vulnerability
Red Hat: CVE-2022-28738: CVE-2022-28738 Ruby: Double free in Regexp compilation (Multiple Advisories)
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 8 | (AV:N/AC:L/Au:N/C:P/I:P/A:P) | May 9, 2022 | Oct 20, 2022 | Sep 10, 2025 |
Severity
8
CVSS
(AV:N/AC:L/Au:N/C:P/I:P/A:P)
Published
May 9, 2022
Added
Oct 20, 2022
Modified
Sep 10, 2025
Description
A double free was found in the Regexp compiler in Ruby 3.x before 3.0.4 and 3.1.x before 3.1.2. If a victim attempts to create a Regexp from untrusted user input, an attacker may be able to write to unexpected memory locations.
Solutions
redhat-upgrade-rubyredhat-upgrade-ruby-debuginforedhat-upgrade-ruby-debugsourceredhat-upgrade-ruby-default-gemsredhat-upgrade-ruby-develredhat-upgrade-ruby-docredhat-upgrade-ruby-libsredhat-upgrade-ruby-libs-debuginforedhat-upgrade-rubygem-abrtredhat-upgrade-rubygem-abrt-docredhat-upgrade-rubygem-bigdecimalredhat-upgrade-rubygem-bigdecimal-debuginforedhat-upgrade-rubygem-bundlerredhat-upgrade-rubygem-io-consoleredhat-upgrade-rubygem-io-console-debuginforedhat-upgrade-rubygem-irbredhat-upgrade-rubygem-jsonredhat-upgrade-rubygem-json-debuginforedhat-upgrade-rubygem-minitestredhat-upgrade-rubygem-mysql2redhat-upgrade-rubygem-mysql2-debuginforedhat-upgrade-rubygem-mysql2-debugsourceredhat-upgrade-rubygem-mysql2-docredhat-upgrade-rubygem-pgredhat-upgrade-rubygem-pg-debuginforedhat-upgrade-rubygem-pg-debugsourceredhat-upgrade-rubygem-pg-docredhat-upgrade-rubygem-power_assertredhat-upgrade-rubygem-psychredhat-upgrade-rubygem-psych-debuginforedhat-upgrade-rubygem-rakeredhat-upgrade-rubygem-rbsredhat-upgrade-rubygem-rdocredhat-upgrade-rubygem-rexmlredhat-upgrade-rubygem-rssredhat-upgrade-rubygem-test-unitredhat-upgrade-rubygem-typeprofredhat-upgrade-rubygemsredhat-upgrade-rubygems-devel
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.