{"id":"RHSA-2023:7025","summary":"Red Hat Security Advisory: ruby:2.5 security update","modified":"2025-11-22T13:00:30Z","published":"2024-10-04T06:58:59Z","upstream":["CVE-2021-33621","CVE-2022-28739","CVE-2023-28755","CVE-2023-28756"],"references":[{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2023:7025"},{"type":"ARTICLE","url":"https://access.redhat.com/security/updates/classification/#moderate"},{"type":"ARTICLE","url":"https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.9_release_notes/index"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2075687"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2149706"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2184059"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2184061"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2210326"},{"type":"ADVISORY","url":"https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_7025.json"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-33621"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-33621"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-33621"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-28739"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-28739"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-28739"},{"type":"ARTICLE","url":"http://www.ruby-lang.org/en/news/2022/04/12/buffer-overrun-in-string-to-float-cve-2022-28739/"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-28755"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-28755"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-28755"},{"type":"ARTICLE","url":"https://www.ruby-lang.org/en/news/2023/03/28/redos-in-uri-cve-2023-28755/"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-28756"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-28756"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-28756"},{"type":"ARTICLE","url":"https://www.ruby-lang.org/en/news/2023/03/30/redos-in-time-cve-2023-28756/"}],"affected":[{"package":{"name":"ruby","ecosystem":"Red Hat:enterprise_linux:8::appstream","purl":"pkg:rpm/redhat/ruby"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.5.9-111.module+el8.9.0+19193+435404ae"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:7025.json"}},{"package":{"name":"ruby-debuginfo","ecosystem":"Red Hat:enterprise_linux:8::appstream","purl":"pkg:rpm/redhat/ruby-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.5.9-111.module+el8.9.0+19193+435404ae"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:7025.json"}},{"package":{"name":"ruby-debugsource","ecosystem":"Red Hat:enterprise_linux:8::appstream","purl":"pkg:rpm/redhat/ruby-debugsource"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.5.9-111.module+el8.9.0+19193+435404ae"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:7025.json"}},{"package":{"name":"ruby-devel","ecosystem":"Red Hat:enterprise_linux:8::appstream","purl":"pkg:rpm/redhat/ruby-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.5.9-111.module+el8.9.0+19193+435404ae"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:7025.json"}},{"package":{"name":"ruby-doc","ecosystem":"Red Hat:enterprise_linux:8::appstream","purl":"pkg:rpm/redhat/ruby-doc"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.5.9-111.module+el8.9.0+19193+435404ae"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:7025.json"}},{"package":{"name":"ruby-irb","ecosystem":"Red Hat:enterprise_linux:8::appstream","purl":"pkg:rpm/redhat/ruby-irb"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.5.9-111.module+el8.9.0+19193+435404ae"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:7025.json"}},{"package":{"name":"ruby-libs","ecosystem":"Red Hat:enterprise_linux:8::appstream","purl":"pkg:rpm/redhat/ruby-libs"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.5.9-111.module+el8.9.0+19193+435404ae"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:7025.json"}},{"package":{"name":"ruby-libs-debuginfo","ecosystem":"Red Hat:enterprise_linux:8::appstream","purl":"pkg:rpm/redhat/ruby-libs-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.5.9-111.module+el8.9.0+19193+435404ae"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:7025.json"}},{"package":{"name":"rubygem-abrt","ecosystem":"Red Hat:enterprise_linux:8::appstream","purl":"pkg:rpm/redhat/rubygem-abrt"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:0.3.0-4.module+el8.9.0+19193+435404ae"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:7025.json"}},{"package":{"name":"rubygem-abrt-doc","ecosystem":"Red Hat:enterprise_linux:8::appstream","purl":"pkg:rpm/redhat/rubygem-abrt-doc"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:0.3.0-4.module+el8.9.0+19193+435404ae"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:7025.json"}},{"package":{"name":"rubygem-bigdecimal","ecosystem":"Red Hat:enterprise_linux:8::appstream","purl":"pkg:rpm/redhat/rubygem-bigdecimal"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:1.3.4-111.module+el8.9.0+19193+435404ae"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:7025.json"}},{"package":{"name":"rubygem-bigdecimal-debuginfo","ecosystem":"Red