| Vulnerability Name: | CVE-2022-28738 (CCN-226047) | ||||||||||||||||||
| Assigned: | 2022-04-12 | ||||||||||||||||||
| Published: | 2022-04-12 | ||||||||||||||||||
| Updated: | 2022-11-29 | ||||||||||||||||||
| Summary: | A double free was found in the Regexp compiler in Ruby 3.x before 3.0.4 and 3.1.x before 3.1.2. If a victim attempts to create a Regexp from untrusted user input, an attacker may be able to write to unexpected memory locations. | ||||||||||||||||||
| CVSS v3 Severity: | 9.8 Critical (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) 8.5 High (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
8.5 High (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
6.7 Medium (REDHAT Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C)
| ||||||||||||||||||
| CVSS v2 Severity: | 7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
| ||||||||||||||||||
| Vulnerability Type: | CWE-415 | ||||||||||||||||||
| Vulnerability Consequences: | Gain Access | ||||||||||||||||||
| References: | Source: MITRE Type: CNA CVE-2022-28738 Source: XF Type: UNKNOWN ruby-cve202228738-code-exec(226047) Source: cve@mitre.org Type: Permissions Required, Third Party Advisory cve@mitre.org Source: cve@mitre.org Type: Patch, Third Party Advisory cve@mitre.org Source: cve@mitre.org Type: Third Party Advisory cve@mitre.org Source: CCN Type: Ruby Web site CVE-2022-28738: Double free in Regexp compilation Source: cve@mitre.org Type: Vendor Advisory cve@mitre.org | ||||||||||||||||||
| Vulnerable Configuration: | Configuration RedHat 1: Configuration CCN 1: Denotes that component is vulnerable | ||||||||||||||||||
| Oval Definitions | |||||||||||||||||||
| |||||||||||||||||||
| BACK | |||||||||||||||||||