CVE-2026-42245
net-imap: Quadratic complexity when reading response literals
CVSS Score
0.0
EPSS Score
0.1%
EPSS Percentile
19th
Net::IMAP implements Internet Message Access Protocol (IMAP) client functionality in Ruby. Prior to versions 0.4.24, 0.5.14, and 0.6.4, Net::IMAP::ResponseReader has quadratic time complexity when reading large responses containing many string literals. A hostile server can send responses which are crafted to exhaust the client's CPU for a denial of service attack. This issue has been patched in versions 0.4.24, 0.5.14, and 0.6.4.
| CWE | CWE-407 |
| Vendor | ruby |
| Product | net-imap |
| Ecosystems | |
| Industries | Technology |
| Published | May 9, 2026 |
| Last Updated | May 12, 2026 |
Stay Ahead of the Next One
Get instant alerts for ruby net-imap
Be the first to know when new unknown vulnerabilities affecting ruby net-imap are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
Affected Versions
ruby / net-imap
< 0.4.24 >= 0.5.0, < 0.5.14 >= 0.6.0, < 0.6.4
References
github.com: https://github.com/ruby/net-imap/security/advisories/GHSA-q2mw-fvj9-vvcw github.com: https://github.com/ruby/net-imap/commit/6091f7d6b1f3514cafbfe39c76f2b5d73de3ca96 github.com: https://github.com/ruby/net-imap/commit/88d95231fc8afef11c1f074453f7d75b68c9dfda github.com: https://github.com/ruby/net-imap/commit/de685f91a4a4cc75eb80da898c2bf8af08d34819 github.com: https://github.com/ruby/net-imap/releases/tag/v0.4.24 github.com: https://github.com/ruby/net-imap/releases/tag/v0.5.14 github.com: https://github.com/ruby/net-imap/releases/tag/v0.6.4