Debian Package Tracker
Register | Log in
Subscribe

ruby3.3

Interpreter of object-oriented scripting language Ruby

Choose email to subscribe with

general
  • source: ruby3.3 (main)
  • version: 3.3.8-2
  • maintainer: Debian Ruby Team (archive) (DMD)
  • uploaders: Lucas Kanashiro [DMD] – Antonio Terceiro [DMD] – Utkarsh Gupta [DMD]
  • arch: all any
  • std-ver: 4.7.0
  • VCS: Git (Browse, QA)
versions [more versions can be listed by madison] [old versions available from snapshot.debian.org]
[pool directory]
  • stable: 3.3.8-2
  • testing: 3.3.8-2
  • unstable: 3.3.8-2
versioned links
  • 3.3.8-2: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
binaries
  • libruby3.3 (1 bugs: 0, 1, 0, 0)
  • ruby3.3 (4 bugs: 0, 2, 2, 0)
  • ruby3.3-dev
  • ruby3.3-doc
action needed
A new upstream version is available: 3.3.10 high
A new upstream version 3.3.10 is available, you should consider packaging it.
Created: 2025-11-26 Last update: 2026-02-13 11:04
4 security issues in sid high

There are 4 open security issues in sid.

4 important issues:
  • CVE-2025-24294: The attack vector is a potential Denial of Service (DoS). The vulnerability is caused by an insufficient check on the length of a decompressed domain name within a DNS packet. An attacker can craft a malicious DNS packet containing a highly compressed domain name. When the resolv library parses such a packet, the name decompression process consumes a large amount of CPU resources, as the library does not limit the resulting length of the name. This resource consumption can cause the application thread to become unresponsive, resulting in a Denial of Service condition.
  • CVE-2025-43857: Net::IMAP implements Internet Message Access Protocol (IMAP) client functionality in Ruby. Prior to versions 0.5.7, 0.4.20, 0.3.9, and 0.2.5, there is a possibility for denial of service by memory exhaustion when net-imap reads server responses. At any time while the client is connected, a malicious server can send can send a "literal" byte count, which is automatically read by the client's receiver thread. The response reader immediately allocates memory for the number of bytes indicated by the server response. This should not be an issue when securely connecting to trusted IMAP servers that are well-behaved. It can affect insecure connections and buggy, untrusted, or compromised servers (for example, connecting to a user supplied hostname). This issue has been patched in versions 0.5.7, 0.4.20, 0.3.9, and 0.2.5.
  • CVE-2025-58767: REXML is an XML toolkit for Ruby. The REXML gems from 3.3.3 to 3.4.1 has a DoS vulnerability when parsing XML containing multiple XML declarations. If you need to parse untrusted XMLs, you may be impacted to these vulnerabilities. The REXML gem 3.4.2 or later include the patches to fix these vulnerabilities.
  • CVE-2025-61594: URI is a module providing classes to handle Uniform Resource Identifiers. In versions prior to 0.12.5, 0.13.3, and 1.0.4, a bypass exists for the fix to CVE-2025-27221 that can expose user credentials. When using the `+` operator to combine URIs, sensitive information like passwords from the original URI can be leaked, violating RFC3986 and making applications vulnerable to credential exposure. Versions 0.12.5, 0.13.3, and 1.0.4 fix the issue.
Created: 2025-05-01 Last update: 2026-02-10 15:30
4 security issues in forky high

There are 4 open security issues in forky.

