Debian Ruby3.1 vulnerabilities
22 known vulnerabilities affecting debian/ruby3.1.
Total CVEs
22
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
CRITICAL1HIGH3MEDIUM14LOW4
Vulnerabilities
Page 1 of 2
CVE-2025-0306HIGHCVSS 7.42025
CVE-2025-0306 [HIGH] CVE-2025-0306: ruby2.7 - A vulnerability was found in Ruby. The Ruby interpreter is vulnerable to the Mar...
A vulnerability was found in Ruby. The Ruby interpreter is vulnerable to the Marvin Attack. This attack allows the attacker to decrypt previously encrypted messages or forge signatures by exchanging a large number of messages with the vulnerable service.
Scope: local
bullseye: open
debian
CVE-2025-24294HIGHCVSS 7.52025
CVE-2025-24294 [HIGH] CVE-2025-24294: ruby2.7 - The attack vector is a potential Denial of Service (DoS). The vulnerability is c...
The attack vector is a potential Denial of Service (DoS). The vulnerability is caused by an insufficient check on the length of a decompressed domain name within a DNS packet. An attacker can craft a malicious DNS packet containing a highly compressed domain name. When the resolv library parses such a packet, the name decompression process consumes a large amount of
debian
CVE-2025-43857MEDIUMCVSS 6.02025
CVE-2025-43857 [MEDIUM] CVE-2025-43857: ruby3.1 - Net::IMAP implements Internet Message Access Protocol (IMAP) client functionalit...
Net::IMAP implements Internet Message Access Protocol (IMAP) client functionality in Ruby. Prior to versions 0.5.7, 0.4.20, 0.3.9, and 0.2.5, there is a possibility for denial of service by memory exhaustion when net-imap reads server responses. At any time while the client is connected, a malicious server can send can send a "literal" byte count, which is automat
debian
CVE-2025-27219MEDIUMCVSS 5.8fixed in ruby2.7 2.7.4-1+deb11u5 (bullseye)2025
CVE-2025-27219 [MEDIUM] CVE-2025-27219: ruby2.7 - In the CGI gem before 0.4.2 for Ruby, the CGI::Cookie.parse method in the CGI li...
In the CGI gem before 0.4.2 for Ruby, the CGI::Cookie.parse method in the CGI library contains a potential Denial of Service (DoS) vulnerability. The method does not impose any limit on the length of the raw cookie value it processes. This oversight can lead to excessive resource consumption when parsing extremely large cookies.
Scope: local
bullseye: resolved (fi
debian
CVE-2025-27220MEDIUMCVSS 4.0fixed in ruby2.7 2.7.4-1+deb11u5 (bullseye)2025
CVE-2025-27220 [MEDIUM] CVE-2025-27220: ruby2.7 - In the CGI gem before 0.4.2 for Ruby, a Regular Expression Denial of Service (Re...
In the CGI gem before 0.4.2 for Ruby, a Regular Expression Denial of Service (ReDoS) vulnerability exists in the Util#escapeElement method.
Scope: local
bullseye: resolved (fixed in 2.7.4-1+deb11u5)
debian
CVE-2025-25186MEDIUMCVSS 6.5fixed in ruby3.3 3.3.8-1 (forky)2025
CVE-2025-25186 [MEDIUM] CVE-2025-25186: ruby3.1 - Net::IMAP implements Internet Message Access Protocol (IMAP) client functionalit...
Net::IMAP implements Internet Message Access Protocol (IMAP) client functionality in Ruby. Starting in version 0.3.2 and prior to versions 0.3.8, 0.4.19, and 0.5.6, there is a possibility for denial of service by memory exhaustion in `net-imap`'s response parser. At any time while the client is connected, a malicious server can send can send highly compressed `uid
debian
CVE-2025-27221LOWCVSS 3.2fixed in ruby2.7 2.7.4-1+deb11u5 (bullseye)2025
CVE-2025-27221 [LOW] CVE-2025-27221: ruby2.7 - In the URI gem before 1.0.3 for Ruby, the URI handling methods (URI.join, URI#me...
In the URI gem before 1.0.3 for Ruby, the URI handling methods (URI.join, URI#merge, URI#+) have an inadvertent leakage of authentication credentials because userinfo is retained even after changing the host.
Scope: local
bullseye: resolved (fixed in 2.7.4-1+deb11u5)
debian
CVE-2025-58767LOWCVSS 1.22025
CVE-2025-58767 [LOW] CVE-2025-58767: ruby2.7 - REXML is an XML toolkit for Ruby. The REXML gems from 3.3.3 to 3.4.1 has a DoS v...
