{"id":"RHSA-2022:6450","summary":"Red Hat Security Advisory: ruby:3.0 security, bug fix, and enhancement update","modified":"2025-11-22T12:38:08Z","published":"2024-10-04T06:58:24Z","upstream":["CVE-2021-41817","CVE-2021-41819","CVE-2022-28738","CVE-2022-28739"],"references":[{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2022:6450"},{"type":"ARTICLE","url":"https://access.redhat.com/security/updates/classification/#moderate"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2025104"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2026757"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2075685"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2075687"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2109431"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2110981"},{"type":"ADVISORY","url":"https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_6450.json"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-41817"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-41817"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-41817"},{"type":"ARTICLE","url":"https://www.ruby-lang.org/en/news/2021/11/15/date-parsing-method-regexp-dos-cve-2021-41817/"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-41819"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-41819"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-41819"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-28738"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-28738"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-28738"},{"type":"ARTICLE","url":"http://www.ruby-lang.org/en/news/2022/04/12/double-free-in-regexp-compilation-cve-2022-28738/"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-28739"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-28739"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-28739"},{"type":"ARTICLE","url":"http://www.ruby-lang.org/en/news/2022/04/12/buffer-overrun-in-string-to-float-cve-2022-28739/"}],"affected":[{"package":{"name":"ruby","ecosystem":"Red Hat:enterprise_linux:8::appstream","purl":"pkg:rpm/redhat/ruby"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:3.0.4-141.module+el8.6.0+16311+3e5e17e9"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:6450.json"}},{"package":{"name":"ruby-debuginfo","ecosystem":"Red Hat:enterprise_linux:8::appstream","purl":"pkg:rpm/redhat/ruby-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:3.0.4-141.module+el8.6.0+16311+3e5e17e9"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:6450.json"}},{"package":{"name":"ruby-debugsource","ecosystem":"Red Hat:enterprise_linux:8::appstream","purl":"pkg:rpm/redhat/ruby-debugsource"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:3.0.4-141.module+el8.6.0+16311+3e5e17e9"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:6450.json"}},{"package":{"name":"ruby-default-gems","ecosystem":"Red Hat:enterprise_linux:8::appstream","purl":"pkg:rpm/redhat/ruby-default-gems"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:3.0.4-141.module+el8.6.0+16311+3e5e17e9"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:6450.json"}},{"package":{"name":"ruby-devel","ecosystem":"Red Hat:enterprise_linux:8::appstream","purl":"pkg:rpm/redhat/ruby-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:3.0.4-141.module+el8.6.0+16311+3e5e17e9"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:6450.json"}},{"package":{"name":"ruby-doc","ecosystem":"Red Hat:enterprise_linux:8::appstream","purl":"pkg:rpm/redhat/ruby-doc"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:3.0.4-141.module+el8.6.0+16311+3e5e17e9"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:6450.json"}},{"package":{"name":"ruby-libs","ecosystem":"Red Hat:enterprise_linux:8::appstream","purl":"pkg:rpm/redhat/ruby-libs"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:3.0.4-141.module+el8.6.0+16311+3e5e17e9"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:6450.json"}},{"package":{"name":"ruby-libs-debuginfo","ecosystem":"Red Hat:enterprise_linux:8::appstream","purl":"pkg:rpm/redhat/ruby-libs-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:3.0.4-141.module+el8.6.0+16311+3e5e17e9"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:6450.json"}},{"package":{"name":"rubygem-abrt","ecosystem":"Red