CVE-2022-28739

There is a buffer over-read in Ruby before 2.6.10, 2.7.x before 2.7.6, 3.x before 3.0.4, and 3.1.x before 3.1.2. It occurs in String-to-Float conversion, including Kernel#Float and String#to_f.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:ruby-lang:ruby:*:*:*:*:*:*:*:*
cpe:2.3:a:ruby-lang:ruby:*:*:*:*:*:*:*:*
cpe:2.3:a:ruby-lang:ruby:*:*:*:*:*:*:*:*
cpe:2.3:a:ruby-lang:ruby:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*

History

24 Jan 2024, 05:15

Type Values Removed Values Added
References
  • () https://security.gentoo.org/glsa/202401-27 -

09 Jun 2023, 13:15

Type Values Removed Values Added
References
  • (MISC) http://seclists.org/fulldisclosure/2022/Oct/28 -
  • (MISC) http://seclists.org/fulldisclosure/2022/Oct/29 -
  • (MISC) http://seclists.org/fulldisclosure/2022/Oct/30 -
  • (MISC) http://seclists.org/fulldisclosure/2022/Oct/42 -
  • (MISC) https://lists.debian.org/debian-lts-announce/2023/06/msg00012.html -

08 Nov 2022, 19:39

Type Values Removed Values Added
CPE cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*
First Time Apple macos
Apple
References (FULLDISC) http://seclists.org/fulldisclosure/2022/Oct/41 - (FULLDISC) http://seclists.org/fulldisclosure/2022/Oct/41 - Mailing List, Third Party Advisory
References (CONFIRM) https://support.apple.com/kb/HT213493 - (CONFIRM) https://support.apple.com/kb/HT213493 - Third Party Advisory
References (CONFIRM) https://support.apple.com/kb/HT213488 - (CONFIRM) https://support.apple.com/kb/HT213488 - Third Party Advisory
References (CONFIRM) https://security.netapp.com/advisory/ntap-20220624-0002/ - (CONFIRM) https://security.netapp.com/advisory/ntap-20220624-0002/ - Third Party Advisory
References (CONFIRM) https://support.apple.com/kb/HT213494 - (CONFIRM) https://support.apple.com/kb/HT213494 - Third Party Advisory

30 Oct 2022, 23:15

Type Values Removed Values Added
References
  • (FULLDISC) http://seclists.org/fulldisclosure/2022/Oct/41 -

25 Oct 2022, 21:15

Type Values Removed Values Added
References
  • (CONFIRM) https://support.apple.com/kb/HT213494 -
  • (CONFIRM) https://support.apple.com/kb/HT213493 -
  • (CONFIRM) https://support.apple.com/kb/HT213488 -

24 Jun 2022, 16:15

Type Values Removed Values Added
References
  • (CONFIRM) https://security.netapp.com/advisory/ntap-20220624-0002/ -

19 May 2022, 14:55

Type Values Removed Values Added
CPE cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
cpe:2.3:a:ruby-lang:ruby:*:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : 4.3
v3 : 7.5
References (CONFIRM) https://www.ruby-lang.org/en/news/2022/04/12/buffer-overrun-in-string-to-float-cve-2022-28739/ - (CONFIRM) https://www.ruby-lang.org/en/news/2022/04/12/buffer-overrun-in-string-to-float-cve-2022-28739/ - Vendor Advisory
References (MISC) https://hackerone.com/reports/1248108 - (MISC) https://hackerone.com/reports/1248108 - Permissions Required, Third Party Advisory
References (MISC) https://security-tracker.debian.org/tracker/CVE-2022-28739 - (MISC) https://security-tracker.debian.org/tracker/CVE-2022-28739 - Third Party Advisory
CWE CWE-125
First Time Ruby-lang
Debian debian Linux
Debian
Ruby-lang ruby

09 May 2022, 18:45

Type Values Removed Values Added
New CVE

Information

Published : 2022-05-09 18:15

Updated : 2024-01-24 05:15


NVD link : CVE-2022-28739

Mitre link : CVE-2022-28739

CVE.ORG link : CVE-2022-28739


JSON object : View

Products Affected

ruby-lang

  • ruby

debian

  • debian_linux

apple

  • macos
CWE
CWE-125

Out-of-bounds Read