Debian Security Advisory
DLA-1337-1 jruby -- LTS security update
- Date Reported:
- 02 Apr 2018
- Affected Packages:
- Security database references:
- In Mitre's CVE dictionary: CVE-2018-1000075, CVE-2018-1000076, CVE-2018-1000077, CVE-201.
- More information:
Multiple vulnerabilities were found in the rubygems package management framework, embedded in JRuby, a pure-Java implementation of the Ruby programming language.
A negative size vulnerability in ruby gem package tar header that could cause an infinite loop.
Ruby gems package improperly verifies cryptographic signatures. A mis-signed gem could be installed if the tarball contains multiple gem signatures.
An improper input validation vulnerability in ruby gems specification homepage attribute could allow malicious gem to set an invalid homepage URL.
Cross Site Scripting (XSS) vulnerability in gem server display of homepage attribute
For Debian 7
Wheezy, these problems have been fixed in version 1.5.6-5+deb7u1.
We recommend that you upgrade your jruby packages.
Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS