USN-8137-1

Source
https://ubuntu.com/security/notices/USN-8137-1
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-8137-1.json
JSON Data
https://api.test.osv.dev/v1/vulns/USN-8137-1
Upstream
Related
Published
2026-03-31T08:49:35Z
Modified
2026-04-02T20:44:41.934584546Z
Summary
ruby2.3, ruby2.5, ruby2.7, ruby3.0, ruby3.2, ruby3.3 vulnerability
Details

It was discovered that the Ruby URI gem did not properly handle sensitive information when combining URIs. A remote attacker could possibly use this issue to leak authentication credentials.

References

Affected packages

Ubuntu:22.04:LTS
ruby3.0

Package

Name
ruby3.0
Purl
pkg:deb/ubuntu/ruby3.0@3.0.2-7ubuntu2.12?arch=source&distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.0.2-7ubuntu2.12

Affected versions

3.*
3.0.2-5ubuntu1
3.0.2-7
3.0.2-7ubuntu2
3.0.2-7ubuntu2.1
3.0.2-7ubuntu2.2
3.0.2-7ubuntu2.3
3.0.2-7ubuntu2.4
3.0.2-7ubuntu2.5
3.0.2-7ubuntu2.6
3.0.2-7ubuntu2.7
3.0.2-7ubuntu2.8
3.0.2-7ubuntu2.10
3.0.2-7ubuntu2.11

Ecosystem specific

{
    "availability": "No subscription required",
    "binaries": [
        {
            "binary_version": "3.0.2-7ubuntu2.12",
            "binary_name": "libruby3.0"
        },
        {
            "binary_version": "3.0.2-7ubuntu2.12",
            "binary_name": "ruby3.0"
        },
        {
            "binary_version": "3.0.2-7ubuntu2.12",
            "binary_name": "ruby3.0-dev"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-8137-1.json"
cves_map
{
    "cves": [
        {
            "severity": [
                {
                    "type": "CVSS_V4",
                    "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U"
                },
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                },
                {
                    "type": "Ubuntu",
                    "score": "low"
                }
            ],
            "id": "CVE-2025-61594"
        }
    ],
    "ecosystem": "Ubuntu:22.04:LTS"
}
Ubuntu:24.04:LTS
ruby3.2

Package

Name
ruby3.2
Purl
pkg:deb/ubuntu/ruby3.2@3.2.3-1ubuntu0.24.04.7?arch=source&distro=noble

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.2.3-1ubuntu0.24.04.7

Affected versions

3.*
3.2.3-1
3.2.3-1build2
3.2.3-1build3
3.2.3-1ubuntu0.24.04.1
3.2.3-1ubuntu0.24.04.3
3.2.3-1ubuntu0.24.04.5
3.2.3-1ubuntu0.24.04.6

Ecosystem specific

{
    "availability": "No subscription required",
    "binaries": [
        {
            "binary_version": "3.2.3-1ubuntu0.24.04.7",
            "binary_name": "libruby3.2"
        },
        {
            "binary_version": "3.2.3-1ubuntu0.24.04.7",
            "binary_name": "ruby3.2"
        },
        {
            "binary_version": "3.2.3-1ubuntu0.24.04.7",
            "binary_name": "ruby3.2-dev"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-8137-1.json"
cves_map
{
    "cves": [
        {
            "severity": [
                {
                    "type": "CVSS_V4",
                    "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U"
                },
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                },
                {
                    "type": "Ubuntu",
                    "score": "low"
                }
            ],
            "id": "CVE-2025-61594"
        }
    ],
    "ecosystem": "Ubuntu:24.04:LTS"
}
Ubuntu:25.10
ruby3.3

Package

Name
ruby3.3
Purl
pkg:deb/ubuntu/ruby3.3@3.3.8-2ubuntu2.1?arch=source&distro=questing

