Debian Security Advisory

DLA-2330-1 jruby -- LTS security update

Date Reported:
16 Aug 2020
Affected Packages:
jruby
Vulnerable:
Yes
Security database references:
In Mitre's CVE dictionary: CVE-2017-17742, CVE-2019-8320, CVE-2019-8321, CVE-2019-8322, CVE-2019-8323, CVE-2019-8324, CVE-2019-8325, CVE-2019-16201, CVE-2019-16254, CVE-2019-16255.
More information:

Brief introduction

  • CVE-2017-17742

    Response Splitting attack in the HTTP server of WEBrick.

  • CVE-2019-8320

    Delete directory using symlink when decompressing tar.

  • CVE-2019-8321

    Escape sequence injection vulnerability in verbose.

  • CVE-2019-8322

    Escape sequence injection vulnerability in gem owner.

  • CVE-2019-8323

    Escape sequence injection vulnerability in API response handling.

  • CVE-2019-8324

    Installing a malicious gem may lead to arbitrary code execution.

  • CVE-2019-8325

    Escape sequence injection vulnerability in errors.

  • CVE-2019-16201

    Regular Expression Denial of Service vulnerability of WEBrick's Digest access authentication.

  • CVE-2019-16254

    HTTP Response Splitting attack in the HTTP server of WEBrick.

  • CVE-2019-16255

    Code injection vulnerability.

For Debian 9 stretch, these problems have been fixed in version 1.7.26-1+deb9u2.

We recommend that you upgrade your jruby packages.

For the detailed security status of jruby please refer to its security tracker page at: https://security-tracker.debian.org/tracker/jruby

Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS