Search for packages
Package details: pkg:deb/debian/ruby2.7@2.7.4-1%2Bdeb11u1
purl pkg:deb/debian/ruby2.7@2.7.4-1%2Bdeb11u1
Next non-vulnerable version None.
Latest non-vulnerable version None.
Risk 4.5
Vulnerabilities affecting this package (17)
Vulnerability Summary Fixed by
VCID-1d77-a3xt-fbcf
Aliases:
CVE-2024-27280
GHSA-v5h6-c2hv-hv3r
StringIO buffer overread vulnerability An issue was discovered in StringIO 3.0.1, as distributed in Ruby 3.0.x through 3.0.6 and 3.1.x through 3.1.4. The `ungetbyte` and `ungetc` methods on a StringIO can read past the end of a string, and a subsequent call to `StringIO.gets` may return the memory value. This vulnerability is not affected StringIO 3.0.3 and later, and Ruby 3.2.x and later. We recommend to update the StringIO gem to version 3.0.3 or later. In order to ensure compatibility with bundled version in older Ruby series, you may update as follows instead: * For Ruby 3.0 users: Update to `stringio` 3.0.1.1 * For Ruby 3.1 users: Update to `stringio` 3.1.0.2 You can use `gem update stringio` to update it. If you are using bundler, please add `gem "stringio", ">= 3.0.1.2"` to your `Gemfile`. There are no reported fixed by versions.
VCID-2yge-cajg-eke7
Aliases:
CVE-2021-33621
GHSA-vc47-6rqg-c7f5
The cgi gem before 0.1.0.2, 0.2.x before 0.2.2, and 0.3.x before 0.3.5 for Ruby allows HTTP response splitting. This is relevant to applications that use untrusted user input either to generate an HTTP response or to create a CGI::Cookie object. There are no reported fixed by versions.
VCID-5bdv-rt41-xyfx
Aliases:
CVE-2024-27282
An issue was discovered in Ruby 3.x through 3.3.0. If attacker-supplied data is provided to the Ruby regex compiler, it is possible to extract arbitrary heap data relative to the start of the text, including pointers and sensitive strings. The fixed versions are 3.0.7, 3.1.5, 3.2.4, and 3.3.1. There are no reported fixed by versions.
VCID-5dfw-xgq5-5fay
Aliases:
CVE-2024-41123
GHSA-r55c-59qm-vjw6
REXML DoS vulnerability ### Impact The REXML gem before 3.3.2 has some DoS vulnerabilities when it parses an XML that has many specific characters such as whitespace character, `>]` and `]>`. If you need to parse untrusted XMLs, you may be impacted to these vulnerabilities. ### Patches The REXML gem 3.3.3 or later include the patches to fix these vulnerabilities. ### Workarounds Don't parse untrusted XMLs. ### References * https://github.com/ruby/rexml/security/advisories/GHSA-vg3r-rm7w-2xgh : This is a similar vulnerability * https://github.com/ruby/rexml/security/advisories/GHSA-4xqq-m2hx-25v8 : This is a similar vulnerability * https://www.ruby-lang.org/en/news/2024/08/01/dos-rexml-cve-2024-41123/: An announce on www.ruby-lang.org There are no reported fixed by versions.
VCID-b44n-frjk-qfdy
Aliases:
CVE-2024-35176
GHSA-vg3r-rm7w-2xgh
REXML contains a denial of service vulnerability ### Impact The REXML gem before 3.2.6 has a DoS vulnerability when it parses an XML that has many `<`s in an attribute value. If you need to parse untrusted XMLs, you may be impacted to this vulnerability. ### Patches The REXML gem 3.2.7 or later include the patch to fix this vulnerability. ### Workarounds Don't parse untrusted XMLs. ### References * https://www.ruby-lang.org/en/news/2024/05/16/dos-rexml-cve-2024-35176/ There are no reported fixed by versions.
VCID-bdtz-3mgw-4kga
Aliases:
CVE-2024-49761
GHSA-2rxp-v6pw-ch6m
REXML ReDoS vulnerability ### Impact The REXML gem before 3.3.9 has a ReDoS vulnerability when it parses an XML that has many digits between `&#` and `x...;` in a hex numeric character reference (`&#x...;`). This does not happen with Ruby 3.2 or later. Ruby 3.1 is the only affected maintained Ruby. Note that Ruby 3.1 will reach EOL on 2025-03. ### Patches The REXML gem 3.3.9 or later include the patch to fix the vulnerability. ### Workarounds Use Ruby 3.2 or later instead of Ruby 3.1. ### References * https://www.ruby-lang.org/en/news/2024/10/28/redos-rexml-cve-2024-49761/: An announce on www.ruby-lang.org There are no reported fixed by versions.
