Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:deb/debian/ruby2.7@2.7.4-1%2Bdeb11u1
purl pkg:deb/debian/ruby2.7@2.7.4-1%2Bdeb11u1
Next non-vulnerable version None.
Latest non-vulnerable version None.
Risk 4.5
Vulnerabilities affecting this package (17)
Vulnerability Summary Fixed by
VCID-2sv2-6snv-2bd3
Aliases:
CVE-2022-28739
GHSA-mvgc-rxvg-hqc6
Multiple vulnerabilities have been discovered in Ruby, the worst of which could lead to execution of arbitrary code. There are no reported fixed by versions.
VCID-5mfh-yzfk-cqaa
Aliases:
CVE-2024-27280
GHSA-v5h6-c2hv-hv3r
StringIO buffer overread vulnerability An issue was discovered in StringIO 3.0.1, as distributed in Ruby 3.0.x through 3.0.6 and 3.1.x through 3.1.4. The `ungetbyte` and `ungetc` methods on a StringIO can read past the end of a string, and a subsequent call to `StringIO.gets` may return the memory value. This vulnerability is not affected StringIO 3.0.3 and later, and Ruby 3.2.x and later. We recommend to update the StringIO gem to version 3.0.3 or later. In order to ensure compatibility with bundled version in older Ruby series, you may update as follows instead: * For Ruby 3.0 users: Update to `stringio` 3.0.1.1 * For Ruby 3.1 users: Update to `stringio` 3.1.0.2 You can use `gem update stringio` to update it. If you are using bundler, please add `gem "stringio", ">= 3.0.1.2"` to your `Gemfile`. There are no reported fixed by versions.
VCID-9g2w-sc9w-eyce
Aliases:
CVE-2021-33621
GHSA-vc47-6rqg-c7f5
Multiple vulnerabilities have been discovered in Ruby, the worst of which could lead to execution of arbitrary code. There are no reported fixed by versions.
VCID-9x9w-2k98-wydm
Aliases:
CVE-2023-28756
GHSA-fg7x-g82r-94qc
Ruby Time component ReDoS issue A ReDoS issue was discovered in the Time component through 0.2.1 in Ruby through 3.2.1. The Time parser mishandles invalid URLs that have specific characters. It causes an increase in execution time for parsing strings to Time objects. The fixed versions are 0.1.1 and 0.2.2. There are no reported fixed by versions.
VCID-ajtx-8w3u-rkae
Aliases:
CVE-2023-36617
GHSA-hww2-5g85-429m
URI gem has ReDoS vulnerability A ReDoS issue was discovered in the URI component before 0.12.2 for Ruby. The URI parser mishandles invalid URLs that have specific characters. There is an increase in execution time for parsing strings to URI objects with `rfc2396_parser.rb` and `rfc3986_parser.rb`. NOTE: this issue exists becuse of an incomplete fix for CVE-2023-28755. Version 0.10.3 is also a fixed version. [The Ruby advisory recommends](https://www.ruby-lang.org/en/news/2023/06/29/redos-in-uri-CVE-2023-36617/) updating the uri gem to 0.12.2. In order to ensure compatibility with the bundled version in older Ruby series, you may update as follows instead: - For Ruby 3.0: Update to uri 0.10.3 - For Ruby 3.1 and 3.2: Update to uri 0.12.2. You can use gem update uri to update it. If you are using bundler, please add gem `uri`, `>= 0.12.2` (or other version mentioned above) to your Gemfile. There are no reported fixed by versions.
VCID-c5xq-bv4t-73ff
Aliases:
CVE-2024-35176
GHSA-vg3r-rm7w-2xgh
REXML contains a denial of service vulnerability ### Impact The REXML gem before 3.2.6 has a DoS vulnerability when it parses an XML that has many `>`s in an attribute value. If you need to parse untrusted XMLs, you may be impacted to this vulnerability. ### Patches The REXML gem 3.2.7 or later include the patch to fix this vulnerability. ### Workarounds Don't parse untrusted XMLs. ### References * https://www.ruby-lang.org/en/news/2024/05/16/dos-rexml-cve-2024-35176/ There are no reported fixed by versions.
