A double free was found in the Regexp compiler in Ruby 3.x before 3.0.4 and 3.1.x before 3.1.2. If a victim attempts to create a Regexp from untrusted user input, an attacker may be able to write to unexpected memory locations.
{ "vanir_signatures": [ { "id": "CVE-2022-28738-6a62c92b", "signature_type": "Function", "digest": { "function_hash": "328864874327574063403775378011327146659", "length": 8488.0 }, "target": { "file": "missing/dtoa.c", "function": "strtod" }, "source": "https://github.com/ruby/ruby/commit/3fa771ddedac25560be57f4055f1767e6c810f58", "signature_version": "v1", "deprecated": false }, { "id": "CVE-2022-28738-d67435c3", "signature_type": "Line", "digest": { "line_hashes": [ "337285692131683350587106124606194849187", "171125667734974039822063106046701353862", "315160000533057727845661241951943922131", "27247823211488908491542581188290566144", "268560890618114141161195735339343855241", "321395545576834868767584132304880323141", "12924114540111067235220886822648996878", "18815063887966383786580032668437598724" ], "threshold": 0.9 }, "target": { "file": "missing/dtoa.c" }, "source": "https://github.com/ruby/ruby/commit/3fa771ddedac25560be57f4055f1767e6c810f58", "signature_version": "v1", "deprecated": false } ] }