Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.1.1.2.2023.3408
Category:Debian Local Security Checks
Title:Debian: Security Advisory (DLA-3408-1)
Summary:The remote host is missing an update for the Debian 'jruby' package(s) announced via the DLA-3408-1 advisory.
Description:Summary:
The remote host is missing an update for the Debian 'jruby' package(s) announced via the DLA-3408-1 advisory.

Vulnerability Insight:
Several vulnerabilities were fixed in JRuby, a Java implementation of the Ruby programming language.

CVE-2017-17742

CVE-2019-16254

HTTP Response Splitting attacks in the HTTP server of WEBrick.

CVE-2019-16201

Regular Expression Denial of Service vulnerability of WEBrick's Digest access authentication.

CVE-2019-16255

Code injection vulnerability.

CVE-2020-25613

HTTP Request Smuggling attack in WEBrick.

CVE-2021-31810

Trusting FTP PASV responses vulnerability in Net::FTP.

CVE-2021-32066

Net::IMAP did not raise an exception when StartTLS fails with an an unknown response.

CVE-2023-28755

Quadratic backtracking on invalid URI.

CVE-2023-28756

The Time parser mishandled invalid strings that have specific characters.

For Debian 10 buster, these problems have been fixed in version 9.1.17.0-3+deb10u1.

We recommend that you upgrade your jruby packages.

For the detailed security status of jruby please refer to its security tracker page at: [link moved to references]

Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: [link moved to references]

Affected Software/OS:
'jruby' package(s) on Debian 10.

Solution:
Please install the updated package(s).

CVSS Score:
7.8

CVSS Vector:
AV:N/AC:L/Au:N/C:N/I:N/A:C

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2017-17742
BugTraq ID: 103684
http://www.securityfocus.com/bid/103684
Debian Security Information: DSA-4259 (Google Search)
https://www.debian.org/security/2018/dsa-4259
https://lists.debian.org/debian-lts-announce/2018/04/msg00023.html
https://lists.debian.org/debian-lts-announce/2018/04/msg00024.html
https://lists.debian.org/debian-lts-announce/2018/07/msg00012.html
https://lists.debian.org/debian-lts-announce/2019/12/msg00009.html
https://lists.debian.org/debian-lts-announce/2020/08/msg00027.html
https://lists.debian.org/debian-lts-announce/2023/04/msg00033.html
RedHat Security Advisories: RHSA-2018:3729
https://access.redhat.com/errata/RHSA-2018:3729
RedHat Security Advisories: RHSA-2018:3730
https://access.redhat.com/errata/RHSA-2018:3730
RedHat Security Advisories: RHSA-2018:3731
https://access.redhat.com/errata/RHSA-2018:3731
RedHat Security Advisories: RHSA-2019:2028
https://access.redhat.com/errata/RHSA-2019:2028
http://www.securitytracker.com/id/1042004
SuSE Security Announcement: openSUSE-SU-2019:1771 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00036.html
https://usn.ubuntu.com/3685-1/
Common Vulnerability Exposure (CVE) ID: CVE-2019-16201
Bugtraq: 20191217 [SECURITY] [DSA 4586-1] ruby2.5 security update (Google Search)
https://seclists.org/bugtraq/2019/Dec/32
Bugtraq: 20191217 [SECURITY] [DSA 4587-1] ruby2.3 security update (Google Search)
https://seclists.org/bugtraq/2019/Dec/31
Debian Security Information: DSA-4587 (Google Search)
https://www.debian.org/security/2019/dsa-4587
https://security.gentoo.org/glsa/202003-06
https://hackerone.com/reports/661722
https://lists.debian.org/debian-lts-announce/2019/11/msg00025.html
https://www.oracle.com/security-alerts/cpujan2020.html
SuSE Security Announcement: openSUSE-SU-2020:0395 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00041.html
Common Vulnerability Exposure (CVE) ID: CVE-2019-16254
Debian Security Information: DSA-4586 (Google Search)
https://www.debian.org/security/2019/dsa-4586
https://hackerone.com/reports/331984
Common Vulnerability Exposure (CVE) ID: CVE-2019-16255
https://hackerone.com/reports/327512
Common Vulnerability Exposure (CVE) ID: CVE-2020-25613
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PFP3E7KXXT3H3KA6CBZPUOGA5VPFARRJ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YTZURYROG3FFED3TYCQOBV66BS4K6WOV/
https://security.gentoo.org/glsa/202401-27
https://hackerone.com/reports/965267
Common Vulnerability Exposure (CVE) ID: CVE-2021-31810
https://security.netapp.com/advisory/ntap-20210917-0001/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MWXHK5UUHVSHF7HTHMX6JY3WXDVNIHSL/
https://hackerone.com/reports/1145454
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.ruby-lang.org/en/news/2021/07/07/trusting-pasv-responses-in-net-ftp/
https://lists.debian.org/debian-lts-announce/2021/10/msg00009.html
Common Vulnerability Exposure (CVE) ID: CVE-2021-32066
https://github.com/ruby/ruby/commit/a21a3b7d23704a01d34bd79d09dc37897e00922a
https://security.netapp.com/advisory/ntap-20210902-0004/
https://www.ruby-lang.org/en/news/2021/07/07/starttls-stripping-in-net-imap/
https://hackerone.com/reports/1178562
Common Vulnerability Exposure (CVE) ID: CVE-2023-28755
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FFZANOQA4RYX7XCB42OO3P24DQKWHEKA/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WMIOPLBAAM3FEQNAXA2L7BDKOGSVUT5Z/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/G76GZG3RAGYF4P75YY7J7TGYAU7Z5E2T/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QA6XUKUY7B5OLNQBLHOT43UW7C5NIOQQ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/27LUWREIFTP3MQAW7QE4PJM4DPAQJWXF/
https://github.com/ruby/uri/releases/
https://www.ruby-lang.org/en/downloads/releases/
https://www.ruby-lang.org/en/news/2022/12/25/ruby-3-2-0-released/
Common Vulnerability Exposure (CVE) ID: CVE-2023-28756
https://github.com/ruby/time/releases/
CopyrightCopyright (C) 2023 Greenbone AG

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.