4 important issues:
  • CVE-2025-24294: The attack vector is a potential Denial of Service (DoS). The vulnerability is caused by an insufficient check on the length of a decompressed domain name within a DNS packet. An attacker can craft a malicious DNS packet containing a highly compressed domain name. When the resolv library parses such a packet, the name decompression process consumes a large amount of CPU resources, as the library does not limit the resulting length of the name. This resource consumption can cause the application thread to become unresponsive, resulting in a Denial of Service condition.
  • CVE-2025-43857: Net::IMAP implements Internet Message Access Protocol (IMAP) client functionality in Ruby. Prior to versions 0.5.7, 0.4.20, 0.3.9, and 0.2.5, there is a possibility for denial of service by memory exhaustion when net-imap reads server responses. At any time while the client is connected, a malicious server can send can send a "literal" byte count, which is automatically read by the client's receiver thread. The response reader immediately allocates memory for the number of bytes indicated by the server response. This should not be an issue when securely connecting to trusted IMAP servers that are well-behaved. It can affect insecure connections and buggy, untrusted, or compromised servers (for example, connecting to a user supplied hostname). This issue has been patched in versions 0.5.7, 0.4.20, 0.3.9, and 0.2.5.
  • CVE-2025-58767: REXML is an XML toolkit for Ruby. The REXML gems from 3.3.3 to 3.4.1 has a DoS vulnerability when parsing XML containing multiple XML declarations. If you need to parse untrusted XMLs, you may be impacted to these vulnerabilities. The REXML gem 3.4.2 or later include the patches to fix these vulnerabilities.
  • CVE-2025-61594: URI is a module providing classes to handle Uniform Resource Identifiers. In versions prior to 0.12.5, 0.13.3, and 1.0.4, a bypass exists for the fix to CVE-2025-27221 that can expose user credentials. When using the `+` operator to combine URIs, sensitive information like passwords from the original URI can be leaked, violating RFC3986 and making applications vulnerable to credential exposure. Versions 0.12.5, 0.13.3, and 1.0.4 fix the issue.
Created: 2025-08-09 Last update: 2026-02-10 15:30
The VCS repository is not up to date, push the missing commits. high
vcswatch reports that the current version of the package is not in its VCS.
Either you need to push your commits and/or your tags, or the information about the package's VCS are out of date. A common cause of the latter issue when using the Git VCS is not specifying the correct branch when the packaging is not in the default one (remote HEAD branch), which is usually "master" but can be modified in salsa.debian.org in the project's general settings with the "Default Branch" field). Alternatively the Vcs-Git field in debian/control can contain a "-b <branch-name>" suffix to indicate what branch is used for the Debian packaging.
Created: 2025-04-24 Last update: 2026-02-06 14:33
lintian reports 4 errors and 24 warnings high
Lintian reports 4 errors and 24 warnings about this package. You should make the package lintian clean getting rid of them.
Created: 2025-04-11 Last update: 2026-01-20 18:01
4 bugs tagged patch in the BTS normal
The BTS contains patches fixing 4 bugs, consider including or untagging them.
Created: 2025-02-01 Last update: 2026-02-13 12:03
Fails to build during reproducibility testing normal
A package building reproducibly enables third parties to verify that the source matches the distributed binaries. It has been identified that this source package produced different results, failed to build or had other issues in a test environment. Please read about how to improve the situation!
Created: 2025-12-26 Last update: 2026-02-13 11:36
Depends on packages which need a new maintainer normal
The packages that ruby3.3 depends on which need a new maintainer are:
  • systemtap (#1114760)
    • Build-Depends: systemtap-sdt-dev
Created: 2025-09-09 Last update: 2026-02-13 09:30
3 open merge requests in Salsa normal
There are 3 open merge requests for this package on Salsa. You should consider reviewing and/or merging these merge requests.
Created: 2025-08-19 Last update: 2025-08-19 06:28
4 low-priority security issues in trixie low

There are 4 open security issues in trixie.

4 issues left for the package maintainer to handle:
  • CVE-2025-24294: (needs triaging) The attack vector is a potential Denial of Service (DoS). The vulnerability is caused by an insufficient check on the length of a decompressed domain name within a DNS packet. An attacker can craft a malicious DNS packet containing a highly compressed domain name. When the resolv library parses such a packet, the name decompression process consumes a large amount of CPU resources, as the library does not limit the resulting length of the name. This resource consumption can cause the application thread to become unresponsive, resulting in a Denial of Service condition.
  • CVE-2025-43857: (needs triaging) Net::IMAP implements Internet Message Access Protocol (IMAP) client functionality in Ruby. Prior to versions 0.5.7, 0.4.20, 0.3.9, and 0.2.5, there is a possibility for denial of service by memory exhaustion when net-imap reads server responses. At any time while the client is connected, a malicious server can send can send a "literal" byte count, which is automatically read by the client's receiver thread. The response reader immediately allocates memory for the number of bytes indicated by the server response. This should not be an issue when securely connecting to trusted IMAP servers that are well-behaved. It can affect insecure connections and buggy, untrusted, or compromised servers (for example, connecting to a user supplied hostname). This issue has been patched in versions 0.5.7, 0.4.20, 0.3.9, and 0.2.5.
  • CVE-2025-58767: (needs triaging) REXML is an XML toolkit for Ruby. The REXML gems from 3.3.3 to 3.4.1 has a DoS vulnerability when parsing XML containing multiple XML declarations. If you need to parse untrusted XMLs, you may be impacted to these vulnerabilities. The REXML gem 3.4.2 or later include the patches to fix these vulnerabilities.
  • CVE-2025-61594: (needs triaging) URI is a module providing classes to handle Uniform Resource Identifiers. In versions prior to 0.12.5, 0.13.3, and 1.0.4, a bypass exists for the fix to CVE-2025-27221 that can expose user credentials. When using the `+` operator to combine URIs, sensitive information like passwords from the original URI can be leaked, violating RFC3986 and making applications vulnerable to credential exposure. Versions 0.12.5, 0.13.3, and 1.0.4 fix the issue.

