
Cloud Vulnerability DB
A community-led vulnerabilities database
A buffer over-read vulnerability (CVE-2022-28739) was discovered in Ruby before versions 2.6.10, 2.7.x before 2.7.6, 3.x before 3.0.4, and 3.1.x before 3.1.2. The vulnerability occurs in String-to-Float conversion functionality, specifically affecting Kernel#Float and String#to_f methods. The issue was discovered and reported by piao, with the initial disclosure made on April 12, 2022 (Ruby Lang).
The vulnerability exists in an internal function that converts a String to a Float data type. The bug manifests as a buffer over-read condition during string-to-float conversion operations, affecting methods like Kernel#Float and String#to_f. The vulnerability has been assigned a CVSS score of 7.5 (HIGH) with a vector of CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N (NetApp Advisory).
The primary impact of this vulnerability is the potential for process termination due to segmentation faults. Under specific circumstances, it may also be exploitable for unauthorized memory reads, potentially leading to information disclosure. The vulnerability could allow remote users to cause unexpected application termination or potentially execute arbitrary code (Ruby Lang).
The vulnerability has been fixed in Ruby versions 2.6.10, 2.7.6, 3.0.4, and 3.1.2. Users are strongly recommended to upgrade to these or later versions to address the security issue. The fix involves updating the string-to-float conversion algorithm to prevent buffer over-read conditions (Ruby Lang).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."