|
1 | 1 | --- |
2 | 2 | engine: ruby |
3 | 3 | cve: 2022-28738 |
| 4 | +ghsa: 8pqg-8p79-j5j8 |
4 | 5 | url: https://www.ruby-lang.org/en/news/2022/04/12/double-free-in-regexp-compilation-cve-2022-28738/ |
5 | 6 | title: Double free in Regexp compilation |
6 | 7 | date: 2022-04-12 |
7 | 8 | description: | |
8 | | - A double-free vulnerability is discovered in Regexp compilation. This vulnerability has been assigned the CVE identifier CVE-2022-28738. We strongly recommend upgrading Ruby. |
| 9 | + A double-free vulnerability is discovered in Regexp compilation. This |
| 10 | + vulnerability has been assigned the CVE identifier CVE-2022-28738. |
| 11 | + We strongly recommend upgrading Ruby. |
9 | 12 |
|
10 | | - Due to a bug in the Regexp compilation process, creating a Regexp object with a crafted source string could cause the same memory to be freed twice. This is known as a “double free” vulnerability. Note that, in general, it is considered unsafe to create and use a Regexp object generated from untrusted input. In this case, however, following a comprehensive assessment, we treat this issue as a vulnerability. |
| 13 | + Due to a bug in the Regexp compilation process, creating a Regexp |
| 14 | + object with a crafted source string could cause the same memory to |
| 15 | + be freed twice. This is known as a “double free” vulnerability. Note |
| 16 | + that, in general, it is considered unsafe to create and use a Regexp |
| 17 | + object generated from untrusted input. In this case, however, |
| 18 | + following a comprehensive assessment, we treat this issue as a vulnerability. |
11 | 19 |
|
12 | | - Please update Ruby to 3.0.4, or 3.1.2. |
| 20 | + Please update Ruby to 3.0.4 or 3.1.2. |
| 21 | +cvss_v2: 7.5 |
| 22 | +cvss_v3: 9.8 |
13 | 23 | patched_versions: |
14 | 24 | - "~> 3.0.4" |
15 | 25 | - ">= 3.1.2" |
16 | 26 | unaffected_versions: |
17 | 27 | - "~> 2.6.0" |
18 | 28 | - "~> 2.7.0" |
| 29 | +related: |
| 30 | + url: |
| 31 | + - https://nvd.nist.gov/vuln/detail/CVE-2022-28738 |
| 32 | + - https://www.ruby-lang.org/en/news/2022/04/12/double-free-in-regexp-compilation-cve-2022-28738 |
| 33 | + - https://hackerone.com/reports/1220911 |
| 34 | + - https://security-tracker.debian.org/tracker/CVE-2022-28738 |
| 35 | + - https://security.netapp.com/advisory/ntap-20220624-0002 |
| 36 | + - https://security.gentoo.org/glsa/202401-27 |
| 37 | + - https://github.com/advisories/GHSA-8pqg-8p79-j5j8 |
0 commit comments