Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:deb/debian/ruby2.7@2.7.4-1%2Bdeb11u5?distro=bullseye
purl pkg:deb/debian/ruby2.7@2.7.4-1%2Bdeb11u5?distro=bullseye
Vulnerabilities affecting this package (0)
Vulnerability Summary Fixed by
This package is not known to be affected by vulnerabilities.
Vulnerabilities fixed by this package (3)
Vulnerability Summary Aliases
VCID-exq5-cnrm-3uhd CGI has Denial of Service (DoS) potential in Cookie.parse There is a possibility for DoS by in the cgi gem. This vulnerability has been assigned the CVE identifier CVE-2025-27219. We recommend upgrading the cgi gem. ## Details CGI::Cookie.parse took super-linear time to parse a cookie string in some cases. Feeding a maliciously crafted cookie string into the method could lead to a Denial of Service. Please update CGI gem to version 0.3.5.1, 0.3.7, 0.4.2 or later. ## Affected versions cgi gem versions <= 0.3.5, 0.3.6, 0.4.0 and 0.4.1. ## Credits Thanks to lio346 for discovering this issue. Also thanks to mame for fixing this vulnerability. CVE-2025-27219
GHSA-gh9q-2xrm-x6qv
VCID-h4mf-99f4-9bdw CGI has Regular Expression Denial of Service (ReDoS) potential in Util#escapeElement There is a possibility for Regular expression Denial of Service (ReDoS) by in the cgi gem. This vulnerability has been assigned the CVE identifier CVE-2025-27220. We recommend upgrading the cgi gem. ## Details The regular expression used in `CGI::Util#escapeElement` is vulnerable to ReDoS. The crafted input could lead to a high CPU consumption. This vulnerability only affects Ruby 3.1 and 3.2. If you are using these versions, please update CGI gem to version 0.3.5.1, 0.3.7, 0.4.2 or later. ## Affected versions cgi gem versions <= 0.3.5, 0.3.6, 0.4.0 and 0.4.1. ## Credits Thanks to svalkanov for discovering this issue. Also thanks to nobu for fixing this vulnerability. CVE-2025-27220
GHSA-mhwm-jh88-3gjf
VCID-n1ja-n53g-fycm URI allows for userinfo Leakage in URI#join, URI#merge, and URI#+ There is a possibility for userinfo leakage by in the uri gem. This vulnerability has been assigned the CVE identifier CVE-2025-27221. We recommend upgrading the uri gem. ## Details The methods `URI#join`, `URI#merge`, and `URI#+` retained userinfo, such as `user:password`, even after the host is replaced. When generating a URL to a malicious host from a URL containing secret userinfo using these methods, and having someone access that URL, an unintended userinfo leak could occur. Please update URI gem to version 0.11.3, 0.12.4, 0.13.2, 1.0.3 or later. ## Affected versions uri gem versions < 0.11.3, 0.12.0 to 0.12.3, 0.13.0, 0.13.1 and 1.0.0 to 1.0.2. ## Credits Thanks to Tsubasa Irisawa (lambdasawa) for discovering this issue. Also thanks to nobu for additional fixes of this vulnerability. CVE-2025-27221
GHSA-22h5-pq3x-2gf2

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-16T13:09:02.693970+00:00 Debian Importer Fixing VCID-exq5-cnrm-3uhd https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T13:04:20.737833+00:00 Debian Importer Fixing VCID-h4mf-99f4-9bdw https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:30:00.950659+00:00 Debian Importer Fixing VCID-n1ja-n53g-fycm https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-13T09:02:46.726357+00:00 Debian Importer Fixing VCID-exq5-cnrm-3uhd https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:59:16.183320+00:00 Debian Importer Fixing VCID-h4mf-99f4-9bdw https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:33:29.468514+00:00 Debian Importer Fixing VCID-n1ja-n53g-fycm https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-03T07:52:25.026889+00:00 Debian Importer Fixing VCID-n1ja-n53g-fycm https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:52:25.006892+00:00 Debian Importer Fixing VCID-h4mf-99f4-9bdw https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:52:24.986649+00:00 Debian Importer Fixing VCID-exq5-cnrm-3uhd https://security-tracker.debian.org/tracker/data/json 38.1.0