ID |
CVE-2022-28738
|
Summary |
A double free was found in the Regexp compiler in Ruby 3.x before 3.0.4 and 3.1.x before 3.1.2. If a victim attempts to create a Regexp from untrusted user input, an attacker may be able to write to unexpected memory locations. |
References |
|
Vulnerable Configurations |
-
cpe:2.3:a:ruby-lang:ruby:3.1.0:*:*:*:*:*:*:*
cpe:2.3:a:ruby-lang:ruby:3.1.0:*:*:*:*:*:*:*
-
cpe:2.3:a:ruby-lang:ruby:3.1.1:*:*:*:*:*:*:*
cpe:2.3:a:ruby-lang:ruby:3.1.1:*:*:*:*:*:*:*
-
cpe:2.3:a:ruby-lang:ruby:3.0.0:-:*:*:*:*:*:*
cpe:2.3:a:ruby-lang:ruby:3.0.0:-:*:*:*:*:*:*
-
cpe:2.3:a:ruby-lang:ruby:3.0.0:preview1:*:*:*:*:*:*
cpe:2.3:a:ruby-lang:ruby:3.0.0:preview1:*:*:*:*:*:*
-
cpe:2.3:a:ruby-lang:ruby:3.0.0:preview2:*:*:*:*:*:*
cpe:2.3:a:ruby-lang:ruby:3.0.0:preview2:*:*:*:*:*:*
-
cpe:2.3:a:ruby-lang:ruby:3.0.0:rc1:*:*:*:*:*:*
cpe:2.3:a:ruby-lang:ruby:3.0.0:rc1:*:*:*:*:*:*
-
cpe:2.3:a:ruby-lang:ruby:3.0.0:rc2:*:*:*:*:*:*
cpe:2.3:a:ruby-lang:ruby:3.0.0:rc2:*:*:*:*:*:*
-
cpe:2.3:a:ruby-lang:ruby:3.0.1:*:*:*:*:*:*:*
cpe:2.3:a:ruby-lang:ruby:3.0.1:*:*:*:*:*:*:*
-
cpe:2.3:a:ruby-lang:ruby:3.0.2:*:*:*:*:*:*:*
cpe:2.3:a:ruby-lang:ruby:3.0.2:*:*:*:*:*:*:*
-
cpe:2.3:a:ruby-lang:ruby:3.0.3:*:*:*:*:*:*:*
cpe:2.3:a:ruby-lang:ruby:3.0.3:*:*:*:*:*:*:*
|
CVSS |
Base: | 7.5 (as of 24-01-2024 - 05:15) |
Impact: | |
Exploitability: | |
|
CWE |
CWE-415 |
CAPEC |
|
Access |
Vector | Complexity | Authentication |
NETWORK |
LOW |
NONE |
|
Impact |
Confidentiality | Integrity | Availability |
PARTIAL |
PARTIAL |
PARTIAL |
|
cvss-vector
via4
|
AV:N/AC:L/Au:N/C:P/I:P/A:P
|
Last major update |
24-01-2024 - 05:15 |
Published |
09-05-2022 - 18:15 |
Last modified |
24-01-2024 - 05:15 |