Hat:enterprise_linux:8::appstream","purl":"pkg:rpm/redhat/rubygem-bigdecimal-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:1.3.4-111.module+el8.9.0+19193+435404ae"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:7025.json"}},{"package":{"name":"rubygem-bson","ecosystem":"Red Hat:enterprise_linux:8::appstream","purl":"pkg:rpm/redhat/rubygem-bson"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.3.0-2.module+el8.9.0+19193+435404ae"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:7025.json"}},{"package":{"name":"rubygem-bson-debuginfo","ecosystem":"Red Hat:enterprise_linux:8::appstream","purl":"pkg:rpm/redhat/rubygem-bson-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.3.0-2.module+el8.9.0+19193+435404ae"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:7025.json"}},{"package":{"name":"rubygem-bson-debugsource","ecosystem":"Red Hat:enterprise_linux:8::appstream","purl":"pkg:rpm/redhat/rubygem-bson-debugsource"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.3.0-2.module+el8.9.0+19193+435404ae"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:7025.json"}},{"package":{"name":"rubygem-bson-doc","ecosystem":"Red Hat:enterprise_linux:8::appstream","purl":"pkg:rpm/redhat/rubygem-bson-doc"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.3.0-2.module+el8.9.0+19193+435404ae"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:7025.json"}},{"package":{"name":"rubygem-bundler","ecosystem":"Red Hat:enterprise_linux:8::appstream","purl":"pkg:rpm/redhat/rubygem-bundler"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:1.16.1-4.module+el8.9.0+19193+435404ae"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:7025.json"}},{"package":{"name":"rubygem-bundler-doc","ecosystem":"Red Hat:enterprise_linux:8::appstream","purl":"pkg:rpm/redhat/rubygem-bundler-doc"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:1.16.1-4.module+el8.9.0+19193+435404ae"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:7025.json"}},{"package":{"name":"rubygem-did_you_mean","ecosystem":"Red Hat:enterprise_linux:8::appstream","purl":"pkg:rpm/redhat/rubygem-did_you_mean"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:1.2.0-111.module+el8.9.0+19193+435404ae"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:7025.json"}},{"package":{"name":"rubygem-io-console","ecosystem":"Red Hat:enterprise_linux:8::appstream","purl":"pkg:rpm/redhat/rubygem-io-console"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:0.4.6-111.module+el8.9.0+19193+435404ae"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:7025.json"}},{"package":{"name":"rubygem-io-console-debuginfo","ecosystem":"Red Hat:enterprise_linux:8::appstream","purl":"pkg:rpm/redhat/rubygem-io-console-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:0.4.6-111.module+el8.9.0+19193+435404ae"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:7025.json"}},{"package":{"name":"rubygem-json","ecosystem":"Red Hat:enterprise_linux:8::appstream","purl":"pkg:rpm/redhat/rubygem-json"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.1.0-111.module+el8.9.0+19193+435404ae"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:7025.json"}},{"package":{"name":"rubygem-json-debuginfo","ecosystem":"Red Hat:enterprise_linux:8::appstream","purl":"pkg:rpm/redhat/rubygem-json-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.1.0-111.module+el8.9.0+19193+435404ae"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:7025.json"}},{"package":{"name":"rubygem-minitest","ecosystem":"Red Hat:enterprise_linux:8::appstream","purl":"pkg:rpm/redhat/rubygem-minitest"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.10.3-111.module+el8.9.0+19193+435404ae"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:7025.json"}},{"package":{"name":"rubygem-mongo","ecosystem":"Red Hat:enterprise_linux:8::appstream","purl":"pkg:rpm/redhat/rubygem-mongo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.5.1-2.module+el8.9.0+19193+435404ae"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:7025.json"}},{"package":{"name":"rubygem-mongo-doc","ecosystem":"Red Hat:enterprise_linux:8::appstream","purl":"pkg:rpm/redhat/rubygem-mongo-doc"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.5.1-2.module+el8.9.0+19193+435404ae"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:7025.json"}},{"package":{"name":"rubygem-mysql2","ecosystem":"Red Hat:enterprise_linux:8::appstream","purl":"pkg:rpm/redhat/rubygem-mysql2"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:0.4.10-4.module+el8.9.0+19193+435404ae"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:7025.json"}},{"package":{"name":"rubygem-mysql2-debuginfo","ecosystem":"Red Hat:enterprise_linux:8::appstream","purl":"pkg:rpm/redhat/rubygem-mysql2-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:0.4.10-4.module+el8.9.0+19193+435404ae"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:7025.json"}},{"package":{"name":"rubygem-mysql2-debugsource","ecosystem":"Red