Debian Ruby2.7 vulnerabilities

33 known vulnerabilities affecting debian/ruby2.7.

Total CVEs
33
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
CRITICAL2HIGH11MEDIUM14LOW6

Vulnerabilities

Page 1 of 2
CVE-2025-0306HIGHCVSS 7.42025
CVE-2025-0306 [HIGH] CVE-2025-0306: ruby2.7 - A vulnerability was found in Ruby. The Ruby interpreter is vulnerable to the Mar... A vulnerability was found in Ruby. The Ruby interpreter is vulnerable to the Marvin Attack. This attack allows the attacker to decrypt previously encrypted messages or forge signatures by exchanging a large number of messages with the vulnerable service. Scope: local bullseye: open
debian
CVE-2025-24294HIGHCVSS 7.52025
CVE-2025-24294 [HIGH] CVE-2025-24294: ruby2.7 - The attack vector is a potential Denial of Service (DoS). The vulnerability is c... The attack vector is a potential Denial of Service (DoS). The vulnerability is caused by an insufficient check on the length of a decompressed domain name within a DNS packet. An attacker can craft a malicious DNS packet containing a highly compressed domain name. When the resolv library parses such a packet, the name decompression process consumes a large amount of
debian
CVE-2025-27219MEDIUMCVSS 5.8fixed in ruby2.7 2.7.4-1+deb11u5 (bullseye)2025
CVE-2025-27219 [MEDIUM] CVE-2025-27219: ruby2.7 - In the CGI gem before 0.4.2 for Ruby, the CGI::Cookie.parse method in the CGI li... In the CGI gem before 0.4.2 for Ruby, the CGI::Cookie.parse method in the CGI library contains a potential Denial of Service (DoS) vulnerability. The method does not impose any limit on the length of the raw cookie value it processes. This oversight can lead to excessive resource consumption when parsing extremely large cookies. Scope: local bullseye: resolved (fi
debian
CVE-2025-27220MEDIUMCVSS 4.0fixed in ruby2.7 2.7.4-1+deb11u5 (bullseye)2025
CVE-2025-27220 [MEDIUM] CVE-2025-27220: ruby2.7 - In the CGI gem before 0.4.2 for Ruby, a Regular Expression Denial of Service (Re... In the CGI gem before 0.4.2 for Ruby, a Regular Expression Denial of Service (ReDoS) vulnerability exists in the Util#escapeElement method. Scope: local bullseye: resolved (fixed in 2.7.4-1+deb11u5)
debian
CVE-2025-27221LOWCVSS 3.2fixed in ruby2.7 2.7.4-1+deb11u5 (bullseye)2025
CVE-2025-27221 [LOW] CVE-2025-27221: ruby2.7 - In the URI gem before 1.0.3 for Ruby, the URI handling methods (URI.join, URI#me... In the URI gem before 1.0.3 for Ruby, the URI handling methods (URI.join, URI#merge, URI#+) have an inadvertent leakage of authentication credentials because userinfo is retained even after changing the host. Scope: local bullseye: resolved (fixed in 2.7.4-1+deb11u5)
debian
CVE-2025-58767LOWCVSS 1.22025
CVE-2025-58767 [LOW] CVE-2025-58767: ruby2.7 - REXML is an XML toolkit for Ruby. The REXML gems from 3.3.3 to 3.4.1 has a DoS v... REXML is an XML toolkit for Ruby. The REXML gems from 3.3.3 to 3.4.1 has a DoS vulnerability when parsing XML containing multiple XML declarations. If you need to parse untrusted XMLs, you may be impacted to these vulnerabilities. The REXML gem 3.4.2 or later include the patches to fix these vulnerabilities. Scope: local bullseye: open
debian
CVE-2025-61594LOWCVSS 3.22025
CVE-2025-61594 [LOW] CVE-2025-61594: ruby2.7 - URI is a module providing classes to handle Uniform Resource Identifiers. In ver... URI is a module providing classes to handle Uniform Resource Identifiers. In versions prior to 0.12.5, 0.13.3, and 1.0.4, a bypass exists for the fix to CVE-2025-27221 that can expose user credentials. When using the `+` operator to combine URIs, sensitive information like passwords from the original URI can be leaked, violating RFC3986 and making applications vulner
