9.8
CVSSv3

CVE-2022-28738

Published: 09/05/2022 Updated: 24/01/2024
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 668
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

A double free was found in the Regexp compiler in Ruby 3.x prior to 3.0.4 and 3.1.x prior to 3.1.2. If a victim attempts to create a Regexp from untrusted user input, an attacker may be able to write to unexpected memory locations.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

ruby-lang ruby

Vendor Advisories

Debian Bug report logs - #1009958 ruby30: CVE-2022-28738 Package: src:ruby30; Maintainer for src:ruby30 is Debian Ruby Team <pkg-ruby-extras-maintainers@listsaliothdebianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Thu, 21 Apr 2022 08:54:06 UTC Severity: important Tags: security, upstream ...
Synopsis Moderate: ruby:30 security, bug fix, and enhancement update Type/Severity Security Advisory: Moderate Red Hat Insights patch analysis Identify and remediate systems affected by this advisory View affected systems Topic An update for the ruby:30 module is now available for Red Hat Enterprise Linux 8Red Hat Product Securi ...
Synopsis Moderate: ruby security, bug fix, and enhancement update Type/Severity Security Advisory: Moderate Red Hat Insights patch analysis Identify and remediate systems affected by this advisory View affected systems Topic An update for ruby is now available for Red Hat Enterprise Linux 9Red Hat Product Security has rated this u ...
Synopsis Moderate: rh-ruby30-ruby security, bug fix, and enhancement update Type/Severity Security Advisory: Moderate Red Hat Insights patch analysis Identify and remediate systems affected by this advisory View affected systems Topic An update for rh-ruby30-ruby is now available for Red Hat Software CollectionsRed Hat Product Sec ...
A double-free vulnerability was found in Ruby The issue occurs during Regexp compilation This flaw allows an attacker to create a Regexp object with a crafted source string that could cause the same memory to be freed twice (CVE-2022-28738) A buffer overrun vulnerability was found in Ruby The issue occurs in a conversion algorithm from a String ...
double-free in Regexp compilation ...