You can find information about how to handle these issues in the security team's documentation.

Created: 2025-05-01 Last update: 2026-02-10 15:30
debian/patches: 16 patches to forward upstream low

Among the 17 debian patches available in version 3.3.8-2 of the package, we noticed the following issues:

  • 16 patches where the metadata indicates that the patch has not yet been forwarded upstream. You should either forward the patch upstream or update the metadata to document its real status.
Created: 2024-05-30 Last update: 2025-05-01 06:32
Standards version of the package is outdated. wishlist
The package should be updated to follow the last version of Debian Policy (Standards-Version 4.7.3 instead of 4.7.0).
Created: 2025-02-21 Last update: 2025-12-23 20:00
news
[rss feed]
  • [2025-05-11] ruby3.3 3.3.8-2 MIGRATED to testing (Debian testing watch)
  • [2025-04-30] Accepted ruby3.3 3.3.8-2 (source) into unstable (Lucas Kanashiro)
  • [2025-04-26] ruby3.3 3.3.8-1 MIGRATED to testing (Debian testing watch)
  • [2025-04-10] Accepted ruby3.3 3.3.8-1 (source) into unstable (Lucas Kanashiro)
  • [2025-04-10] Accepted ruby3.3 3.3.7-2 (source) into unstable (Lucas Kanashiro)
  • [2025-02-02] ruby3.3 3.3.7-1 MIGRATED to testing (Debian testing watch)
  • [2025-01-30] Accepted ruby3.3 3.3.7-1 (source) into unstable (Lucas Kanashiro)
  • [2025-01-17] ruby3.3 3.3.6-1.1 MIGRATED to testing (Debian testing watch)
  • [2025-01-13] Accepted ruby3.3 3.3.6-1.1 (source) into unstable (Sebastian Andrzej Siewior)
  • [2024-12-30] ruby3.3 3.3.6-1 MIGRATED to testing (Debian testing watch)
  • [2024-12-27] Accepted ruby3.3 3.3.6-1 (source) into unstable (Lucas Kanashiro)
  • [2024-09-20] ruby3.3 3.3.5-2 MIGRATED to testing (Debian testing watch)
  • [2024-09-08] Accepted ruby3.3 3.3.5-2 (source) into unstable (Antonio Terceiro)
  • [2024-09-08] Accepted ruby3.3 3.3.5-1 (source) into unstable (Antonio Terceiro)
  • [2024-07-13] ruby3.3 3.3.4-2 MIGRATED to testing (Debian testing watch)
  • [2024-07-10] Accepted ruby3.3 3.3.4-2 (source) into unstable (Lucas Kanashiro)
  • [2024-07-09] Accepted ruby3.3 3.3.4-1 (source) into unstable (Lucas Kanashiro)
  • [2024-07-08] ruby3.3 3.3.1-6 MIGRATED to testing (Debian testing watch)
  • [2024-07-06] Accepted ruby3.3 3.3.1-6 (source) into unstable (Lucas Kanashiro)
  • [2024-07-03] Accepted ruby3.3 3.3.1-5 (source) into unstable (Lucas Kanashiro)
  • [2024-06-28] Accepted ruby3.3 3.3.1-4 (source) into unstable (Lucas Kanashiro)
  • [2024-06-12] Accepted ruby3.3 3.3.1-3 (source) into unstable (Lucas Kanashiro)
  • [2024-06-11] Accepted ruby3.3 3.3.1-2 (source) into unstable (Lucas Kanashiro)
  • [2024-05-29] Accepted ruby3.3 3.3.1-1 (source amd64 all) into unstable (Debian FTP Masters) (signed by: Lucas Kanashiro)
bugs [bug history graph]
  • all: 12
  • RC: 2
  • I&N: 7
  • M&W: 2
  • F&P: 1
  • patch: 4
links
  • homepage
  • lintian (4, 24)
  • buildd: logs, reproducibility, cross
  • popcon
  • browse source code
  • edit tags
  • other distros
  • security tracker
  • screenshots
  • debian patches
  • debci
ubuntu Ubuntu logo [Information about Ubuntu for Debian Developers]
  • version: 3.3.8-2ubuntu2
  • 1 bug
  • patches for 3.3.8-2ubuntu2

Debian Package Tracker — Copyright 2013-2025 The Distro Tracker Developers
Report problems to the tracker.debian.org pseudo-package in the Debian BTS.
Documentation — Bugs — Git Repository — Contributing