Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:deb/debian/jruby@0?distro=trixie
purl pkg:deb/debian/jruby@0?distro=trixie
Vulnerabilities affecting this package (0)
Vulnerability Summary Fixed by
This package is not known to be affected by vulnerabilities.
Vulnerabilities fixed by this package (3)
Vulnerability Summary Aliases
VCID-5fqj-uwnz-93af Multiple vulnerabilities have been found in Ruby, the worst of which could lead to the remote execution of arbitrary code. CVE-2019-15845
VCID-ajtx-8w3u-rkae URI gem has ReDoS vulnerability A ReDoS issue was discovered in the URI component before 0.12.2 for Ruby. The URI parser mishandles invalid URLs that have specific characters. There is an increase in execution time for parsing strings to URI objects with `rfc2396_parser.rb` and `rfc3986_parser.rb`. NOTE: this issue exists becuse of an incomplete fix for CVE-2023-28755. Version 0.10.3 is also a fixed version. [The Ruby advisory recommends](https://www.ruby-lang.org/en/news/2023/06/29/redos-in-uri-CVE-2023-36617/) updating the uri gem to 0.12.2. In order to ensure compatibility with the bundled version in older Ruby series, you may update as follows instead: - For Ruby 3.0: Update to uri 0.10.3 - For Ruby 3.1 and 3.2: Update to uri 0.12.2. You can use gem update uri to update it. If you are using bundler, please add gem `uri`, `>= 0.12.2` (or other version mentioned above) to your Gemfile. CVE-2023-36617
GHSA-hww2-5g85-429m
VCID-zb9m-getz-3keh Improper Input Validation RubyGems does not validate the hostname when fetching gems or making API requests, which allows remote attackers to redirect requests to arbitrary domains via a crafted DNS SRV record with a domain that is suffixed with the original domain name, aka a "DNS hijack attack." NOTE: this vulnerability exists because to an incomplete fix for CVE-2015-3900. CVE-2015-4020
GHSA-qv62-xfj6-32xm

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-16T12:33:11.684691+00:00 Debian Importer Fixing VCID-ajtx-8w3u-rkae https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:43:11.768606+00:00 Debian Importer Fixing VCID-zb9m-getz-3keh https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:00:10.246210+00:00 Debian Importer Fixing VCID-5fqj-uwnz-93af https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-13T08:35:49.814328+00:00 Debian Importer Fixing VCID-ajtx-8w3u-rkae https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:14:58.548261+00:00 Debian Importer Fixing VCID-zb9m-getz-3keh https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:02:11.890058+00:00 Debian Importer Fixing VCID-5fqj-uwnz-93af https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-03T07:27:55.479253+00:00 Debian Importer Fixing VCID-ajtx-8w3u-rkae https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:54.997175+00:00 Debian Importer Fixing VCID-5fqj-uwnz-93af https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:54.715275+00:00 Debian Importer Fixing VCID-zb9m-getz-3keh https://security-tracker.debian.org/tracker/data/json 38.1.0