Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:deb/debian/jruby@9.4.8.0%2Bds-3?distro=trixie
purl pkg:deb/debian/jruby@9.4.8.0%2Bds-3?distro=trixie
Vulnerabilities affecting this package (0)
Vulnerability Summary Fixed by
This package is not known to be affected by vulnerabilities.
Vulnerabilities fixed by this package (29)
Vulnerability Summary Aliases
VCID-1cad-uybu-2uau security update CVE-2017-17742
GHSA-7p4c-jf2w-hc3w
VCID-4eas-fpqk-7ugd JRuby denial of service via Hash Collision JRuby computes hash values without properly restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted input to an application that maintains a hash table, as demonstrated by a universal multicollision attack against the MurmurHash2 algorithm, a different vulnerability than CVE-2011-4838. CVE-2012-5370
GHSA-fmmq-j7pq-f85c
OSV-87864
VCID-5fqj-uwnz-93af Multiple vulnerabilities have been found in Ruby, the worst of which could lead to the remote execution of arbitrary code. CVE-2019-15845
VCID-8d7n-bfhu-dkfd Loop with Unreachable Exit Condition (Infinite Loop) RubyGems contains an infinite loop caused by negative size vulnerability in ruby gem package tar header that can result in a negative size could cause an infinite loop. CVE-2018-1000075
GHSA-74pv-v9gh-h25p
VCID-8hm4-c4w4-gfen Cross-site Scripting RubyGems contains a Cross Site Scripting (XSS) vulnerability in gem server display of homepage attribute that can result in XSS. This attack appears to be exploitable by the victim browsing to a malicious gem on a vulnerable gem server. CVE-2018-1000078
GHSA-87qx-g5wg-mwmj
VCID-9t45-d5mf-3uar Path Traversal RubyGems contains a Directory Traversal vulnerability in gem installation that can result in the gem being able to write to arbitrary filesystem locations during installation. This attack appears to be exploitable by a victim installing a malicious gem. CVE-2018-1000079
GHSA-8qxg-mff5-j3wc
VCID-9x9w-2k98-wydm Ruby Time component ReDoS issue A ReDoS issue was discovered in the Time component through 0.2.1 in Ruby through 3.2.1. The Time parser mishandles invalid URLs that have specific characters. It causes an increase in execution time for parsing strings to Time objects. The fixed versions are 0.1.1 and 0.2.2. CVE-2023-28756
GHSA-fg7x-g82r-94qc
VCID-af1f-xwwy-jfa8 RubyGems contains a Deserialization of Untrusted Data vulnerability in owner command that can result in code execution. This attack appears to be exploitable when the victim runs the `gem owner` command on a gem with a specially crafted YAML file. CVE-2018-1000074
GHSA-qj2w-mw2r-pv39
VCID-ajtx-8w3u-rkae URI gem has ReDoS vulnerability A ReDoS issue was discovered in the URI component before 0.12.2 for Ruby. The URI parser mishandles invalid URLs that have specific characters. There is an increase in execution time for parsing strings to URI objects with `rfc2396_parser.rb` and `rfc3986_parser.rb`. NOTE: this issue exists becuse of an incomplete fix for CVE-2023-28755. Version 0.10.3 is also a fixed version. [The Ruby advisory recommends](https://www.ruby-lang.org/en/news/2023/06/29/redos-in-uri-CVE-2023-36617/) updating the uri gem to 0.12.2. In order to ensure compatibility with the bundled version in older Ruby series, you may update as follows instead: - For Ruby 3.0: Update to uri 0.10.3 - For Ruby 3.1 and 3.2: Update to uri 0.12.2. You can use gem update uri to update it. If you are using bundler, please add gem `uri`, `>= 0.12.2` (or other version mentioned above) to your Gemfile. CVE-2023-36617
GHSA-hww2-5g85-429m
VCID-djpm-b9q2-3qde XSS in the regular expression engine when processing invalid UTF-8 byte sequences The regular expression engine in this package, when `$KCODE` is set to 'u', does not properly handle characters immediately after a UTF-8 character, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a crafted string. CVE-2010-1330
GHSA-wmq2-jc9m-xp4m
OSV-77297
VCID-ee8m-jtmh-dfbs 7PK - Security Features RubyGems does not validate the hostname when fetching gems or making API requests, which allows remote attackers to redirect requests to arbitrary domains via a crafted DNS SRV record, aka a "DNS hijack attack." CVE-2015-3900
GHSA-wp3j-rvfp-624h
OSV-122162
VCID-f6d8-e8tp-c3am Multiple vulnerabilities have been found in Ruby, the worst of which could lead to the remote execution of arbitrary code. CVE-2019-16255
GHSA-ph7w-p94x-9vvw
VCID-f7x5-hz5f-hyd3 Improper Restriction of Operations within the Bounds of a Memory Buffer An issue was discovered in RubyGems. Since `Gem::CommandManager#run` calls alert_error without escaping, escape sequence injection is possible. (There are many ways to cause an error.) CVE-2019-8325