REXML is an XML toolkit for Ruby. The REXML gems from 3.3.3 to 3.4.1 has a DoS vulnerability when parsing XML containing multiple XML declarations. If you need to parse untrusted XMLs, you may be impacted to these vulnerabilities. The REXML gem 3.4.2 or later include the patches to fix these vulnerabilities.
Scope: local
bullseye: open
debian
CVE-2025-61594LOWCVSS 3.22025
CVE-2025-61594 [LOW] CVE-2025-61594: ruby2.7 - URI is a module providing classes to handle Uniform Resource Identifiers. In ver...
URI is a module providing classes to handle Uniform Resource Identifiers. In versions prior to 0.12.5, 0.13.3, and 1.0.4, a bypass exists for the fix to CVE-2025-27221 that can expose user credentials. When using the `+` operator to combine URIs, sensitive information like passwords from the original URI can be leaked, violating RFC3986 and making applications vulner
debian
CVE-2024-27280CRITICALCVSS 9.8fixed in ruby2.7 2.7.4-1+deb11u2 (bullseye)2024
CVE-2024-27280 [CRITICAL] CVE-2024-27280: ruby2.7 - A buffer-overread issue was discovered in StringIO 3.0.1, as distributed in Ruby...
A buffer-overread issue was discovered in StringIO 3.0.1, as distributed in Ruby 3.0.x through 3.0.6 and 3.1.x through 3.1.4. The ungetbyte and ungetc methods on a StringIO can read past the end of a string, and a subsequent call to StringIO.gets may return the memory value. 3.0.3 is the main fixed version; however, for Ruby 3.0 users, a fixed version is stringi
debian
CVE-2024-35176MEDIUMCVSS 5.3fixed in ruby2.7 2.7.4-1+deb11u3 (bullseye)2024
CVE-2024-35176 [MEDIUM] CVE-2024-35176: ruby2.7 - REXML is an XML toolkit for Ruby. The REXML gem before 3.2.6 has a denial of ser...
REXML is an XML toolkit for Ruby. The REXML gem before 3.2.6 has a denial of service vulnerability when it parses an XML that has many `<`s in an attribute value. Those who need to parse untrusted XMLs may be impacted to this vulnerability. The REXML gem 3.2.7 or later include the patch to fix this vulnerability. As a workaround, don't parse untrusted XMLs.
Scope:
debian
CVE-2024-27281MEDIUMCVSS 4.5fixed in ruby2.7 2.7.4-1+deb11u2 (bullseye)2024
CVE-2024-27281 [MEDIUM] CVE-2024-27281: ruby2.7 - An issue was discovered in RDoc 6.3.3 through 6.6.2, as distributed in Ruby 3.x ...
An issue was discovered in RDoc 6.3.3 through 6.6.2, as distributed in Ruby 3.x through 3.3.0. When parsing .rdoc_options (used for configuration in RDoc) as a YAML file, object injection and resultant remote code execution are possible because there are no restrictions on the classes that can be restored. (When loading the documentation cache, object injection an
debian
CVE-2024-39908MEDIUMCVSS 4.3fixed in ruby2.7 2.7.4-1+deb11u3 (bullseye)2024
CVE-2024-39908 [MEDIUM] CVE-2024-39908: ruby2.7 - REXML is an XML toolkit for Ruby. The REXML gem before 3.3.1 has some DoS vulner...
REXML is an XML toolkit for Ruby. The REXML gem before 3.3.1 has some DoS vulnerabilities when it parses an XML that has many specific characters such as ``. If you need to parse untrusted XMLs, you many be impacted to these vulnerabilities. The REXML gem 3.3.2 or later include the patches to fix these vulnerabilities. Users are advised to upgrade. Users unable to
debian
CVE-2024-41946MEDIUMCVSS 5.3fixed in ruby2.7 2.7.4-1+deb11u3 (bullseye)2024
CVE-2024-41946 [MEDIUM] CVE-2024-41946: ruby2.7 - REXML is an XML toolkit for Ruby. The REXML gem 3.3.2 has a DoS vulnerability wh...
REXML is an XML toolkit for Ruby. The REXML gem 3.3.2 has a DoS vulnerability when it parses an XML that has many entity expansions with SAX2 or pull parser API. The REXML gem 3.3.3 or later include the patch to fix the vulnerability.