VCID-exq5-cnrm-3uhd
Aliases:
CVE-2025-27219
GHSA-gh9q-2xrm-x6qv
CGI has Denial of Service (DoS) potential in Cookie.parse There is a possibility for DoS by in the cgi gem. This vulnerability has been assigned the CVE identifier CVE-2025-27219. We recommend upgrading the cgi gem. ## Details CGI::Cookie.parse took super-linear time to parse a cookie string in some cases. Feeding a maliciously crafted cookie string into the method could lead to a Denial of Service. Please update CGI gem to version 0.3.5.1, 0.3.7, 0.4.2 or later. ## Affected versions cgi gem versions <= 0.3.5, 0.3.6, 0.4.0 and 0.4.1. ## Credits Thanks to lio346 for discovering this issue. Also thanks to mame for fixing this vulnerability. There are no reported fixed by versions.
VCID-h4mf-99f4-9bdw
Aliases:
CVE-2025-27220
GHSA-mhwm-jh88-3gjf
CGI has Regular Expression Denial of Service (ReDoS) potential in Util#escapeElement There is a possibility for Regular expression Denial of Service (ReDoS) by in the cgi gem. This vulnerability has been assigned the CVE identifier CVE-2025-27220. We recommend upgrading the cgi gem. ## Details The regular expression used in `CGI::Util#escapeElement` is vulnerable to ReDoS. The crafted input could lead to a high CPU consumption. This vulnerability only affects Ruby 3.1 and 3.2. If you are using these versions, please update CGI gem to version 0.3.5.1, 0.3.7, 0.4.2 or later. ## Affected versions cgi gem versions <= 0.3.5, 0.3.6, 0.4.0 and 0.4.1. ## Credits Thanks to svalkanov for discovering this issue. Also thanks to nobu for fixing this vulnerability. There are no reported fixed by versions.
VCID-jdtw-bn8z-e3b6
Aliases:
CVE-2024-43398
GHSA-vmwr-mc7x-5vc3
REXML denial of service vulnerability ### Impact The REXML gem before 3.3.6 has a DoS vulnerability when it parses an XML that has many deep elements that have same local name attributes. If you need to parse untrusted XMLs with tree parser API like `REXML::Document.new`, you may be impacted to this vulnerability. If you use other parser APIs such as stream parser API and SAX2 parser API, this vulnerability is not affected. ### Patches The REXML gem 3.3.6 or later include the patch to fix the vulnerability. ### Workarounds Don't parse untrusted XMLs with tree parser API. ### References * https://www.ruby-lang.org/en/news/2024/08/22/dos-rexml-cve-2024-43398/ : An announce on www.ruby-lang.org There are no reported fixed by versions.
VCID-m4a8-ya4v-tkgm
Aliases:
CVE-2024-27281
GHSA-592j-995h-p23j
RDoc RCE vulnerability with .rdoc_options An issue was discovered in RDoc 6.3.3 through 6.6.2, as distributed in Ruby 3.x through 3.3.0. When parsing `.rdoc_options` (used for configuration in RDoc) as a YAML file, object injection and resultant remote code execution are possible because there are no restrictions on the classes that can be restored. When loading the documentation cache, object injection and resultant remote code execution are also possible if there were a crafted cache. We recommend to update the RDoc gem to version 6.6.3.1 or later. In order to ensure compatibility with bundled version in older Ruby series, you may update as follows instead: * For Ruby 3.0 users: Update to `rdoc` 6.3.4.1 * For Ruby 3.1 users: Update to `rdoc` 6.4.1.1 * For Ruby 3.2 users: Update to `rdoc` 6.5.1.1 You can use `gem update rdoc` to update it. If you are using bundler, please add `gem "rdoc", ">= 6.6.3.1"` to your `Gemfile`. Note: 6.3.4, 6.4.1, 6.5.1 and 6.6.3 have a incorrect fix. We recommend to upgrade 6.3.4.1, 6.4.1.1, 6.5.1.1 and 6.6.3.1 instead of them. There are no reported fixed by versions.
