OESA-2025-1261

Source
https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1261
Import Source
https://repo.openeuler.org/security/data/osv/OESA-2025-1261.json
JSON Data
https://api.test.osv.dev/v1/vulns/OESA-2025-1261
Upstream
Published
2025-03-14T15:37:01Z
Modified
2025-08-12T05:49:39.007040Z
Summary
ruby security update
Details

Ruby is a fast and easy interpreted scripting language for object-oriented programming. It has many functions for processing text Files and perform system management tasks (such as Perl).

Security Fix(es):

In the CGI gem before 0.4.2 for Ruby, the CGI::Cookie.parse method in the CGI library contains a potential Denial of Service (DoS) vulnerability. The method does not impose any limit on the length of the raw cookie value it processes. This oversight can lead to excessive resource consumption when parsing extremely large cookies.(CVE-2025-27219)

In the CGI gem before 0.4.2 for Ruby, a Regular Expression Denial of Service (ReDoS) vulnerability exists in the Util#escapeElement method.(CVE-2025-27220)

In the URI gem before 1.0.3 for Ruby, the URI handling methods (URI.join, URI#merge, URI#+) have an inadvertent leakage of authentication credentials because userinfo is retained even after changing the host.(CVE-2025-27221)

Database specific
{
    "severity": "High"
}
References

Affected packages

openEuler:22.03-LTS-SP4 / ruby

Package

Name
ruby
Purl
pkg:rpm/openEuler/ruby&distro=openEuler-22.03-LTS-SP4

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.0.3-142.oe2203sp4

Ecosystem specific

{
    "src": [
        "ruby-3.0.3-142.oe2203sp4.src.rpm"
    ],
    "x86_64": [
        "ruby-3.0.3-142.oe2203sp4.x86_64.rpm",
        "ruby-debuginfo-3.0.3-142.oe2203sp4.x86_64.rpm",
        "ruby-debugsource-3.0.3-142.oe2203sp4.x86_64.rpm",
        "ruby-devel-3.0.3-142.oe2203sp4.x86_64.rpm",
        "rubygem-bigdecimal-3.0.0-142.oe2203sp4.x86_64.rpm",
        "rubygem-io-console-0.5.7-142.oe2203sp4.x86_64.rpm",
        "rubygem-json-2.5.1-142.oe2203sp4.x86_64.rpm",
        "rubygem-openssl-2.2.1-142.oe2203sp4.x86_64.rpm",
        "rubygem-psych-3.3.2-142.oe2203sp4.x86_64.rpm"
    ],
    "aarch64": [
        "ruby-3.0.3-142.oe2203sp4.aarch64.rpm",
        "ruby-debuginfo-3.0.3-142.oe2203sp4.aarch64.rpm",
        "ruby-debugsource-3.0.3-142.oe2203sp4.aarch64.rpm",
        "ruby-devel-3.0.3-142.oe2203sp4.aarch64.rpm",
        "rubygem-bigdecimal-3.0.0-142.oe2203sp4.aarch64.rpm",
        "rubygem-io-console-0.5.7-142.oe2203sp4.aarch64.rpm",
        "rubygem-json-2.5.1-142.oe2203sp4.aarch64.rpm",
        "rubygem-openssl-2.2.1-142.oe2203sp4.aarch64.rpm",
        "rubygem-psych-3.3.2-142.oe2203sp4.aarch64.rpm"
    ],
    "noarch": [
        "ruby-help-3.0.3-142.oe2203sp4.noarch.rpm",
        "ruby-irb-3.0.3-142.oe2203sp4.noarch.rpm",
        "rubygem-bundler-2.2.32-142.oe2203sp4.noarch.rpm",
        "rubygem-did_you_mean-1.5.0-142.oe2203sp4.noarch.rpm",
        "rubygem-minitest-5.14.2-142.oe2203sp4.noarch.rpm",
        "rubygem-rake-13.0.3-142.oe2203sp4.noarch.rpm",
        "rubygem-rbs-1.4.0-142.oe2203sp4.noarch.rpm",
        "rubygem-rdoc-6.3.3-142.oe2203sp4.noarch.rpm",
        "rubygem-rexml-3.2.5-142.oe2203sp4.noarch.rpm",
        "rubygem-rss-0.2.9-142.oe2203sp4.noarch.rpm",
        "rubygem-test-unit-3.3.7-142.oe2203sp4.noarch.rpm",
        "rubygem-typeprof-0.15.2-142.oe2203sp4.noarch.rpm",
        "rubygems-3.2.32-142.oe2203sp4.noarch.rpm",
        "rubygems-devel-3.2.32-142.oe2203sp4.noarch.rpm"
    ]
}