CVE-2022-28738
Publication date 9 May 2022
Last updated 24 July 2024
Ubuntu priority
Cvss 3 Severity Score
A double free was found in the Regexp compiler in Ruby 3.x before 3.0.4 and 3.1.x before 3.1.2. If a victim attempts to create a Regexp from untrusted user input, an attacker may be able to write to unexpected memory locations.
Status
Package | Ubuntu Release | Status |
---|---|---|
ruby2.3 | 16.04 LTS xenial |
Not affected
|
ruby2.5 | 18.04 LTS bionic |
Not affected
|
ruby2.7 | 22.04 LTS jammy | Not in release |
20.04 LTS focal |
Not affected
|
|
ruby3.0 | ||
22.04 LTS jammy |
Fixed 3.0.2-7ubuntu2.1
|
Severity score breakdown
Parameter | Value |
---|---|
Base score | 9.8 · Critical |
Attack vector | Network |
Attack complexity | Low |
Privileges required | None |
User interaction | None |
Scope | Unchanged |
Confidentiality | High |
Integrity impact | High |
Availability impact | High |
Vector | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
References
Related Ubuntu Security Notices (USN)
- USN-5462-1
- Ruby vulnerabilities
- 6 June 2022
Other references
- https://github.com/ruby/ruby/commit/052ec6d2585c3ace95671013d336f5543624ef3d (v3_0_4)
- https://github.com/ruby/ruby/commit/73f45e5e96ccc13a131f7c0122cf8600ce5b930f (v3_1_2)
- https://www.ruby-lang.org/en/news/2022/04/12/double-free-in-regexp-compilation-cve-2022-28738/
- https://access.redhat.com/security/cve/CVE-2022-28738
- https://www.cve.org/CVERecord?id=CVE-2022-28738