First published: Mon Apr 07 2025(Updated: )
It was discovered that Ruby incorrectly handled parsing of an XML document that has specific XML characters in an attribute value using REXML gem. An attacker could use this issue to cause Ruby to crash, resulting in a denial of service. This issue only affected in Ubuntu 22.04 LTS, Ubuntu 24.04 LTS, and Ubuntu 24.10. (CVE-2024-35176, CVE-2024-39908, CVE-2024-41123, CVE-2024-43398) It was discovered that Ruby incorrectly handled expanding ranges in the net-imap response parser. If a user or automated system were tricked into connecting to a malicious IMAP server, a remote attacker could possibly use this issue to consume memory, leading to a denial of service. This issue only affected Ubuntu 24.04 LTS, and Ubuntu 24.10. (CVE-2025-25186) It was discovered that the Ruby CGI gem incorrectly handled parsing certain cookies. A remote attacker could possibly use this issue to consume resources, leading to a denial of service. (CVE-2025-27219) It was discovered that the Ruby CGI gem incorrectly handled parsing certain regular expressions. A remote attacker could possibly use this issue to consume resources, leading to a denial of service. (CVE-2025-27220) It was discovered that the Ruby URI gem incorrectly handled certain URI handling methods. A remote attacker could possibly use this issue to leak authentication credentials. (CVE-2025-27221)
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/libruby3.3 | <3.3.4-2ubuntu5.2 | 3.3.4-2ubuntu5.2 |
Ubuntu | =24.10 | |
All of | ||
ubuntu/ruby3.3 | <3.3.4-2ubuntu5.2 | 3.3.4-2ubuntu5.2 |
Ubuntu | =24.10 | |
All of | ||
ubuntu/libruby3.2 | <3.2.3-1ubuntu0.24.04.5 | 3.2.3-1ubuntu0.24.04.5 |
Ubuntu | =24.04 | |
All of | ||
ubuntu/ruby3.2 | <3.2.3-1ubuntu0.24.04.5 | 3.2.3-1ubuntu0.24.04.5 |
Ubuntu | =24.04 | |
All of | ||
ubuntu/libruby3.0 | <3.0.2-7ubuntu2.10 | 3.0.2-7ubuntu2.10 |
Ubuntu | =22.04 | |
All of | ||
ubuntu/ruby3.0 | <3.0.2-7ubuntu2.10 | 3.0.2-7ubuntu2.10 |
Ubuntu | =22.04 | |
All of | ||
ubuntu/libruby2.7 | <2.7.0-5ubuntu1.18 | 2.7.0-5ubuntu1.18 |
Ubuntu | =20.04 | |
All of | ||
ubuntu/ruby2.7 | <2.7.0-5ubuntu1.18 | 2.7.0-5ubuntu1.18 |
Ubuntu | =20.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Contains the following vulnerabilities)
The severity of USN-7418-1 is classified as high due to the potential for denial of service.
To fix USN-7418-1, update the Ruby packages to the recommended versions provided in the advisory.
USN-7418-1 affects several Ruby versions, including 3.3.4, 3.2.3, 3.0.2, and 2.7.0 on various Ubuntu distributions.
Yes, USN-7418-1 can be exploited by attackers to cause Ruby to crash, leading to service interruptions.
USN-7418-1 impacts Ubuntu 20.04, 22.04, and 24.04 LTS releases.