VCID-m6hy-vnf9-hyfe
Aliases:
CVE-2024-41946
GHSA-5866-49gr-22v4
REXML DoS vulnerability ### Impact The REXML gem before 3.3.2 has a DoS vulnerability when it parses an XML that has many entity expansions with SAX2 or pull parser API. If you need to parse untrusted XMLs with SAX2 or pull parser API, you may be impacted to this vulnerability. ### Patches The REXML gem 3.3.3 or later include the patch to fix the vulnerability. ### Workarounds Don't parse untrusted XMLs with SAX2 or pull parser API. ### References * https://www.ruby-lang.org/en/news/2008/08/23/dos-vulnerability-in-rexml/ : This is a similar vulnerability * https://www.ruby-lang.org/en/news/2024/08/01/dos-rexml-cve-2024-41946/: An announce on www.ruby-lang.org There are no reported fixed by versions.
VCID-msc8-xjz2-2kb4
Aliases:
CVE-2024-49761
GHSA-2rxp-v6pw-ch6m
REXML ReDoS vulnerability ### Impact The REXML gem before 3.3.9 has a ReDoS vulnerability when it parses an XML that has many digits between `&#` and `x...;` in a hex numeric character reference (`&#x...;`). This does not happen with Ruby 3.2 or later. Ruby 3.1 is the only affected maintained Ruby. Note that Ruby 3.1 will reach EOL on 2025-03. ### Patches The REXML gem 3.3.9 or later include the patch to fix the vulnerability. ### Workarounds Use Ruby 3.2 or later instead of Ruby 3.1. ### References * https://www.ruby-lang.org/en/news/2024/10/28/redos-rexml-cve-2024-49761/: An announce on www.ruby-lang.org There are no reported fixed by versions.
VCID-n1ja-n53g-fycm
Aliases:
CVE-2025-27221
GHSA-22h5-pq3x-2gf2
URI allows for userinfo Leakage in URI#join, URI#merge, and URI#+ There is a possibility for userinfo leakage by in the uri gem. This vulnerability has been assigned the CVE identifier CVE-2025-27221. We recommend upgrading the uri gem. ## Details The methods `URI#join`, `URI#merge`, and `URI#+` retained userinfo, such as `user:password`, even after the host is replaced. When generating a URL to a malicious host from a URL containing secret userinfo using these methods, and having someone access that URL, an unintended userinfo leak could occur. Please update URI gem to version 0.11.3, 0.12.4, 0.13.2, 1.0.3 or later. ## Affected versions uri gem versions < 0.11.3, 0.12.0 to 0.12.3, 0.13.0, 0.13.1 and 1.0.0 to 1.0.2. ## Credits Thanks to Tsubasa Irisawa (lambdasawa) for discovering this issue. Also thanks to nobu for additional fixes of this vulnerability. There are no reported fixed by versions.
VCID-qu1w-yd76-t7c1
Aliases:
CVE-2024-39908
GHSA-4xqq-m2hx-25v8
REXML denial of service vulnerability ### Impact The REXML gem before 3.3.1 has some DoS vulnerabilities when it parses an XML that has many specific characters such as `<`, `0` and `%>`. If you need to parse untrusted XMLs, you may be impacted to these vulnerabilities. ### Patches The REXML gem 3.3.2 or later include the patches to fix these vulnerabilities. ### Workarounds Don't parse untrusted XMLs. ### References * https://github.com/ruby/rexml/security/advisories/GHSA-vg3r-rm7w-2xgh : This is a similar vulnerability * https://www.ruby-lang.org/en/news/2024/07/16/dos-rexml-cve-2024-39908/ There are no reported fixed by versions.
VCID-uxdx-abx7-fkdy
Aliases:
CVE-2023-28755
GHSA-hv5j-3h9f-99c2
Ruby URI component ReDoS issue A ReDoS issue was discovered in the URI component through 0.12.0 in Ruby through 3.2.1. The URI parser mishandles invalid URLs that have specific characters. It causes an increase in execution time for parsing strings to URI objects. The fixed versions are 0.12.1, 0.11.1, 0.10.2 and 0.10.0.1. There are no reported fixed by versions.
VCID-x126-x9qm-e7d3
Aliases:
CVE-2024-27282
GHSA-63cq-cj6g-qfr2
ruby: Arbitrary memory address read vulnerability with Regex search There are no reported fixed by versions.
