Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:deb/debian/ruby-json@2.3.0%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/ruby-json@2.3.0%2Bdfsg-1?distro=trixie
Vulnerabilities affecting this package (0)
Vulnerability Summary Fixed by
This package is not known to be affected by vulnerabilities.
Vulnerabilities fixed by this package (4)
Vulnerability Summary Aliases
VCID-8qd2-k69j-nfhf Out-of-bounds Read in Ruby JSON Parser ### Impact A specially crafted document could cause an out of bound read, most likely resulting in a crash. Versions 2.10.0 and 2.10.1 are impacted. Older versions are not. ### Patches Version 2.10.2 fixes the problem. ### Workarounds None. CVE-2025-27788
GHSA-9m3q-rhmv-5q44
VCID-d6tn-s1q2-a3hc Unsafe object creation in json RubyGem The JSON gem through 2.2.0 for Ruby, as used in Ruby 2.4 through 2.4.9, 2.5 through 2.5.7, and 2.6 through 2.6.5, has an Unsafe Object Creation Vulnerability. This is quite similar to CVE-2013-0269/GHSA-x457-cw4h-hq5f, but does not rely on poor garbage-collection behavior within Ruby. Specifically, use of JSON parsing methods can lead to creation of a malicious object within the interpreter, with adverse effects that are application-dependent. CVE-2020-10663
GHSA-jphg-qwrw-7w9g
VCID-ebq1-gkhe-pua7 Denial of Service and SQL Injection This package allows remote attackers to cause a denial of service (resource consumption) or bypass the mass assignment protection mechanism via a crafted JSON document that triggers the creation of arbitrary Ruby symbols or certain internal objects, as demonstrated by conducting a SQL injection attack against Ruby on Rails, aka. CVE-2013-0269
GHSA-x457-cw4h-hq5f
OSV-101137
VCID-xghz-9k48-bqej Ruby JSON has a format string injection vulnerability ### Impact A format string injection vulnerability than that lead to denial of service attacks or information disclosure, when the `allow_duplicate_key: false` parsing option is used to parse user supplied documents. This option isn't the default, if you didn't opt-in to use it, you are not impacted. ### Patches Patched in `2.19.2`. ### Workarounds The issue can be avoided by not using the `allow_duplicate_key: false` parsing option. CVE-2026-33210
GHSA-3m6g-2423-7cp3

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-16T12:41:44.370214+00:00 Debian Importer Fixing VCID-d6tn-s1q2-a3hc https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:24:13.807789+00:00 Debian Importer Fixing VCID-8qd2-k69j-nfhf https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:35:36.188876+00:00 Debian Importer Fixing VCID-ebq1-gkhe-pua7 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:18:22.330947+00:00 Debian Importer Fixing VCID-xghz-9k48-bqej https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-13T08:42:09.342035+00:00 Debian Importer Fixing VCID-d6tn-s1q2-a3hc https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:29:21.185378+00:00 Debian Importer Fixing VCID-8qd2-k69j-nfhf https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:09:27.700029+00:00 Debian Importer Fixing VCID-ebq1-gkhe-pua7 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:13:06.895177+00:00 Debian Importer Fixing VCID-xghz-9k48-bqej https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-03T07:52:16.641776+00:00 Debian Importer Fixing VCID-xghz-9k48-bqej https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:52:16.595679+00:00 Debian Importer Fixing VCID-8qd2-k69j-nfhf https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:52:16.554821+00:00 Debian Importer Fixing VCID-d6tn-s1q2-a3hc https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:52:16.516331+00:00 Debian Importer Fixing VCID-ebq1-gkhe-pua7 https://security-tracker.debian.org/tracker/data/json 38.1.0