[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[SECURITY] [DLA 1337-1] jruby security update

Package        : jruby
Version        : 1.5.6-5+deb7u1
CVE ID         : CVE-2018-1000075 CVE-2018-1000076 CVE-2018-1000077 CVE-2018-1000078

Multiple vulnerabilities were found in the rubygems package management
framework, embedded in JRuby, a pure-Java implementation of the Ruby
programming language.  


    A negative size vulnerability in ruby gem package tar header that could
    cause an infinite loop.


    Ruby gems package improperly verifies cryptographic signatures. A mis-signed
    gem could be installed if the tarball contains multiple gem signatures.


    An improper input validation vulnerability in ruby gems specification
    homepage attribute could allow malicious gem to set an invalid homepage


    Cross Site Scripting (XSS) vulnerability in gem server display of homepage

For Debian 7 "Wheezy", these problems have been fixed in version

We recommend that you upgrade your jruby packages.

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS

Attachment: signature.asc
Description: PGP signature

Reply to: