A double free was found in the Regexp compiler in Ruby 3.x before 3.0.4 and 3.1.x before 3.1.2. If a victim attempts to create a Regexp from untrusted user input, an attacker may be able to write to unexpected memory locations.
https://security.netapp.com/advisory/ntap-20220624-0002/
https://security.gentoo.org/glsa/202401-27
https://security-tracker.debian.org/tracker/CVE-2022-28738
https://hackerone.com/reports/1220911
https://www.ruby-lang.org/en/news/2022/04/12/double-free-in-regexp-compilation-cve-2022-28738/
Source: Mitre, NVD
Published: 2022-05-09
Updated: 2024-11-21
Base Score: 7.5
Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P
Severity: High
Base Score: 9.8
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Severity: Critical
EPSS: 0.00368