{"id":"USN-7418-1","summary":"ruby2.7, ruby3.0, ruby3.2, ruby3.3 vulnerabilities","details":"It was discovered that Ruby incorrectly handled parsing of an XML document\nthat has specific XML characters in an attribute value using REXML gem. An\nattacker could use this issue to cause Ruby to crash, resulting in a\ndenial of service. This issue only affected in Ubuntu 22.04 LTS, Ubuntu\n24.04 LTS, and Ubuntu 24.10. (CVE-2024-35176, CVE-2024-39908,\nCVE-2024-41123, CVE-2024-43398)\n\nIt was discovered that Ruby incorrectly handled expanding ranges in the\nnet-imap response parser. If a user or automated system were tricked into\nconnecting to a malicious IMAP server, a remote attacker could possibly use\nthis issue to consume memory, leading to a denial of service. This issue\nonly affected Ubuntu 24.04 LTS, and Ubuntu 24.10. (CVE-2025-25186)\n\nIt was discovered that the Ruby CGI gem incorrectly handled parsing certain\ncookies. A remote attacker could possibly use this issue to consume\nresources, leading to a denial of service. (CVE-2025-27219)\n\nIt was discovered that the Ruby CGI gem incorrectly handled parsing certain\nregular expressions. A remote attacker could possibly use this issue to\nconsume resources, leading to a denial of service. (CVE-2025-27220)\n\nIt was discovered that the Ruby URI gem incorrectly handled certain URI\nhandling methods. A remote attacker could possibly use this issue to leak\nauthentication credentials. (CVE-2025-27221)\n","modified":"2026-04-27T18:02:26.605127452Z","published":"2025-04-07T13:55:18Z","related":["UBUNTU-CVE-2024-35176","UBUNTU-CVE-2024-39908","UBUNTU-CVE-2024-41123","UBUNTU-CVE-2024-43398","UBUNTU-CVE-2025-25186","UBUNTU-CVE-2025-27219","UBUNTU-CVE-2025-27220","UBUNTU-CVE-2025-27221"],"upstream":["CVE-2024-35176","CVE-2024-39908","CVE-2024-41123","CVE-2024-43398","CVE-2025-25186","CVE-2025-27219","CVE-2025-27220","CVE-2025-27221","UBUNTU-CVE-2024-35176","UBUNTU-CVE-2024-39908","UBUNTU-CVE-2024-41123","UBUNTU-CVE-2024-43398","UBUNTU-CVE-2025-25186","UBUNTU-CVE-2025-27219","UBUNTU-CVE-2025-27220","UBUNTU-CVE-2025-27221"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-7418-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-35176"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-39908"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-41123"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-43398"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2025-25186"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2025-27219"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2025-27220"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2025-27221"}],"affected":[{"package":{"name":"ruby2.7","ecosystem":"Ubuntu:20.04:LTS","purl":"pkg:deb/ubuntu/ruby2.7@2.7.0-5ubuntu1.18?arch=source&distro=focal"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2.7.0-5ubuntu1.18"}]}],"versions":["2.7.0-1","2.7.0-2","2.7.0-3","2.7.0-4","2.7.0-4ubuntu1","2.7.0-5ubuntu1","2.7.0-5ubuntu1.1","2.7.0-5ubuntu1.2","2.7.0-5ubuntu1.3","2.7.0-5ubuntu1.4","2.7.0-5ubuntu1.5","2.7.0-5ubuntu1.6","2.7.0-5ubuntu1.7","2.7.0-5ubuntu1.8","2.7.0-5ubuntu1.9","2.7.0-5ubuntu1.10","2.7.0-5ubuntu1.11","2.7.0-5ubuntu1.12","2.7.0-5ubuntu1.13","2.7.0-5ubuntu1.14","2.7.0-5ubuntu1.15","2.7.0-5ubuntu1.16","2.7.0-5ubuntu1.17"],"ecosystem_specific":{"binaries":[{"binary_name":"libruby2.7","binary_version":"2.7.0-5ubuntu1.18"},{"binary_name":"ruby2.7","binary_version":"2.7.0-5ubuntu1.18"}],"availability":"No subscription required"},"database_specific":{"cves_map":{"cves":[{"id":"CVE-2025-27219","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2025-27220","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:L"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2025-27221","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"type":"Ubuntu","score":"medium"}]}],"ecosystem":"Ubuntu:20.04:LTS"},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-7418-1.json"}},{"package":{"name":"ruby3.0","ecosystem":"Ubuntu:22.04:LTS","purl":"pkg:deb/ubuntu/ruby3.0@3.0.2-7ubuntu2.10?arch=source&distro=jammy"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3.0.2-7ubuntu2.10"}]}],"versions":["3.0.2-5ubuntu1","3.0.2-7","3.0.2-7ubuntu2","3.0.2-7ubuntu2.1","3.0.2-7ubuntu2.2","3.0.2-7ubuntu2.3","3.0.2-7ubuntu2.4","3.0.2-7ubuntu2.5","3.0.2-7ubuntu2.6","3.0.2-7ubuntu2.7","3.0.2-7ubuntu2.8"],"ecosystem_specific":{"binaries":[{"binary_name":"libruby3.0","binary_version":"3.0.2-7ubuntu2.10"},{"binary_name":"ruby3.0","binary_version":"3.0.2-7ubuntu2.10"}],"availability":"No subscription required"},"database_specific":{"cves_map":{"cves":[{"id":"CVE-2024-35176","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2024-39908","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2024-41123","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2024-43398","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}]},{"id":"CVE-2025-27219","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2025-27220","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:L"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2025-27221","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"type":"Ubuntu","score":"medium"}]}],"ecosystem":"Ubuntu:22.04:LTS"},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-7418-1.json"}},{"package":{"name":"ruby3.2","ecosystem":"Ubuntu:24.04:LTS","purl":"pkg:deb/ubuntu/ruby3.2@3.2.3-1ubuntu0.24.04.5?arch=source&distro=noble"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3.2.3-1ubuntu0.24.04.5"}]}],"versions":["3.2.3-1","3.2.3-1build2","3.2.3-1build3","3.2.3-1ubuntu0.24.04.1","3.2.3-1ubuntu0.24.04.3"],"ecosystem_specific":{"binaries":[{"binary_name":"libruby3.2","binary_version":"3.2.3-1ubuntu0.24.04.5"},{"binary_name":"ruby3.2","binary_version":"3.2.3-1ubuntu0.24.04.5"}],"availability":"No subscription required"},"database_specific":{"cves_map":{"cves":[{"id":"CVE-2024-35176","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2024-39908","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2024-41123","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2024-43398","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}]},{"id":"CVE-2025-25186","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}]},{"id":"CVE-2025-27219","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2025-27220","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:L"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2025-27221","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"type":"Ubuntu","score":"medium"}]}],"ecosystem":"Ubuntu:24.04:LTS"},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-7418-1.json"}}],"schema_version":"1.7.5"}