Source: ruby3.3
Version: 3.3.8-2
Severity: important
Tags: security upstream
X-Debbugs-Cc: [email protected], Debian Security Team <[email protected]>

Hi,

The following vulnerabilities were published for ruby3.3.

CVE-2026-42245[0]:
| Net::IMAP implements Internet Message Access Protocol (IMAP) client
| functionality in Ruby. Prior to versions 0.4.24, 0.5.14, and 0.6.4,
| Net::IMAP::ResponseReader has quadratic time complexity when reading
| large responses containing many string literals. A hostile server
| can send responses which are crafted to exhaust the client's CPU for
| a denial of service attack. This issue has been patched in versions
| 0.4.24, 0.5.14, and 0.6.4.


CVE-2026-42246[1]:
| Net::IMAP implements Internet Message Access Protocol (IMAP) client
| functionality in Ruby. Prior to versions 0.3.10, 0.4.24, 0.5.14, and
| 0.6.4, a man-in-the-middle attacker can cause Net::IMAP#starttls to
| return "successfully", without starting TLS. This issue has been
| patched in versions 0.3.10, 0.4.24, 0.5.14, and 0.6.4.


CVE-2026-42256[2]:
| Net::IMAP implements Internet Message Access Protocol (IMAP) client
| functionality in Ruby. From versions 0.4.0 to before 0.4.24, 0.5.0
| to before 0.5.14, and 0.6.0 to before 0.6.4, when authenticating a
| connection with SCRAM-SHA1 or SCRAM-SHA256, a hostile server can
| perform a computational denial-of-service attack on the client
| process by sending a big iteration count value. This issue has been
| patched in versions 0.4.24, 0.5.14, and 0.6.4.


CVE-2026-42257[3]:
| Net::IMAP implements Internet Message Access Protocol (IMAP) client
| functionality in Ruby. Prior to versions 0.4.24, 0.5.14, and 0.6.4,
| several Net::IMAP commands accept a raw string argument that is sent
| to the server without validation or escaping. If this string is
| derived from user-controlled input, it may contain contain CRLF
| sequences, which an attacker can use to inject arbitrary IMAP
| commands. This issue has been patched in versions 0.4.24, 0.5.14,
| and 0.6.4.


CVE-2026-42258[4]:
| Net::IMAP implements Internet Message Access Protocol (IMAP) client
| functionality in Ruby. Prior to versions 0.4.24, 0.5.14, and 0.6.4,
| symbol arguments to commands are vulnerable to a CRLF Injection /
| IMAP Command injection via Symbol arguments passed to IMAP commands.
| This issue has been patched in versions 0.4.24, 0.5.14, and 0.6.4.


If you fix the vulnerabilities please also make sure to include the
CVE (Common Vulnerabilities & Exposures) ids in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2026-42245
    https://www.cve.org/CVERecord?id=CVE-2026-42245
[1] https://security-tracker.debian.org/tracker/CVE-2026-42246
    https://www.cve.org/CVERecord?id=CVE-2026-42246
[2] https://security-tracker.debian.org/tracker/CVE-2026-42256
    https://www.cve.org/CVERecord?id=CVE-2026-42256
[3] https://security-tracker.debian.org/tracker/CVE-2026-42257
    https://www.cve.org/CVERecord?id=CVE-2026-42257
[4] https://security-tracker.debian.org/tracker/CVE-2026-42258
    https://www.cve.org/CVERecord?id=CVE-2026-42258

Regards,
Salvatore

Reply via email to