{"id":"BIT-ruby-min-2022-28738","details":"A double free was found in the Regexp compiler in Ruby 3.x before 3.0.4 and 3.1.x before 3.1.2. If a victim attempts to create a Regexp from untrusted user input, an attacker may be able to write to unexpected memory locations.","aliases":["BIT-ruby-2022-28738","CVE-2022-28738"],"modified":"2025-04-03T14:40:37.652Z","published":"2025-01-27T07:20:16.333Z","database_specific":{"cpes":["cpe:2.3:a:ruby-lang:ruby:*:*:*:*:*:*:*:*"],"severity":"Critical"},"references":[{"type":"WEB","url":"https://hackerone.com/reports/1220911"},{"type":"WEB","url":"https://security-tracker.debian.org/tracker/CVE-2022-28738"},{"type":"WEB","url":"https://security.gentoo.org/glsa/202401-27"},{"type":"WEB","url":"https://security.netapp.com/advisory/ntap-20220624-0002/"},{"type":"WEB","url":"https://www.ruby-lang.org/en/news/2022/04/12/double-free-in-regexp-compilation-cve-2022-28738/"},{"type":"WEB","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-28738"}],"affected":[{"package":{"name":"ruby-min","ecosystem":"Bitnami","purl":"pkg:bitnami/ruby-min"},"ranges":[{"type":"SEMVER","events":[{"introduced":"3.0.0"},{"fixed":"3.0.4"},{"introduced":"3.1.0"},{"fixed":"3.1.2"}]}],"database_specific":{"source":"https://github.com/bitnami/vulndb/tree/main/data/ruby-min/BIT-ruby-min-2022-28738.json"},"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}],"schema_version":"1.7.3"}