Hat:enterprise_linux:8::appstream","purl":"pkg:rpm/redhat/rubygem-abrt"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:0.4.0-1.module+el8.5.0+11580+845038eb"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:6450.json"}},{"package":{"name":"rubygem-abrt-doc","ecosystem":"Red Hat:enterprise_linux:8::appstream","purl":"pkg:rpm/redhat/rubygem-abrt-doc"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:0.4.0-1.module+el8.5.0+11580+845038eb"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:6450.json"}},{"package":{"name":"rubygem-bigdecimal","ecosystem":"Red Hat:enterprise_linux:8::appstream","purl":"pkg:rpm/redhat/rubygem-bigdecimal"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:3.0.0-141.module+el8.6.0+16311+3e5e17e9"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:6450.json"}},{"package":{"name":"rubygem-bigdecimal-debuginfo","ecosystem":"Red Hat:enterprise_linux:8::appstream","purl":"pkg:rpm/redhat/rubygem-bigdecimal-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:3.0.0-141.module+el8.6.0+16311+3e5e17e9"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:6450.json"}},{"package":{"name":"rubygem-bundler","ecosystem":"Red Hat:enterprise_linux:8::appstream","purl":"pkg:rpm/redhat/rubygem-bundler"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.2.33-141.module+el8.6.0+16311+3e5e17e9"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:6450.json"}},{"package":{"name":"rubygem-io-console","ecosystem":"Red Hat:enterprise_linux:8::appstream","purl":"pkg:rpm/redhat/rubygem-io-console"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:0.5.7-141.module+el8.6.0+16311+3e5e17e9"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:6450.json"}},{"package":{"name":"rubygem-io-console-debuginfo","ecosystem":"Red Hat:enterprise_linux:8::appstream","purl":"pkg:rpm/redhat/rubygem-io-console-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:0.5.7-141.module+el8.6.0+16311+3e5e17e9"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:6450.json"}},{"package":{"name":"rubygem-irb","ecosystem":"Red Hat:enterprise_linux:8::appstream","purl":"pkg:rpm/redhat/rubygem-irb"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:1.3.5-141.module+el8.6.0+16311+3e5e17e9"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:6450.json"}},{"package":{"name":"rubygem-json","ecosystem":"Red Hat:enterprise_linux:8::appstream","purl":"pkg:rpm/redhat/rubygem-json"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.5.1-141.module+el8.6.0+16311+3e5e17e9"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:6450.json"}},{"package":{"name":"rubygem-json-debuginfo","ecosystem":"Red Hat:enterprise_linux:8::appstream","purl":"pkg:rpm/redhat/rubygem-json-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.5.1-141.module+el8.6.0+16311+3e5e17e9"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:6450.json"}},{"package":{"name":"rubygem-minitest","ecosystem":"Red Hat:enterprise_linux:8::appstream","purl":"pkg:rpm/redhat/rubygem-minitest"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.2-141.module+el8.6.0+16311+3e5e17e9"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:6450.json"}},{"package":{"name":"rubygem-mysql2","ecosystem":"Red Hat:enterprise_linux:8::appstream","purl":"pkg:rpm/redhat/rubygem-mysql2"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:0.5.3-1.module+el8.5.0+11580+845038eb"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:6450.json"}},{"package":{"name":"rubygem-mysql2-debuginfo","ecosystem":"Red Hat:enterprise_linux:8::appstream","purl":"pkg:rpm/redhat/rubygem-mysql2-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:0.5.3-1.module+el8.5.0+11580+845038eb"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:6450.json"}},{"package":{"name":"rubygem-mysql2-debugsource","ecosystem":"Red Hat:enterprise_linux:8::appstream","purl":"pkg:rpm/redhat/rubygem-mysql2-debugsource"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:0.5.3-1.module+el8.5.0+11580+845038eb"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:6450.json"}},{"package":{"name":"rubygem-mysql2-doc","ecosystem":"Red Hat:enterprise_linux:8::appstream","purl":"pkg:rpm/redhat/rubygem-mysql2-doc"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:0.5.3-1.module+el8.5.0+11580+845038eb"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:6450.json"}},{"package":{"name":"rubygem-pg","ecosystem":"Red Hat:enterprise_linux:8::appstream","purl":"pkg:rpm/redhat/rubygem-pg"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:1.2.3-1.module+el8.5.0+11580+845038eb"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:6450.json"}},{"package":{"name":"rubygem-pg-debuginfo","ecosystem":"Red