Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
c39ab25e by Salvatore Bonaccorso at 2022-04-21T07:28:45+02:00
Add CVE-2022-28738/ruby

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -1959,8 +1959,15 @@ CVE-2022-28739 [Buffer overrun in String-to-Float 
conversion]
        NOTE: 
https://github.com/ruby/ruby/commit/3fa771ddedac25560be57f4055f1767e6c810f58 
(v3_0_4)
        NOTE: 
https://github.com/ruby/ruby/commit/8d142ecff9af7d60728b8cfa9138e8623985c428 
(v3_1_2)
        NOTE: 
https://www.ruby-lang.org/en/news/2022/04/12/buffer-overrun-in-string-to-float-cve-2022-28739/
-CVE-2022-28738
+CVE-2022-28738 [Double free in Regexp compilation]
        RESERVED
+       - ruby3.0 <unfixed>
+       - ruby2.7 <not-affected> (Vulnerable code not present)
+       - ruby2.5 <not-affected> (Vulnerable code not present)
+       - ruby2.3 <not-affected> (Vulnerable code not present)
+       NOTE: 
https://github.com/ruby/ruby/commit/052ec6d2585c3ace95671013d336f5543624ef3d 
(v3_0_4)
+       NOTE: 
https://github.com/ruby/ruby/commit/73f45e5e96ccc13a131f7c0122cf8600ce5b930f 
(v3_1_2)
+       NOTE: 
https://www.ruby-lang.org/en/news/2022/04/12/double-free-in-regexp-compilation-cve-2022-28738/
 CVE-2022-28737
        RESERVED
 CVE-2022-28736



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/c39ab25ec34c7ff5fe72fcf1c0099a0b66b0e485

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/c39ab25ec34c7ff5fe72fcf1c0099a0b66b0e485
You're receiving this email because of your account on salsa.debian.org.


_______________________________________________
debian-security-tracker-commits mailing list
[email protected]
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits

Reply via email to