First published: Thu Apr 14 2022(Updated: )
Ruby. A memory corruption issue was addressed by updating Ruby to version 2.6.10.
Credit: cve@mitre.org CVE-2022-28739 CVE-2022-28739 CVE-2022-28739 cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/ruby | <0:3.0.4-160.el9_0 | 0:3.0.4-160.el9_0 |
redhat/rh-ruby30-ruby | <0:3.0.4-149.el7 | 0:3.0.4-149.el7 |
redhat/rh-ruby27-ruby | <0:2.7.6-131.el7 | 0:2.7.6-131.el7 |
Ruby-lang Ruby | <2.6.10 | |
Ruby-lang Ruby | >=2.7.0<2.7.6 | |
Ruby-lang Ruby | >=3.0.0<3.0.4 | |
Debian Debian Linux | =9.0 | |
Debian Debian Linux | =10.0 | |
Debian Debian Linux | =11.0 | |
Apple macOS | >=11.0<11.7.1 | |
Apple macOS | >=12.0<12.6.1 | |
redhat/Ruby | <2.6.10 | 2.6.10 |
redhat/Ruby | <2.7.6 | 2.7.6 |
redhat/Ruby | <3.0.4 | 3.0.4 |
redhat/Ruby | <3.1.2 | 3.1.2 |
Apple macOS Big Sur | <11.7.1 | 11.7.1 |
Apple macOS Monterey | <12.6.1 | 12.6.1 |
Apple macOS Ventura | <13 | 13 |
debian/ruby2.7 | <=2.7.4-1+deb11u1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
(Found alongside the following vulnerabilities)
CVE-2022-28739 is a memory corruption vulnerability in Ruby that can cause a buffer overrun and illegal memory read under certain circumstances.
macOS Monterey is affected by CVE-2022-28739 and can be remediated by updating to version 12.6.1.
macOS Big Sur is affected by CVE-2022-28739 and can be remediated by updating to version 11.7.1.
Red Hat Ruby is affected by CVE-2022-28739 and can be remediated by updating to version 2.6.10.
CVE-2022-28739 has a severity score of 6.2, which is considered medium.