debian
CVE-2024-27280CRITICALCVSS 9.8fixed in ruby2.7 2.7.4-1+deb11u2 (bullseye)2024
CVE-2024-27280 [CRITICAL] CVE-2024-27280: ruby2.7 - A buffer-overread issue was discovered in StringIO 3.0.1, as distributed in Ruby... A buffer-overread issue was discovered in StringIO 3.0.1, as distributed in Ruby 3.0.x through 3.0.6 and 3.1.x through 3.1.4. The ungetbyte and ungetc methods on a StringIO can read past the end of a string, and a subsequent call to StringIO.gets may return the memory value. 3.0.3 is the main fixed version; however, for Ruby 3.0 users, a fixed version is stringi
debian
CVE-2024-35176MEDIUMCVSS 5.3fixed in ruby2.7 2.7.4-1+deb11u3 (bullseye)2024
CVE-2024-35176 [MEDIUM] CVE-2024-35176: ruby2.7 - REXML is an XML toolkit for Ruby. The REXML gem before 3.2.6 has a denial of ser... REXML is an XML toolkit for Ruby. The REXML gem before 3.2.6 has a denial of service vulnerability when it parses an XML that has many `<`s in an attribute value. Those who need to parse untrusted XMLs may be impacted to this vulnerability. The REXML gem 3.2.7 or later include the patch to fix this vulnerability. As a workaround, don't parse untrusted XMLs. Scope:
debian
CVE-2024-27281MEDIUMCVSS 4.5fixed in ruby2.7 2.7.4-1+deb11u2 (bullseye)2024
CVE-2024-27281 [MEDIUM] CVE-2024-27281: ruby2.7 - An issue was discovered in RDoc 6.3.3 through 6.6.2, as distributed in Ruby 3.x ... An issue was discovered in RDoc 6.3.3 through 6.6.2, as distributed in Ruby 3.x through 3.3.0. When parsing .rdoc_options (used for configuration in RDoc) as a YAML file, object injection and resultant remote code execution are possible because there are no restrictions on the classes that can be restored. (When loading the documentation cache, object injection an
debian
CVE-2024-39908MEDIUMCVSS 4.3fixed in ruby2.7 2.7.4-1+deb11u3 (bullseye)2024
CVE-2024-39908 [MEDIUM] CVE-2024-39908: ruby2.7 - REXML is an XML toolkit for Ruby. The REXML gem before 3.3.1 has some DoS vulner... REXML is an XML toolkit for Ruby. The REXML gem before 3.3.1 has some DoS vulnerabilities when it parses an XML that has many specific characters such as ``. If you need to parse untrusted XMLs, you many be impacted to these vulnerabilities. The REXML gem 3.3.2 or later include the patches to fix these vulnerabilities. Users are advised to upgrade. Users unable to
debian
CVE-2024-41946MEDIUMCVSS 5.3fixed in ruby2.7 2.7.4-1+deb11u3 (bullseye)2024
CVE-2024-41946 [MEDIUM] CVE-2024-41946: ruby2.7 - REXML is an XML toolkit for Ruby. The REXML gem 3.3.2 has a DoS vulnerability wh... REXML is an XML toolkit for Ruby. The REXML gem 3.3.2 has a DoS vulnerability when it parses an XML that has many entity expansions with SAX2 or pull parser API. The REXML gem 3.3.3 or later include the patch to fix the vulnerability. Scope: local bullseye: resolved (fixed in 2.7.4-1+deb11u3)
debian
CVE-2024-27282MEDIUMCVSS 6.6fixed in ruby2.7 2.7.4-1+deb11u2 (bullseye)2024
CVE-2024-27282 [MEDIUM] CVE-2024-27282: ruby2.7 - An issue was discovered in Ruby 3.x through 3.3.0. If attacker-supplied data is ... An issue was discovered in Ruby 3.x through 3.3.0. If attacker-supplied data is provided to the Ruby regex compiler, it is possible to extract arbitrary heap data relative to the start of the text, including pointers and sensitive strings. The fixed versions are 3.0.7, 3.1.5, 3.2.4, and 3.3.1. Scope: local bullseye: resolved (fixed in 2.7.4-1+deb11u2)
debian
CVE-2024-41123MEDIUMCVSS 5.3fixed in ruby2.7 2.7.4-1+deb11u3 (bullseye)2024
