vulnerability
Amazon Linux 2023: CVE-2023-28755: Important priority package update for ruby3.2
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 5 | (AV:N/AC:L/Au:N/C:N/I:N/A:P) | Mar 21, 2023 | Feb 17, 2025 | Jul 9, 2025 |
Severity
5
CVSS
(AV:N/AC:L/Au:N/C:N/I:N/A:P)
Published
Mar 21, 2023
Added
Feb 17, 2025
Modified
Jul 9, 2025
Description
A ReDoS issue was discovered in the URI component through 0.12.0 in Ruby through 3.2.1. The URI parser mishandles invalid URLs that have specific characters. It causes an increase in execution time for parsing strings to URI objects. The fixed versions are 0.12.1, 0.11.1, 0.10.2 and 0.10.0.1.
A flaw was found in the rubygem URI. The URI parser mishandles invalid URLs that have specific characters, which causes an increase in execution time parsing strings to URI objects. This may result in a regular expression denial of service (ReDoS).
A flaw was found in the rubygem URI. The URI parser mishandles invalid URLs that have specific characters, which causes an increase in execution time parsing strings to URI objects. This may result in a regular expression denial of service (ReDoS).
Solutions
amazon-linux-2023-upgrade-ruby3-2amazon-linux-2023-upgrade-ruby3-2-bundled-gemsamazon-linux-2023-upgrade-ruby3-2-bundled-gems-debuginfoamazon-linux-2023-upgrade-ruby3-2-debuginfoamazon-linux-2023-upgrade-ruby3-2-debugsourceamazon-linux-2023-upgrade-ruby3-2-default-gemsamazon-linux-2023-upgrade-ruby3-2-develamazon-linux-2023-upgrade-ruby3-2-docamazon-linux-2023-upgrade-ruby3-2-libsamazon-linux-2023-upgrade-ruby3-2-libs-debuginfoamazon-linux-2023-upgrade-ruby3-2-rubygem-bigdecimalamazon-linux-2023-upgrade-ruby3-2-rubygem-bigdecimal-debuginfoamazon-linux-2023-upgrade-ruby3-2-rubygem-bundleramazon-linux-2023-upgrade-ruby3-2-rubygem-io-consoleamazon-linux-2023-upgrade-ruby3-2-rubygem-io-console-debuginfoamazon-linux-2023-upgrade-ruby3-2-rubygem-irbamazon-linux-2023-upgrade-ruby3-2-rubygem-jsonamazon-linux-2023-upgrade-ruby3-2-rubygem-json-debuginfoamazon-linux-2023-upgrade-ruby3-2-rubygem-minitestamazon-linux-2023-upgrade-ruby3-2-rubygem-power-assertamazon-linux-2023-upgrade-ruby3-2-rubygem-psychamazon-linux-2023-upgrade-ruby3-2-rubygem-psych-debuginfoamazon-linux-2023-upgrade-ruby3-2-rubygem-rakeamazon-linux-2023-upgrade-ruby3-2-rubygem-rbsamazon-linux-2023-upgrade-ruby3-2-rubygem-rbs-debuginfoamazon-linux-2023-upgrade-ruby3-2-rubygem-rdocamazon-linux-2023-upgrade-ruby3-2-rubygem-rexmlamazon-linux-2023-upgrade-ruby3-2-rubygem-rssamazon-linux-2023-upgrade-ruby3-2-rubygemsamazon-linux-2023-upgrade-ruby3-2-rubygems-develamazon-linux-2023-upgrade-ruby3-2-rubygem-test-unitamazon-linux-2023-upgrade-ruby3-2-rubygem-typeprof
Rapid7 Labs
2026 Global Threat Landscape Report
The predictive window has collapsed. Exploitation follows disclosure in days. See how attackers are accelerating and how to stay ahead.