VCID-excx-35g6-abfe
Aliases:
CVE-2024-41946
GHSA-5866-49gr-22v4
REXML DoS vulnerability ### Impact The REXML gem before 3.3.2 has a DoS vulnerability when it parses an XML that has many entity expansions with SAX2 or pull parser API. If you need to parse untrusted XMLs with SAX2 or pull parser API, you may be impacted to this vulnerability. ### Patches The REXML gem 3.3.3 or later include the patch to fix the vulnerability. ### Workarounds Don't parse untrusted XMLs with SAX2 or pull parser API. ### References * https://www.ruby-lang.org/en/news/2008/08/23/dos-vulnerability-in-rexml/ : This is a similar vulnerability * https://www.ruby-lang.org/en/news/2024/08/01/dos-rexml-cve-2024-41946/: An announce on www.ruby-lang.org There are no reported fixed by versions.
VCID-ey82-nbah-9bfr
Aliases:
CVE-2025-27219
GHSA-gh9q-2xrm-x6qv
CGI has Denial of Service (DoS) potential in Cookie.parse There is a possibility for DoS by in the cgi gem. This vulnerability has been assigned the CVE identifier CVE-2025-27219. We recommend upgrading the cgi gem. ## Details CGI::Cookie.parse took super-linear time to parse a cookie string in some cases. Feeding a maliciously crafted cookie string into the method could lead to a Denial of Service. Please update CGI gem to version 0.3.5.1, 0.3.7, 0.4.2 or later. ## Affected versions cgi gem versions <= 0.3.5, 0.3.6, 0.4.0 and 0.4.1. ## Credits Thanks to lio346 for discovering this issue. Also thanks to mame for fixing this vulnerability. There are no reported fixed by versions.
VCID-gjq7-jc2d-uudy
Aliases:
CVE-2025-27220
GHSA-mhwm-jh88-3gjf
CGI has Regular Expression Denial of Service (ReDoS) potential in Util#escapeElement There is a possibility for Regular expression Denial of Service (ReDoS) by in the cgi gem. This vulnerability has been assigned the CVE identifier CVE-2025-27220. We recommend upgrading the cgi gem. ## Details The regular expression used in `CGI::Util#escapeElement` is vulnerable to ReDoS. The crafted input could lead to a high CPU consumption. This vulnerability only affects Ruby 3.1 and 3.2. If you are using these versions, please update CGI gem to version 0.3.5.1, 0.3.7, 0.4.2 or later. ## Affected versions cgi gem versions <= 0.3.5, 0.3.6, 0.4.0 and 0.4.1. ## Credits Thanks to svalkanov for discovering this issue. Also thanks to nobu for fixing this vulnerability. There are no reported fixed by versions.
VCID-q5ek-4e1r-eyeb
Aliases:
CVE-2023-28756
GHSA-fg7x-g82r-94qc
A ReDoS issue was discovered in the Time component through 0.2.1 in Ruby through 3.2.1. The Time parser mishandles invalid URLs that have specific characters. It causes an increase in execution time for parsing strings to Time objects. The fixed versions are 0.1.1 and 0.2.2. There are no reported fixed by versions.
VCID-qfe5-w7ge-skfa
Aliases:
CVE-2023-28755
GHSA-hv5j-3h9f-99c2
A ReDoS issue was discovered in the URI component through 0.12.0 in Ruby through 3.2.1. The URI parser mishandles invalid URLs that have specific characters. It causes an increase in execution time for parsing strings to URI objects. The fixed versions are 0.12.1, 0.11.1, 0.10.2 and 0.10.0.1. There are no reported fixed by versions.
