A double free was found in the Regexp compiler in Ruby 3.x before 3.0.4 and 3.1.x before 3.1.2. If a victim attempts to create a Regexp from untrusted user input, an attacker may be able to write to unexpected memory locations.
References
Link | Resource |
---|---|
https://hackerone.com/reports/1220911 | Permissions Required Third Party Advisory |
https://security-tracker.debian.org/tracker/CVE-2022-28738 | Patch Third Party Advisory |
https://security.gentoo.org/glsa/202401-27 | |
https://security.netapp.com/advisory/ntap-20220624-0002/ | Third Party Advisory |
https://www.ruby-lang.org/en/news/2022/04/12/double-free-in-regexp-compilation-cve-2022-28738/ | Vendor Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2022-05-09T00:00:00
Updated: 2024-01-24T05:06:35.199929
Reserved: 2022-04-06T00:00:00
Link: CVE-2022-28738
JSON object: View
NVD Information
Status : Modified
Published: 2022-05-09T18:15:08.490
Modified: 2024-01-24T05:15:12.147
Link: CVE-2022-28738
JSON object: View
Redhat Information
No data.
CWE