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.3.8-2ubuntu2.1

Affected versions

3.*
3.3.7-1ubuntu2
3.3.8-2ubuntu1
3.3.8-2ubuntu2

Ecosystem specific

{
    "availability": "No subscription required",
    "binaries": [
        {
            "binary_version": "3.3.8-2ubuntu2.1",
            "binary_name": "libruby3.3"
        },
        {
            "binary_version": "3.3.8-2ubuntu2.1",
            "binary_name": "ruby3.3"
        },
        {
            "binary_version": "3.3.8-2ubuntu2.1",
            "binary_name": "ruby3.3-dev"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-8137-1.json"
cves_map
{
    "cves": [
        {
            "severity": [
                {
                    "type": "CVSS_V4",
                    "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U"
                },
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                },
                {
                    "type": "Ubuntu",
                    "score": "low"
                }
            ],
            "id": "CVE-2025-61594"
        }
    ],
    "ecosystem": "Ubuntu:25.10"
}
Ubuntu:Pro:16.04:LTS
ruby2.3

Package

Name
ruby2.3
Purl
pkg:deb/ubuntu/ruby2.3@2.3.1-2~ubuntu16.04.16+esm12?arch=source&distro=esm-infra/xenial

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.3.1-2~ubuntu16.04.16+esm12

Affected versions

2.*
2.3.0-1
2.3.0-2
2.3.0-4ubuntu2
2.3.0-4ubuntu3
2.3.0-5ubuntu1
2.3.1-2~16.04
2.3.1-2~16.04.2
2.3.1-2~16.04.4
2.3.1-2~16.04.5
2.3.1-2~16.04.6
2.3.1-2~16.04.7
2.3.1-2~16.04.9
2.3.1-2~16.04.10
2.3.1-2~16.04.11
2.3.1-2~16.04.12
2.3.1-2~ubuntu16.04.13
2.3.1-2~ubuntu16.04.14
2.3.1-2~ubuntu16.04.15
2.3.1-2~ubuntu16.04.16
2.3.1-2~ubuntu16.04.16+esm1
2.3.1-2~ubuntu16.04.16+esm2
2.3.1-2~ubuntu16.04.16+esm3
2.3.1-2~ubuntu16.04.16+esm4
2.3.1-2~ubuntu16.04.16+esm5
2.3.1-2~ubuntu16.04.16+esm6
2.3.1-2~ubuntu16.04.16+esm7
2.3.1-2~ubuntu16.04.16+esm8
2.3.1-2~ubuntu16.04.16+esm9
2.3.1-2~ubuntu16.04.16+esm10
2.3.1-2~ubuntu16.04.16+esm11

Ecosystem specific

{
    "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro",
    "binaries": [
        {
            "binary_version": "2.3.1-2~ubuntu16.04.16+esm12",
            "binary_name": "libruby2.3"
        },
        {
            "binary_version": "2.3.1-2~ubuntu16.04.16+esm12",
            "binary_name": "ruby2.3"
        },
        {
            "binary_version": "2.3.1-2~ubuntu16.04.16+esm12",
            "binary_name": "ruby2.3-dev"
        },
        {
            "binary_version": "2.3.1-2~ubuntu16.04.16+esm12",
            "binary_name": "ruby2.3-tcltk"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-8137-1.json"
cves_map
{
    "cves": [
        {
            "severity": [
                {
                    "type": "CVSS_V4",
                    "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U"
                },
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                },
                {
                    "type": "Ubuntu",
                    "score": "low"
                }
            ],
            "id": "CVE-2025-61594"
        }
    ],
    "ecosystem": "Ubuntu:Pro:16.04:LTS"
}
Ubuntu:Pro:18.04:LTS
ruby2.5

Package

Name
ruby2.5
Purl
pkg:deb/ubuntu/ruby2.5@2.5.1-1ubuntu1.16+esm7?arch=source&distro=esm-infra/bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.5.1-1ubuntu1.16+esm7