Hat:enterprise_linux:8::appstream","purl":"pkg:rpm/redhat/rubygem-pg-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:1.2.3-1.module+el8.5.0+11580+845038eb"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:6450.json"}},{"package":{"name":"rubygem-pg-debugsource","ecosystem":"Red Hat:enterprise_linux:8::appstream","purl":"pkg:rpm/redhat/rubygem-pg-debugsource"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:1.2.3-1.module+el8.5.0+11580+845038eb"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:6450.json"}},{"package":{"name":"rubygem-pg-doc","ecosystem":"Red Hat:enterprise_linux:8::appstream","purl":"pkg:rpm/redhat/rubygem-pg-doc"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:1.2.3-1.module+el8.5.0+11580+845038eb"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:6450.json"}},{"package":{"name":"rubygem-power_assert","ecosystem":"Red Hat:enterprise_linux:8::appstream","purl":"pkg:rpm/redhat/rubygem-power_assert"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:1.2.0-141.module+el8.6.0+16311+3e5e17e9"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:6450.json"}},{"package":{"name":"rubygem-psych","ecosystem":"Red Hat:enterprise_linux:8::appstream","purl":"pkg:rpm/redhat/rubygem-psych"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:3.3.2-141.module+el8.6.0+16311+3e5e17e9"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:6450.json"}},{"package":{"name":"rubygem-psych-debuginfo","ecosystem":"Red Hat:enterprise_linux:8::appstream","purl":"pkg:rpm/redhat/rubygem-psych-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:3.3.2-141.module+el8.6.0+16311+3e5e17e9"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:6450.json"}},{"package":{"name":"rubygem-rake","ecosystem":"Red Hat:enterprise_linux:8::appstream","purl":"pkg:rpm/redhat/rubygem-rake"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:13.0.3-141.module+el8.6.0+16311+3e5e17e9"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:6450.json"}},{"package":{"name":"rubygem-rbs","ecosystem":"Red Hat:enterprise_linux:8::appstream","purl":"pkg:rpm/redhat/rubygem-rbs"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:1.4.0-141.module+el8.6.0+16311+3e5e17e9"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:6450.json"}},{"package":{"name":"rubygem-rdoc","ecosystem":"Red Hat:enterprise_linux:8::appstream","purl":"pkg:rpm/redhat/rubygem-rdoc"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:6.3.3-141.module+el8.6.0+16311+3e5e17e9"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:6450.json"}},{"package":{"name":"rubygem-rexml","ecosystem":"Red Hat:enterprise_linux:8::appstream","purl":"pkg:rpm/redhat/rubygem-rexml"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:3.2.5-141.module+el8.6.0+16311+3e5e17e9"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:6450.json"}},{"package":{"name":"rubygem-rss","ecosystem":"Red Hat:enterprise_linux:8::appstream","purl":"pkg:rpm/redhat/rubygem-rss"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:0.2.9-141.module+el8.6.0+16311+3e5e17e9"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:6450.json"}},{"package":{"name":"rubygem-test-unit","ecosystem":"Red Hat:enterprise_linux:8::appstream","purl":"pkg:rpm/redhat/rubygem-test-unit"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:3.3.7-141.module+el8.6.0+16311+3e5e17e9"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:6450.json"}},{"package":{"name":"rubygem-typeprof","ecosystem":"Red Hat:enterprise_linux:8::appstream","purl":"pkg:rpm/redhat/rubygem-typeprof"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:0.15.2-141.module+el8.6.0+16311+3e5e17e9"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:6450.json"}},{"package":{"name":"rubygems","ecosystem":"Red Hat:enterprise_linux:8::appstream","purl":"pkg:rpm/redhat/rubygems"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:3.2.33-141.module+el8.6.0+16311+3e5e17e9"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:6450.json"}},{"package":{"name":"rubygems-devel","ecosystem":"Red Hat:enterprise_linux:8::appstream","purl":"pkg:rpm/redhat/rubygems-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:3.2.33-141.module+el8.6.0+16311+3e5e17e9"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:6450.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N"}]}