DEBIAN-CVE-2020-10663

Source
https://security-tracker.debian.org/tracker/CVE-2020-10663
Import Source
https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2020-10663.json
JSON Data
https://api.osv.dev/v1/vulns/DEBIAN-CVE-2020-10663
Upstream
Published
2020-04-28T21:15:11Z
Modified
2025-09-25T02:07:20.528964Z
Summary
[none]
Details

The JSON gem through 2.2.0 for Ruby, as used in Ruby 2.4 through 2.4.9, 2.5 through 2.5.7, and 2.6 through 2.6.5, has an Unsafe Object Creation Vulnerability. This is quite similar to CVE-2013-0269, but does not rely on poor garbage-collection behavior within Ruby. Specifically, use of JSON parsing methods can lead to creation of a malicious object within the interpreter, with adverse effects that are application-dependent.

References

Affected packages

Debian:11 / ruby-json

Package

Name
ruby-json
Purl
pkg:deb/debian/ruby-json?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.3.0+dfsg-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:12 / ruby-json

Package

Name
ruby-json
Purl
pkg:deb/debian/ruby-json?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.3.0+dfsg-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13 / ruby-json

Package

Name
ruby-json
Purl
pkg:deb/debian/ruby-json?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.3.0+dfsg-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:14 / ruby-json

Package

Name
ruby-json
Purl
pkg:deb/debian/ruby-json?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.3.0+dfsg-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}