Debian Security Advisory
DLA-2330-1 jruby -- LTS security update
- Date Reported:
- 16 Aug 2020
- Affected Packages:
- jruby
- Vulnerable:
- Yes
- Security database references:
- In Mitre's CVE dictionary: CVE-2017-17742, CVE-2019-8320, CVE-2019-8321, CVE-2019-8322, CVE-2019-8323, CVE-2019-8324, CVE-2019-8325, CVE-2019-16201, CVE-2019-16254, CVE-2019-16255.
- More information:
-
Brief introduction
- CVE-2017-17742
Response Splitting attack in the HTTP server of WEBrick.
- CVE-2019-8320
Delete directory using symlink when decompressing tar.
- CVE-2019-8321
Escape sequence injection vulnerability in verbose.
- CVE-2019-8322
Escape sequence injection vulnerability in gem owner.
- CVE-2019-8323
Escape sequence injection vulnerability in API response handling.
- CVE-2019-8324
Installing a malicious gem may lead to arbitrary code execution.
- CVE-2019-8325
Escape sequence injection vulnerability in errors.
- CVE-2019-16201
Regular Expression Denial of Service vulnerability of WEBrick's Digest access authentication.
- CVE-2019-16254
HTTP Response Splitting attack in the HTTP server of WEBrick.
- CVE-2019-16255
Code injection vulnerability.
For Debian 9 stretch, these problems have been fixed in version 1.7.26-1+deb9u2.
We recommend that you upgrade your jruby packages.
For the detailed security status of jruby please refer to its security tracker page at: https://security-tracker.debian.org/tracker/jruby
Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS
- CVE-2017-17742