Opened 2 years ago

Closed 2 years ago

Last modified 2 years ago

#16405 closed enhancement (fixed)

ruby-3.1.2

Reported by: Bruce Dubbs Owned by: Douglas R. Reno
Priority: elevated Milestone: 11.2
Component: BOOK Version: git
Severity: normal Keywords:
Cc:

Description

New point version.

Change History (6)

comment:1 by Douglas R. Reno, 2 years ago

Owner: changed from blfs-book to Douglas R. Reno
Status: newassigned

Grab security updates

comment:2 by Douglas R. Reno, 2 years ago

Priority: normalelevated

comment:3 by Douglas R. Reno, 2 years ago

---

CVE-2022-28738: Double free in Regexp compilation

A double-free vulnerability is discovered in Regexp compilation. This vulnerability has been assigned the CVE identifier CVE-2022-28738. We strongly recommend upgrading Ruby. Details

Due to a bug in the Regexp compilation process, creating a Regexp object with a crafted source string could cause the same memory to be freed twice. This is known as a “double free” vulnerability. Note that, in general, it is considered unsafe to create and use a Regexp object generated from untrusted input. In this case, however, following a comprehensive assessment, we treat this issue as a vulnerability.

Please update Ruby to 3.0.4, or 3.1.2.

Affected versions

ruby 3.0.3 or prior

ruby 3.1.1 or prior

Note that ruby 2.6 series and 2.7 series are not affected.

History

Originally published at 2022-04-12 12:00:00 (UTC)

comment:4 by Douglas R. Reno, 2 years ago


CVE-2022-28739: Buffer overrun in String-to-Float conversion

A buffer-overrun vulnerability is discovered in a conversion algorithm from a String to a Float. This vulnerability has been assigned the CVE identifier CVE-2022-28739. We strongly recommend upgrading Ruby.

Details

Due to a bug in an internal function that converts a String to a Float, some conversion methods like Kernel#Float and String#to_f could cause buffer over-read. A typical consequence is a process termination due to segmentation fault, but under limited circumstances, it may be exploitable for illegal memory read.

Please update Ruby to 2.6.10, 2.7.6, 3.0.4, or 3.1.2.

Affected versions

ruby 2.6.9 or prior

ruby 2.7.5 or prior

ruby 3.0.3 or prior

ruby 3.1.1 or prior

History

Originally published at 2022-04-12 12:00:00 (UTC)

comment:5 by Douglas R. Reno, 2 years ago

Resolution: fixed
Status: assignedclosed

comment:6 by Douglas R. Reno, 2 years ago

Security Advisory 11.1-030 issued

Note: See TracTickets for help on using tickets.