vulnerability

Red Hat: CVE-2022-28738: CVE-2022-28738 Ruby: Double free in Regexp compilation (Multiple Advisories)

Severity
8
CVSS
(AV:N/AC:L/Au:N/C:P/I:P/A:P)
Published
May 9, 2022
Added
Oct 20, 2022
Modified
Sep 10, 2025

Description

A double free was found in the Regexp compiler in Ruby 3.x before 3.0.4 and 3.1.x before 3.1.2. If a victim attempts to create a Regexp from untrusted user input, an attacker may be able to write to unexpected memory locations.

Solutions

redhat-upgrade-rubyredhat-upgrade-ruby-debuginforedhat-upgrade-ruby-debugsourceredhat-upgrade-ruby-default-gemsredhat-upgrade-ruby-develredhat-upgrade-ruby-docredhat-upgrade-ruby-libsredhat-upgrade-ruby-libs-debuginforedhat-upgrade-rubygem-abrtredhat-upgrade-rubygem-abrt-docredhat-upgrade-rubygem-bigdecimalredhat-upgrade-rubygem-bigdecimal-debuginforedhat-upgrade-rubygem-bundlerredhat-upgrade-rubygem-io-consoleredhat-upgrade-rubygem-io-console-debuginforedhat-upgrade-rubygem-irbredhat-upgrade-rubygem-jsonredhat-upgrade-rubygem-json-debuginforedhat-upgrade-rubygem-minitestredhat-upgrade-rubygem-mysql2redhat-upgrade-rubygem-mysql2-debuginforedhat-upgrade-rubygem-mysql2-debugsourceredhat-upgrade-rubygem-mysql2-docredhat-upgrade-rubygem-pgredhat-upgrade-rubygem-pg-debuginforedhat-upgrade-rubygem-pg-debugsourceredhat-upgrade-rubygem-pg-docredhat-upgrade-rubygem-power_assertredhat-upgrade-rubygem-psychredhat-upgrade-rubygem-psych-debuginforedhat-upgrade-rubygem-rakeredhat-upgrade-rubygem-rbsredhat-upgrade-rubygem-rdocredhat-upgrade-rubygem-rexmlredhat-upgrade-rubygem-rssredhat-upgrade-rubygem-test-unitredhat-upgrade-rubygem-typeprofredhat-upgrade-rubygemsredhat-upgrade-rubygems-devel
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.