MGASA-2025-0290

Source
https://advisories.mageia.org/MGASA-2025-0290.html
Import Source
https://advisories.mageia.org/MGASA-2025-0290.json
JSON Data
https://api.test.osv.dev/v1/vulns/MGASA-2025-0290
Related
Published
2025-11-13T23:37:22Z
Modified
2025-11-13T22:55:28Z
Summary
Updated ruby packages fix security vulnerabilities
Details

Net::IMAP vulnerable to possible DoS by memory exhaustion. (CVE-2025-25186) In the CGI gem before 0.4.2 for Ruby, the CGI::Cookie.parse method in the CGI library contains a potential Denial of Service (DoS) vulnerability. The method does not impose any limit on the length of the raw cookie value it processes. This oversight can lead to excessive resource consumption when parsing extremely large cookies. (CVE-2025-27219) In the CGI gem before 0.4.2 for Ruby, a Regular Expression Denial of Service (ReDoS) vulnerability exists in the Util#escapeElement method. (CVE-2025-27220) In the URI gem before 1.0.3 for Ruby, the URI handling methods (URI.join, URI#merge, URI#+) have an inadvertent leakage of authentication credentials because userinfo is retained even after changing the host. (CVE-2025-27221)

References
Credits

Affected packages

Mageia:9 / ruby

Package

Name
ruby
Purl
pkg:rpm/mageia/ruby?arch=source&distro=mageia-9

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.1.5-47.mga9

Ecosystem specific

{
    "section": "core"
}