CVE-2024-41123 [MEDIUM] CVE-2024-41123: ruby2.7 - REXML is an XML toolkit for Ruby. The REXML gem before 3.3.2 has some DoS vulner... REXML is an XML toolkit for Ruby. The REXML gem before 3.3.2 has some DoS vulnerabilities when it parses an XML that has many specific characters such as whitespace character, `>]` and `]>`. The REXML gem 3.3.3 or later include the patches to fix these vulnerabilities. Scope: local bullseye: resolved (fixed in 2.7.4-1+deb11u3)
debian
CVE-2024-49761MEDIUMCVSS 6.6fixed in ruby2.7 2.7.4-1+deb11u3 (bullseye)2024
CVE-2024-49761 [MEDIUM] CVE-2024-49761: ruby2.7 - REXML is an XML toolkit for Ruby. The REXML gem before 3.3.9 has a ReDoS vulnera... REXML is an XML toolkit for Ruby. The REXML gem before 3.3.9 has a ReDoS vulnerability when it parses an XML that has many digits between &# and x...; in a hex numeric character reference (&#x...;). This does not happen with Ruby 3.2 or later. Ruby 3.1 is the only affected maintained Ruby. The REXML gem 3.3.9 or later include the patch to fix the vulnerability. Sc
debian
CVE-2024-43398MEDIUMCVSS 5.9fixed in ruby2.7 2.7.4-1+deb11u3 (bullseye)2024
CVE-2024-43398 [MEDIUM] CVE-2024-43398: ruby2.7 - REXML is an XML toolkit for Ruby. The REXML gem before 3.3.6 has a DoS vulnerabi... REXML is an XML toolkit for Ruby. The REXML gem before 3.3.6 has a DoS vulnerability when it parses an XML that has many deep elements that have same local name attributes. If you need to parse untrusted XMLs with tree parser API like REXML::Document.new, you may be impacted to this vulnerability. If you use other parser APIs such as stream parser API and SAX2 par
debian
CVE-2023-28755MEDIUMCVSS 5.3fixed in jruby 9.4.5.0+ds-1 (forky)2023
CVE-2023-28755 [MEDIUM] CVE-2023-28755: jruby - A ReDoS issue was discovered in the URI component through 0.12.0 in Ruby through... A ReDoS issue was discovered in the URI component through 0.12.0 in Ruby through 3.2.1. The URI parser mishandles invalid URLs that have specific characters. It causes an increase in execution time for parsing strings to URI objects. The fixed versions are 0.12.1, 0.11.1, 0.10.2 and 0.10.0.1. Scope: local bookworm: open forky: resolved (fixed in 9.4.5.0+ds-1) sid: r
debian
CVE-2023-28756MEDIUMCVSS 5.3fixed in jruby 9.4.5.0+ds-1 (forky)2023
CVE-2023-28756 [MEDIUM] CVE-2023-28756: jruby - A ReDoS issue was discovered in the Time component through 0.2.1 in Ruby through... A ReDoS issue was discovered in the Time component through 0.2.1 in Ruby through 3.2.1. The Time parser mishandles invalid URLs that have specific characters. It causes an increase in execution time for parsing strings to Time objects. The fixed versions are 0.1.1 and 0.2.2. Scope: local bookworm: open forky: resolved (fixed in 9.4.5.0+ds-1) sid: resolved (fixed in
debian
CVE-2023-36617LOWCVSS 5.3fixed in ruby2.7 2.7.4-1+deb11u2 (bullseye)2023
CVE-2023-36617 [MEDIUM] CVE-2023-36617: jruby - A ReDoS issue was discovered in the URI component before 0.12.2 for Ruby. The UR... A ReDoS issue was discovered in the URI component before 0.12.2 for Ruby. The URI parser mishandles invalid URLs that have specific characters. There is an increase in execution time for parsing strings to URI objects with rfc2396_parser.rb and rfc3986_parser.rb. NOTE: this issue exists becuse of an incomplete fix for CVE-2023-28755. Version 0.10.3 is also a fixed v
debian
CVE-2022-28739HIGHCVSS 7.5fixed in ruby2.7 2.7.4-1+deb11u2 (bullseye)2022
CVE-2022-28739 [HIGH] CVE-2022-28739: ruby2.7 - There is a buffer over-read in Ruby before 2.6.10, 2.7.x before 2.7.6, 3.x befor... There is a buffer over-read in Ruby before 2.6.10, 2.7.x before 2.7.6, 3.x before 3.0.4, and 3.1.x before 3.1.2. It occurs in String-to-Float conversion, including Kernel#Float and String#to_f. Scope: local bullseye: resolved (fixed in 2.7.4-1+deb11u2)
debian