Hat:enterprise_linux:8::appstream","purl":"pkg:rpm/redhat/rubygem-mysql2-debugsource"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:0.4.10-4.module+el8.9.0+19193+435404ae"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:7025.json"}},{"package":{"name":"rubygem-mysql2-doc","ecosystem":"Red Hat:enterprise_linux:8::appstream","purl":"pkg:rpm/redhat/rubygem-mysql2-doc"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:0.4.10-4.module+el8.9.0+19193+435404ae"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:7025.json"}},{"package":{"name":"rubygem-net-telnet","ecosystem":"Red Hat:enterprise_linux:8::appstream","purl":"pkg:rpm/redhat/rubygem-net-telnet"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:0.1.1-111.module+el8.9.0+19193+435404ae"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:7025.json"}},{"package":{"name":"rubygem-openssl","ecosystem":"Red Hat:enterprise_linux:8::appstream","purl":"pkg:rpm/redhat/rubygem-openssl"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.1.2-111.module+el8.9.0+19193+435404ae"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:7025.json"}},{"package":{"name":"rubygem-openssl-debuginfo","ecosystem":"Red Hat:enterprise_linux:8::appstream","purl":"pkg:rpm/redhat/rubygem-openssl-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.1.2-111.module+el8.9.0+19193+435404ae"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:7025.json"}},{"package":{"name":"rubygem-pg","ecosystem":"Red Hat:enterprise_linux:8::appstream","purl":"pkg:rpm/redhat/rubygem-pg"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:1.0.0-3.module+el8.9.0+19193+435404ae"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:7025.json"}},{"package":{"name":"rubygem-pg-debuginfo","ecosystem":"Red Hat:enterprise_linux:8::appstream","purl":"pkg:rpm/redhat/rubygem-pg-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:1.0.0-3.module+el8.9.0+19193+435404ae"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:7025.json"}},{"package":{"name":"rubygem-pg-debugsource","ecosystem":"Red Hat:enterprise_linux:8::appstream","purl":"pkg:rpm/redhat/rubygem-pg-debugsource"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:1.0.0-3.module+el8.9.0+19193+435404ae"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:7025.json"}},{"package":{"name":"rubygem-pg-doc","ecosystem":"Red Hat:enterprise_linux:8::appstream","purl":"pkg:rpm/redhat/rubygem-pg-doc"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:1.0.0-3.module+el8.9.0+19193+435404ae"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:7025.json"}},{"package":{"name":"rubygem-power_assert","ecosystem":"Red Hat:enterprise_linux:8::appstream","purl":"pkg:rpm/redhat/rubygem-power_assert"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:1.1.1-111.module+el8.9.0+19193+435404ae"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:7025.json"}},{"package":{"name":"rubygem-psych","ecosystem":"Red Hat:enterprise_linux:8::appstream","purl":"pkg:rpm/redhat/rubygem-psych"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:3.0.2-111.module+el8.9.0+19193+435404ae"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:7025.json"}},{"package":{"name":"rubygem-psych-debuginfo","ecosystem":"Red Hat:enterprise_linux:8::appstream","purl":"pkg:rpm/redhat/rubygem-psych-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:3.0.2-111.module+el8.9.0+19193+435404ae"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:7025.json"}},{"package":{"name":"rubygem-rake","ecosystem":"Red Hat:enterprise_linux:8::appstream","purl":"pkg:rpm/redhat/rubygem-rake"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:12.3.3-111.module+el8.9.0+19193+435404ae"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:7025.json"}},{"package":{"name":"rubygem-rdoc","ecosystem":"Red Hat:enterprise_linux:8::appstream","purl":"pkg:rpm/redhat/rubygem-rdoc"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:6.0.1.1-111.module+el8.9.0+19193+435404ae"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:7025.json"}},{"package":{"name":"rubygem-test-unit","ecosystem":"Red Hat:enterprise_linux:8::appstream","purl":"pkg:rpm/redhat/rubygem-test-unit"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:3.2.7-111.module+el8.9.0+19193+435404ae"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:7025.json"}},{"package":{"name":"rubygem-xmlrpc","ecosystem":"Red Hat:enterprise_linux:8::appstream","purl":"pkg:rpm/redhat/rubygem-xmlrpc"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:0.3.0-111.module+el8.9.0+19193+435404ae"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:7025.json"}},{"package":{"name":"rubygems","ecosystem":"Red Hat:enterprise_linux:8::appstream","purl":"pkg:rpm/redhat/rubygems"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.7.6.3-111.module+el8.9.0+19193+435404ae"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:7025.json"}},{"package":{"name":"rubygems-devel","ecosystem":"Red Hat:enterprise_linux:8::appstream","purl":"pkg:rpm/redhat/rubygems-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.7.6.3-111.module+el8.9.0+19193+435404ae"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:7025.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}]}