CVE-2026-33210

NameCVE-2026-33210
DescriptionRuby JSON is a JSON implementation for Ruby. From version 2.14.0 to before versions 2.15.2.1, 2.17.1.2, and 2.19.2, a format string injection vulnerability can lead to denial of service attacks or information disclosure, when the allow_duplicate_key: false parsing option is used to parse user supplied documents. This issue has been patched in versions 2.15.2.1, 2.17.1.2, and 2.19.2.
SourceCVE (at NVD; CERT, ENISA, LWN, oss-sec, fulldisc, Debian ELTS, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
Debian Bugs1131463

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
ruby-json (PTS)bullseye2.3.0+dfsg-1fixed
bookworm2.6.3+dfsg-1fixed
trixie2.9.1+dfsg-1fixed
forky, sid2.19.1+dfsg-1vulnerable

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
ruby-jsonsourcebullseye(not affected)
ruby-jsonsourcebookworm(not affected)
ruby-jsonsourcetrixie(not affected)
ruby-jsonsource(unstable)(unfixed)1131463

Notes

[trixie] - ruby-json <not-affected> (Vulnerable code not present)
[bookworm] - ruby-json <not-affected> (Vulnerable code not present)
[bullseye] - ruby-json <not-affected> (Vulnerable code not present)
https://github.com/ruby/json/security/advisories/GHSA-3m6g-2423-7cp3
Introduced with: https://github.com/ruby/json/commit/8454149d034ab7e8d1c176bfb0cddd3842088981 (v2.14.0)
Fixed by: https://github.com/ruby/json/commit/393b41c3e5f87491e1e34fa59fa78ff6fa179a74 (v2.19.2)

Search for package or bug name: Reporting problems