Debian 10223 Published by

A jruby security update has been released for Debian GNU/Linux 9 LTS to address several vulnerabilities.



DLA 2330-1: jruby security update



- -------------------------------------------------------------------------
Debian LTS Advisory DLA-2330-1 debian-lts@lists.debian.org
  https://www.debian.org/lts/security/
August 16, 2020   https://wiki.debian.org/LTS
- -------------------------------------------------------------------------

Package : jruby
Version : 1.7.26-1+deb9u2
CVE ID : CVE-2017-17742 CVE-2019-8320 CVE-2019-8321 CVE-2019-8322
CVE-2019-8323 CVE-2019-8324 CVE-2019-8325 CVE-2019-16201
CVE-2019-16254 CVE-2019-16255
Debian Bug : 925987

Several vulnerabilities were fixed in JRuby,
a 100% pure-Java implementation of Ruby.

CVE-2017-17742
CVE-2019-16254

HTTP Response Splitting attacks in the HTTP server of WEBrick.

CVE-2019-16201

Regular Expression Denial of Service vulnerability of WEBrick's
Digest access authentication.

CVE-2019-8320

Delete directory using symlink when decompressing tar.

CVE-2019-8321

Escape sequence injection vulnerability in verbose.

CVE-2019-8322

Escape sequence injection vulnerability in gem owner.

CVE-2019-8323

Escape sequence injection vulnerability in API response handling.

CVE-2019-8324

Installing a malicious gem may lead to arbitrary code execution.

CVE-2019-8325

Escape sequence injection vulnerability in errors.

CVE-2019-16255

Code injection vulnerability of Shell#[] and Shell#test.

For Debian 9 stretch, these problems have been fixed in version
1.7.26-1+deb9u2.

We recommend that you upgrade your jruby packages.

For the detailed security status of jruby please refer to
its security tracker page at:
  https://security-tracker.debian.org/tracker/jruby

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at:   https://wiki.debian.org/LTS