VCID-yj1t-rga1-x3ev
Aliases:
CVE-2024-41123
GHSA-r55c-59qm-vjw6
REXML DoS vulnerability ### Impact The REXML gem before 3.3.2 has some DoS vulnerabilities when it parses an XML that has many specific characters such as whitespace character, `>]` and `]>`. If you need to parse untrusted XMLs, you may be impacted to these vulnerabilities. ### Patches The REXML gem 3.3.3 or later include the patches to fix these vulnerabilities. ### Workarounds Don't parse untrusted XMLs. ### References * https://github.com/ruby/rexml/security/advisories/GHSA-vg3r-rm7w-2xgh : This is a similar vulnerability * https://github.com/ruby/rexml/security/advisories/GHSA-4xqq-m2hx-25v8 : This is a similar vulnerability * https://www.ruby-lang.org/en/news/2024/08/01/dos-rexml-cve-2024-41123/: An announce on www.ruby-lang.org There are no reported fixed by versions.
Vulnerabilities fixed by this package (0)
Vulnerability Summary Aliases
This package is not known to fix vulnerabilities.

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-16T00:47:39.658969+00:00 Debian Oval Importer Affected by VCID-ajtx-8w3u-rkae https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.4.0
2026-04-16T00:44:51.611621+00:00 Debian Oval Importer Affected by VCID-9x9w-2k98-wydm https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.4.0
2026-04-16T00:12:26.388253+00:00 Debian Oval Importer Affected by VCID-yj1t-rga1-x3ev https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.4.0
2026-04-16T00:11:05.396246+00:00 Debian Oval Importer Affected by VCID-qu1w-yd76-t7c1 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.4.0
2026-04-15T23:58:34.099482+00:00 Debian Oval Importer Affected by VCID-x126-x9qm-e7d3 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.4.0
2026-04-15T23:33:43.547221+00:00 Debian Oval Importer Affected by VCID-uxdx-abx7-fkdy https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.4.0
2026-04-15T22:04:10.078023+00:00 Debian Oval Importer Affected by VCID-h4mf-99f4-9bdw https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.4.0
2026-04-15T21:45:42.779251+00:00 Debian Oval Importer Affected by VCID-msc8-xjz2-2kb4 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.4.0
2026-04-15T19:41:31.056421+00:00 Debian Oval Importer Affected by VCID-9g2w-sc9w-eyce https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.4.0
2026-04-15T19:11:25.671565+00:00 Debian Oval Importer Affected by VCID-n1ja-n53g-fycm https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.4.0
2026-04-15T18:02:01.720177+00:00 Debian Oval Importer Affected by VCID-exq5-cnrm-3uhd https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.4.0
2026-04-15T17:36:32.646315+00:00 Debian Oval Importer Affected by VCID-m6hy-vnf9-hyfe https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.4.0
2026-04-15T17:03:04.811201+00:00 Debian Oval Importer Affected by VCID-m4a8-ya4v-tkgm https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.4.0
2026-04-15T16:55:23.379208+00:00 Debian Oval Importer Affected by VCID-5mfh-yzfk-cqaa https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.4.0
2026-04-15T16:33:07.264069+00:00 Debian Oval Importer Affected by VCID-c5xq-bv4t-73ff https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.4.0
2026-04-15T16:29:14.084456+00:00 Debian Oval Importer Affected by VCID-jdtw-bn8z-e3b6 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.4.0
2026-04-15T16:16:39.540820+00:00 Debian Oval Importer Affected by VCID-2sv2-6snv-2bd3 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.4.0
2026-04-12T00:20:10.494343+00:00 Debian Oval Importer Affected by VCID-ajtx-8w3u-rkae https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.3.0
2026-04-12T00:17:32.728536+00:00 Debian Oval Importer Affected by VCID-9x9w-2k98-wydm https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.3.0
2026-04-11T23:46:17.189099+00:00 Debian Oval Importer Affected by VCID-yj1t-rga1-x3ev https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.3.0
2026-04-11T23:44:59.562059+00:00 Debian Oval Importer Affected by VCID-qu1w-yd76-t7c1 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.3.0
2026-04-11T23:32:44.514628+00:00 Debian Oval Importer Affected by VCID-x126-x9qm-e7d3 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.3.0
2026-04-11T23:08:47.739270+00:00 Debian Oval Importer Affected by VCID-uxdx-abx7-fkdy https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.3.0
2026-04-11T21:42:14.334732+00:00 Debian Oval Importer Affected by VCID-h4mf-99f4-9bdw https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.3.0
2026-04-11T21:24:21.488775+00:00 Debian Oval Importer Affected by VCID-msc8-xjz2-2kb4 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.3.0
2026-04-11T19:24:04.367878+00:00 Debian Oval Importer Affected by VCID-9g2w-sc9w-eyce https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.3.0
2026-04-11T18:55:03.107641+00:00 Debian Oval Importer Affected by VCID-n1ja-n53g-fycm https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.3.0
2026-04-11T17:47:48.191041+00:00 Debian Oval Importer Affected by VCID-exq5-cnrm-3uhd https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.3.0
2026-04-11T17:22:47.926350+00:00 Debian Oval Importer Affected by VCID-m6hy-vnf9-hyfe https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.3.0
2026-04-11T16:49:38.135963+00:00 Debian Oval Importer Affected by VCID-m4a8-ya4v-tkgm https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.3.0
2026-04-11T16:42:04.968389+00:00 Debian Oval Importer Affected by VCID-5mfh-yzfk-cqaa https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.3.0
2026-04-11T16:20:10.176561+00:00 Debian Oval Importer Affected by VCID-c5xq-bv4t-73ff https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.3.0
2026-04-11T16:16:22.990197+00:00 Debian Oval Importer Affected by VCID-jdtw-bn8z-e3b6 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.3.0
2026-04-11T16:03:59.775463+00:00 Debian Oval Importer Affected by VCID-2sv2-6snv-2bd3 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.3.0
2026-04-08T23:50:58.122123+00:00 Debian Oval Importer Affected by VCID-ajtx-8w3u-rkae https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.1.0
2026-04-08T23:48:24.525694+00:00 Debian Oval Importer Affected by VCID-9x9w-2k98-wydm https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.1.0
2026-04-08T23:18:32.640916+00:00 Debian Oval Importer Affected by VCID-yj1t-rga1-x3ev https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.1.0
2026-04-08T23:17:18.462418+00:00 Debian Oval Importer Affected by VCID-qu1w-yd76-t7c1 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.1.0
2026-04-08T23:05:31.179280+00:00 Debian Oval Importer Affected by VCID-x126-x9qm-e7d3 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.1.0
2026-04-08T22:42:29.287324+00:00 Debian Oval Importer Affected by VCID-uxdx-abx7-fkdy https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.1.0
2026-04-08T21:20:07.443184+00:00 Debian Oval Importer Affected by VCID-h4mf-99f4-9bdw https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.1.0
2026-04-08T21:02:56.105865+00:00 Debian Oval Importer Affected by VCID-msc8-xjz2-2kb4 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.1.0
2026-04-08T19:07:41.716597+00:00 Debian Oval Importer Affected by VCID-9g2w-sc9w-eyce https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.1.0
2026-04-08T18:39:43.368841+00:00 Debian Oval Importer Affected by VCID-n1ja-n53g-fycm https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.1.0
2026-04-08T17:35:00.460604+00:00 Debian Oval Importer Affected by VCID-exq5-cnrm-3uhd https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.1.0
2026-04-08T17:11:05.722910+00:00 Debian Oval Importer Affected by VCID-m6hy-vnf9-hyfe https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.1.0
2026-04-08T16:39:46.151291+00:00 Debian Oval Importer Affected by VCID-m4a8-ya4v-tkgm https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.1.0
2026-04-08T16:32:34.890993+00:00 Debian Oval Importer Affected by VCID-5mfh-yzfk-cqaa https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.1.0
2026-04-08T16:12:06.331778+00:00 Debian Oval Importer Affected by VCID-c5xq-bv4t-73ff https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.1.0
2026-04-08T16:08:35.357015+00:00 Debian Oval Importer Affected by VCID-jdtw-bn8z-e3b6 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.1.0
2026-04-08T15:56:50.519325+00:00 Debian Oval Importer Affected by VCID-2sv2-6snv-2bd3 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.1.0