VCID-swkc-upxh-jqgn
Aliases:
CVE-2024-27281
GHSA-592j-995h-p23j
RDoc RCE vulnerability with .rdoc_options An issue was discovered in RDoc 6.3.3 through 6.6.2, as distributed in Ruby 3.x through 3.3.0. When parsing `.rdoc_options` (used for configuration in RDoc) as a YAML file, object injection and resultant remote code execution are possible because there are no restrictions on the classes that can be restored. When loading the documentation cache, object injection and resultant remote code execution are also possible if there were a crafted cache. We recommend to update the RDoc gem to version 6.6.3.1 or later. In order to ensure compatibility with bundled version in older Ruby series, you may update as follows instead: * For Ruby 3.0 users: Update to `rdoc` 6.3.4.1 * For Ruby 3.1 users: Update to `rdoc` 6.4.1.1 * For Ruby 3.2 users: Update to `rdoc` 6.5.1.1 You can use `gem update rdoc` to update it. If you are using bundler, please add `gem "rdoc", ">= 6.6.3.1"` to your `Gemfile`. Note: 6.3.4, 6.4.1, 6.5.1 and 6.6.3 have a incorrect fix. We recommend to upgrade 6.3.4.1, 6.4.1.1, 6.5.1.1 and 6.6.3.1 instead of them. There are no reported fixed by versions.
VCID-tuja-cuj6-pfe8
Aliases:
CVE-2024-39908
GHSA-4xqq-m2hx-25v8
REXML denial of service vulnerability ### Impact The REXML gem before 3.3.1 has some DoS vulnerabilities when it parses an XML that has many specific characters such as `<`, `0` and `%>`. If you need to parse untrusted XMLs, you may be impacted to these vulnerabilities. ### Patches The REXML gem 3.3.2 or later include the patches to fix these vulnerabilities. ### Workarounds Don't parse untrusted XMLs. ### References * https://github.com/ruby/rexml/security/advisories/GHSA-vg3r-rm7w-2xgh : This is a similar vulnerability * https://www.ruby-lang.org/en/news/2024/07/16/dos-rexml-cve-2024-39908/ There are no reported fixed by versions.
VCID-ug6n-hxax-xfgp
Aliases:
CVE-2025-27221
GHSA-22h5-pq3x-2gf2
URI allows for userinfo Leakage in URI#join, URI#merge, and URI#+ There is a possibility for userinfo leakage by in the uri gem. This vulnerability has been assigned the CVE identifier CVE-2025-27221. We recommend upgrading the uri gem. ## Details The methods `URI#join`, `URI#merge`, and `URI#+` retained userinfo, such as `user:password`, even after the host is replaced. When generating a URL to a malicious host from a URL containing secret userinfo using these methods, and having someone access that URL, an unintended userinfo leak could occur. Please update URI gem to version 0.11.3, 0.12.4, 0.13.2, 1.0.3 or later. ## Affected versions uri gem versions < 0.11.3, 0.12.0 to 0.12.3, 0.13.0, 0.13.1 and 1.0.0 to 1.0.2. ## Credits Thanks to Tsubasa Irisawa (lambdasawa) for discovering this issue. Also thanks to nobu for additional fixes of this vulnerability. There are no reported fixed by versions.
VCID-v8uu-3mwj-j3a9
Aliases:
CVE-2024-43398
GHSA-vmwr-mc7x-5vc3
REXML denial of service vulnerability ### Impact The REXML gem before 3.3.6 has a DoS vulnerability when it parses an XML that has many deep elements that have same local name attributes. If you need to parse untrusted XMLs with tree parser API like `REXML::Document.new`, you may be impacted to this vulnerability. If you use other parser APIs such as stream parser API and SAX2 parser API, this vulnerability is not affected. ### Patches The REXML gem 3.3.6 or later include the patch to fix the vulnerability. ### Workarounds Don't parse untrusted XMLs with tree parser API. ### References * https://www.ruby-lang.org/en/news/2024/08/22/dos-rexml-cve-2024-43398/ : An announce on www.ruby-lang.org There are no reported fixed by versions.
VCID-xwax-7pq7-pbcy
Aliases:
CVE-2023-36617
GHSA-hww2-5g85-429m
A ReDoS issue was discovered in the URI component before 0.12.2 for Ruby. The URI parser mishandles invalid URLs that have specific characters. There is an increase in execution time for parsing strings to URI objects with rfc2396_parser.rb and rfc3986_parser.rb. NOTE: this issue exists becuse of an incomplete fix for CVE-2023-28755. Version 0.10.3 is also a fixed version. There are no reported fixed by versions.
VCID-yyvu-anns-9qbn
Aliases:
CVE-2022-28739
multiple issues There are no reported fixed by versions.
Vulnerabilities fixed by this package (0)
Vulnerability Summary Aliases
This package is not known to fix vulnerabilities.