Affected versions

2.*
2.5.0~preview1-1ubuntu2
2.5.0-4ubuntu1
2.5.0-4ubuntu4
2.5.0-5ubuntu1
2.5.0-6ubuntu1
2.5.1-1ubuntu1
2.5.1-1ubuntu1.1
2.5.1-1ubuntu1.2
2.5.1-1ubuntu1.4
2.5.1-1ubuntu1.5
2.5.1-1ubuntu1.6
2.5.1-1ubuntu1.7
2.5.1-1ubuntu1.8
2.5.1-1ubuntu1.9
2.5.1-1ubuntu1.10
2.5.1-1ubuntu1.11
2.5.1-1ubuntu1.12
2.5.1-1ubuntu1.13
2.5.1-1ubuntu1.14
2.5.1-1ubuntu1.15
2.5.1-1ubuntu1.16
2.5.1-1ubuntu1.16+esm1
2.5.1-1ubuntu1.16+esm3
2.5.1-1ubuntu1.16+esm4
2.5.1-1ubuntu1.16+esm5
2.5.1-1ubuntu1.16+esm6

Ecosystem specific

{
    "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro",
    "binaries": [
        {
            "binary_version": "2.5.1-1ubuntu1.16+esm7",
            "binary_name": "libruby2.5"
        },
        {
            "binary_version": "2.5.1-1ubuntu1.16+esm7",
            "binary_name": "ruby2.5"
        },
        {
            "binary_version": "2.5.1-1ubuntu1.16+esm7",
            "binary_name": "ruby2.5-dev"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-8137-1.json"
cves_map
{
    "cves": [
        {
            "severity": [
                {
                    "type": "CVSS_V4",
                    "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U"
                },
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                },
                {
                    "type": "Ubuntu",
                    "score": "low"
                }
            ],
            "id": "CVE-2025-61594"
        }
    ],
    "ecosystem": "Ubuntu:Pro:18.04:LTS"
}
Ubuntu:Pro:20.04:LTS
ruby2.7

Package

Name
ruby2.7
Purl
pkg:deb/ubuntu/ruby2.7@2.7.0-5ubuntu1.18+esm4?arch=source&distro=esm-infra/focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.7.0-5ubuntu1.18+esm4

Affected versions

2.*
2.7.0-1
2.7.0-2
2.7.0-3
2.7.0-4
2.7.0-4ubuntu1
2.7.0-5ubuntu1
2.7.0-5ubuntu1.1
2.7.0-5ubuntu1.2
2.7.0-5ubuntu1.3
2.7.0-5ubuntu1.4
2.7.0-5ubuntu1.5
2.7.0-5ubuntu1.6
2.7.0-5ubuntu1.7
2.7.0-5ubuntu1.8
2.7.0-5ubuntu1.9
2.7.0-5ubuntu1.10
2.7.0-5ubuntu1.11
2.7.0-5ubuntu1.12
2.7.0-5ubuntu1.13
2.7.0-5ubuntu1.14
2.7.0-5ubuntu1.15
2.7.0-5ubuntu1.16
2.7.0-5ubuntu1.17
2.7.0-5ubuntu1.18
2.7.0-5ubuntu1.18+esm1
2.7.0-5ubuntu1.18+esm3

Ecosystem specific

{
    "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro",
    "binaries": [
        {
            "binary_version": "2.7.0-5ubuntu1.18+esm4",
            "binary_name": "libruby2.7"
        },
        {
            "binary_version": "2.7.0-5ubuntu1.18+esm4",
            "binary_name": "ruby2.7"
        },
        {
            "binary_version": "2.7.0-5ubuntu1.18+esm4",
            "binary_name": "ruby2.7-dev"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-8137-1.json"
cves_map
{
    "cves": [
        {
            "severity": [
                {
                    "type": "CVSS_V4",
                    "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U"
                },
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                },
                {
                    "type": "Ubuntu",
                    "score": "low"
                }
            ],
            "id": "CVE-2025-61594"
        }
    ],
    "ecosystem": "Ubuntu:Pro:20.04:LTS"
}