CVE-2025-0306

NameCVE-2025-0306
DescriptionA vulnerability was found in Ruby. The Ruby interpreter is vulnerable to the Marvin Attack. This attack allows the attacker to decrypt previously encrypted messages or forge signatures by exchanging a large number of messages with the vulnerable service.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
ruby2.7 (PTS)bullseye2.7.4-1+deb11u1vulnerable
bullseye (security)2.7.4-1+deb11u3vulnerable
ruby3.1 (PTS)bookworm, bookworm (security)3.1.2-7+deb12u1vulnerable
sid, trixie3.1.2-8.5fixed
ruby3.2 (PTS)sid3.2.3-1vulnerable
ruby3.3 (PTS)sid, trixie3.3.6-1.1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
ruby2.7source(unstable)(unfixed)
ruby3.1source(unstable)3.1.2-8.4
ruby3.2source(unstable)(unfixed)
ruby3.3source(unstable)(not affected)

Notes

- ruby3.3 <not-affected> (All versions of Ruby 3.3 used OpenSSL 3.2 since initial upload)
[bookworm] - ruby3.1 <ignored> (Minor issue and requires OpenSSL 3.2, which is not in Bookworm)
[bullseye] - ruby2.7 <ignored> (Minor issue and requires OpenSSL 3.2 or backport of implicit rejection, which is not in Bullseye)
First upload of OpenSSL 3.2 to unstable was 3.2.1-3 on 04 Apr 2024
https://bugzilla.redhat.com/show_bug.cgi?id=2336100
https://people.redhat.com/~hkario/marvin/
Using OpenSSL/3.2.0 or later does not guarantee to mitigate the issue in all
cases, but at least when using the default provider. It will be always up to
the application to properly defend against this attack vector.

Search for package or bug name: Reporting problems