Scope: local
bullseye: resolved (fixed in 2.7.4-1+deb11u3)
debian
CVE-2024-27282MEDIUMCVSS 6.6fixed in ruby2.7 2.7.4-1+deb11u2 (bullseye)2024
CVE-2024-27282 [MEDIUM] CVE-2024-27282: ruby2.7 - An issue was discovered in Ruby 3.x through 3.3.0. If attacker-supplied data is ...
An issue was discovered in Ruby 3.x through 3.3.0. If attacker-supplied data is provided to the Ruby regex compiler, it is possible to extract arbitrary heap data relative to the start of the text, including pointers and sensitive strings. The fixed versions are 3.0.7, 3.1.5, 3.2.4, and 3.3.1.
Scope: local
bullseye: resolved (fixed in 2.7.4-1+deb11u2)
debian
CVE-2024-41123MEDIUMCVSS 5.3fixed in ruby2.7 2.7.4-1+deb11u3 (bullseye)2024
CVE-2024-41123 [MEDIUM] CVE-2024-41123: ruby2.7 - REXML is an XML toolkit for Ruby. The REXML gem before 3.3.2 has some DoS vulner...
REXML is an XML toolkit for Ruby. The REXML gem before 3.3.2 has some DoS vulnerabilities when it parses an XML that has many specific characters such as whitespace character, `>]` and `]>`. The REXML gem 3.3.3 or later include the patches to fix these vulnerabilities.
Scope: local
bullseye: resolved (fixed in 2.7.4-1+deb11u3)
debian
CVE-2024-49761MEDIUMCVSS 6.6fixed in ruby2.7 2.7.4-1+deb11u3 (bullseye)2024
CVE-2024-49761 [MEDIUM] CVE-2024-49761: ruby2.7 - REXML is an XML toolkit for Ruby. The REXML gem before 3.3.9 has a ReDoS vulnera...
REXML is an XML toolkit for Ruby. The REXML gem before 3.3.9 has a ReDoS vulnerability when it parses an XML that has many digits between &# and x...; in a hex numeric character reference (&#x...;). This does not happen with Ruby 3.2 or later. Ruby 3.1 is the only affected maintained Ruby. The REXML gem 3.3.9 or later include the patch to fix the vulnerability.
Sc
debian
CVE-2024-43398MEDIUMCVSS 5.9fixed in ruby2.7 2.7.4-1+deb11u3 (bullseye)2024
CVE-2024-43398 [MEDIUM] CVE-2024-43398: ruby2.7 - REXML is an XML toolkit for Ruby. The REXML gem before 3.3.6 has a DoS vulnerabi...
REXML is an XML toolkit for Ruby. The REXML gem before 3.3.6 has a DoS vulnerability when it parses an XML that has many deep elements that have same local name attributes. If you need to parse untrusted XMLs with tree parser API like REXML::Document.new, you may be impacted to this vulnerability. If you use other parser APIs such as stream parser API and SAX2 par
debian
CVE-2023-28755MEDIUMCVSS 5.3fixed in jruby 9.4.5.0+ds-1 (forky)2023
CVE-2023-28755 [MEDIUM] CVE-2023-28755: jruby - A ReDoS issue was discovered in the URI component through 0.12.0 in Ruby through...
A ReDoS issue was discovered in the URI component through 0.12.0 in Ruby through 3.2.1. The URI parser mishandles invalid URLs that have specific characters. It causes an increase in execution time for parsing strings to URI objects. The fixed versions are 0.12.1, 0.11.1, 0.10.2 and 0.10.0.1.
Scope: local
bookworm: open
forky: resolved (fixed in 9.4.5.0+ds-1)
sid: r
debian
CVE-2023-28756MEDIUMCVSS 5.3fixed in jruby 9.4.5.0+ds-1 (forky)2023
CVE-2023-28756 [MEDIUM] CVE-2023-28756: jruby - A ReDoS issue was discovered in the Time component through 0.2.1 in Ruby through...
A ReDoS issue was discovered in the Time component through 0.2.1 in Ruby through 3.2.1. The Time parser mishandles invalid URLs that have specific characters. It causes an increase in execution time for parsing strings to Time objects. The fixed versions are 0.1.1 and 0.2.2.
Scope: local
bookworm: open
forky: resolved (fixed in 9.4.5.0+ds-1)
sid: resolved (fixed in
debian
1 / 2Next →