Date Actor Action Vulnerability Source VulnerableCode Version
2025-07-05T16:29:32.175549+00:00 Debian Oval Importer Affected by VCID-xwax-7pq7-pbcy https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-07-05T16:26:33.366513+00:00 Debian Oval Importer Affected by VCID-q5ek-4e1r-eyeb https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-07-05T15:54:13.446957+00:00 Debian Oval Importer Affected by VCID-5dfw-xgq5-5fay https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-07-05T15:52:43.392662+00:00 Debian Oval Importer Affected by VCID-tuja-cuj6-pfe8 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-07-05T15:39:28.215338+00:00 Debian Oval Importer Affected by VCID-5bdv-rt41-xyfx https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-07-05T15:08:17.060663+00:00 Debian Oval Importer Affected by VCID-qfe5-w7ge-skfa https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-07-05T12:03:30.945722+00:00 Debian Oval Importer Affected by VCID-gjq7-jc2d-uudy https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-07-05T11:40:01.355809+00:00 Debian Oval Importer Affected by VCID-bdtz-3mgw-4kga https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-07-05T07:35:30.742154+00:00 Debian Oval Importer Affected by VCID-2yge-cajg-eke7 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-07-05T06:39:02.393372+00:00 Debian Oval Importer Affected by VCID-ug6n-hxax-xfgp https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-07-05T04:19:20.787069+00:00 Debian Oval Importer Affected by VCID-ey82-nbah-9bfr https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-07-05T03:14:32.755527+00:00 Debian Oval Importer Affected by VCID-excx-35g6-abfe https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-07-04T07:42:30.101507+00:00 Debian Oval Importer Affected by VCID-swkc-upxh-jqgn https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-07-04T07:24:57.538040+00:00 Debian Oval Importer Affected by VCID-1d77-a3xt-fbcf https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-07-04T06:40:31.511543+00:00 Debian Oval Importer Affected by VCID-b44n-frjk-qfdy https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-07-04T06:33:43.441039+00:00 Debian Oval Importer Affected by VCID-v8uu-3mwj-j3a9 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-07-04T06:13:49.175972+00:00 Debian Oval Importer Affected by VCID-yyvu-anns-9qbn https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-07-02T05:00:51.090567+00:00 Debian Oval Importer Affected by VCID-xwax-7pq7-pbcy https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 36.1.3
2025-07-02T04:58:35.644231+00:00 Debian Oval Importer Affected by VCID-q5ek-4e1r-eyeb https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 36.1.3
2025-07-02T04:32:01.367449+00:00 Debian Oval Importer Affected by VCID-5dfw-xgq5-5fay https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 36.1.3
2025-07-02T04:30:53.968018+00:00 Debian Oval Importer Affected by VCID-tuja-cuj6-pfe8 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 36.1.3
2025-07-02T04:19:55.637033+00:00 Debian Oval Importer Affected by VCID-5bdv-rt41-xyfx https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 36.1.3
2025-07-02T03:58:55.947664+00:00 Debian Oval Importer Affected by VCID-qfe5-w7ge-skfa https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 36.1.3
2025-07-02T02:43:56.336436+00:00 Debian Oval Importer Affected by VCID-gjq7-jc2d-uudy https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 36.1.3
2025-07-02T02:28:54.087804+00:00 Debian Oval Importer Affected by VCID-bdtz-3mgw-4kga https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 36.1.3
2025-07-02T00:47:05.288486+00:00 Debian Oval Importer Affected by VCID-2yge-cajg-eke7 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 36.1.3
2025-07-02T00:22:11.597224+00:00 Debian Oval Importer Affected by VCID-ug6n-hxax-xfgp https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 36.1.3
2025-07-01T23:25:04.612901+00:00 Debian Oval Importer Affected by VCID-ey82-nbah-9bfr https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 36.1.3
2025-07-01T23:03:38.779922+00:00 Debian Oval Importer Affected by VCID-excx-35g6-abfe https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 36.1.3
2025-07-01T22:35:33.223655+00:00 Debian Oval Importer Affected by VCID-swkc-upxh-jqgn https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 36.1.3
2025-07-01T22:29:07.964779+00:00 Debian Oval Importer Affected by VCID-1d77-a3xt-fbcf https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 36.1.3
2025-07-01T22:10:47.837969+00:00 Debian Oval Importer Affected by VCID-b44n-frjk-qfdy https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 36.1.3
2025-07-01T22:07:40.902539+00:00 Debian Oval Importer Affected by VCID-v8uu-3mwj-j3a9 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 36.1.3
2025-07-01T21:57:01.169244+00:00 Debian Oval Importer Affected by VCID-yyvu-anns-9qbn https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 36.1.3