Svi
Pretraži prema proizvođaču
Pretraži prema CWE oznaci
O usluzi
Pretplate
Jezik
hr
en
CVE-2022-28739 - CERT CVE
CVE-2022-28739
ID
CVE-2022-28739
Sažetak
There is a buffer over-read in Ruby before 2.6.10, 2.7.x before 2.7.6, 3.x before 3.0.4, and 3.1.x before 3.1.2. It occurs in String-to-Float conversion, including Kernel#Float and String#to_f.
Reference
http://seclists.org/fulldisclosure/2022/Oct/28
http://seclists.org/fulldisclosure/2022/Oct/29
http://seclists.org/fulldisclosure/2022/Oct/30
http://seclists.org/fulldisclosure/2022/Oct/41
http://seclists.org/fulldisclosure/2022/Oct/42
https://hackerone.com/reports/1248108
https://lists.debian.org/debian-lts-announce/2023/06/msg00012.html
https://security-tracker.debian.org/tracker/CVE-2022-28739
https://security.gentoo.org/glsa/202401-27
https://security.netapp.com/advisory/ntap-20220624-0002/
https://support.apple.com/kb/HT213488
https://support.apple.com/kb/HT213493
https://support.apple.com/kb/HT213494
https://www.ruby-lang.org/en/news/2022/04/12/buffer-overrun-in-string-to-float-cve-2022-28739/
CVSS
Base:
4.3
Impact:
2.9
Exploitability:
8.6
Pristup
Vektor
Složenost
Autentikacija
NETWORK
MEDIUM
NONE
Impact
Povjerljivost
Cjelovitost
Dostupnost
PARTIAL
NONE
NONE
CVSS vektor
AV:N/AC:M/Au:N/C:P/I:N/A:N
Zadnje važnije ažuriranje
24-01-2024 - 05:15
Objavljeno
09-05-2022 - 18:15