntu.com/security/notices/USN-5462-2
- https://ubuntu.com/security/notices/USN-5462-1
- NVD
- Launchpad
- Debian