GHSA-4wm8-fjv7-j774
VCID-ha3g-uyse-wybx Injection Vulnerability An issue was discovered in RubyGems. The gem owner command outputs the contents of the API response directly to stdout. Therefore, if the response is crafted, escape sequence injection may occur. CVE-2019-8322
GHSA-mh37-8c3g-3fgc
VCID-jkwe-c323-3yez Argument Injection or Modification An issue was discovered in RubyGems. Since `Gem::UserInteraction#verbose` calls say without escaping, escape sequence injection is possible. CVE-2019-8321
GHSA-fr32-gr5c-xq5c
VCID-kp26-vpgn-k7az Multiple vulnerabilities have been found in Ruby, the worst of which could lead to the remote execution of arbitrary code. CVE-2019-16201
VCID-ky5r-bch5-m7dv Injection Vulnerability An issue was discovered in RubyGems. `Gem::GemcutterUtilities#with_response` may output the API response to stdout as it is. Therefore, if the API side modifies the response, escape sequence injection may occur. CVE-2019-8323
GHSA-3h4r-pjv6-cph9
VCID-mamm-cvdr-subf RubyGems contains an Improper Input Validation vulnerability in ruby gems specification homepage attribute that can result in a malicious gem being able to set an invalid homepage URL. CVE-2018-1000077
GHSA-gv86-43rv-79m2
VCID-mgcb-jfts-xkge A hash collision vulnerability in JRuby allows remote attackers to cause a Denial of Service condition. CVE-2011-4838
GHSA-cgqc-fqxr-q6r6
OSV-78116
VCID-t78a-dw4s-vqf5 Path Traversal A Directory Traversal issue was discovered in RubyGems. Before making new directories or touching files (which now include path-checking code for symlinks), it would delete the target destination. If that destination was hidden behind a symlink, a malicious gem could delete arbitrary files on the user's machine, presuming the attacker could guess at paths. Given how frequently gem is run as sudo, and how predictable paths are on modern systems (`/tmp`, `/usr`, etc.), this could likely lead to data loss or an unusable system. CVE-2019-8320
GHSA-5x32-c9mf-49cc
VCID-t9y5-hd9b-bkc4 Multiple vulnerabilities have been discovered in Ruby, the worst of which could lead to execution of arbitrary code. CVE-2021-31810
GHSA-wr95-679j-87v9
VCID-tq93-h2ag-s3bx Path Traversal RubyGems contains a Directory Traversal vulnerability in install_location function of `package.rb` that can result in path traversal when writing to a symlinked basedir outside the root. CVE-2018-1000073
GHSA-gx69-6cp4-hxrj
VCID-uxdx-abx7-fkdy Ruby URI component ReDoS issue A ReDoS issue was discovered in the URI component through 0.12.0 in Ruby through 3.2.1. The URI parser mishandles invalid URLs that have specific characters. It causes an increase in execution time for parsing strings to URI objects. The fixed versions are 0.12.1, 0.11.1, 0.10.2 and 0.10.0.1. CVE-2023-28755
GHSA-hv5j-3h9f-99c2
VCID-vcz9-dvf4-47am Multiple vulnerabilities have been discovered in Ruby, the worst of which could lead to execution of arbitrary code. CVE-2020-25613
GHSA-gwfg-cqmg-cf8f
VCID-w4ns-f42m-pyec RubyGems contains an Improper Verification of Cryptographic Signature vulnerability in `package.rb` that can result in a mis-signed gem being installed, as the tarball would contain multiple gem signatures. CVE-2018-1000076
GHSA-mc6j-h948-v2p6
VCID-xgmc-a5rk-zqag Improper Input Validation A crafted gem with a multi-line name is not handled correctly. Therefore, an attacker could inject arbitrary code to the stub line of gemspec, which is evaluated by `ensure_loadable_spec` during the pre-installation check. CVE-2019-8324
GHSA-76wm-422q-92mq
VCID-xkby-43zv-x3f7 Multiple vulnerabilities have been discovered in Ruby, the worst of which could lead to execution of arbitrary code. CVE-2021-32066
GHSA-gx49-h5r3-q3xj
VCID-y56y-5am7-wkhr Multiple vulnerabilities have been found in Ruby, the worst of which could lead to the remote execution of arbitrary code. CVE-2019-16254
GHSA-w9fp-2996-hhwx
VCID-zb9m-getz-3keh Improper Input Validation RubyGems does not validate the hostname when fetching gems or making API requests, which allows remote attackers to redirect requests to arbitrary domains via a crafted DNS SRV record with a domain that is suffixed with the original domain name, aka a "DNS hijack attack." NOTE: this vulnerability exists because to an incomplete fix for CVE-2015-3900. CVE-2015-4020
GHSA-qv62-xfj6-32xm

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-16T13:26:10.121497+00:00 Debian Importer Fixing VCID-vcz9-dvf4-47am https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:39:21.885333+00:00 Debian Importer Fixing VCID-4eas-fpqk-7ugd https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:33:11.694441+00:00 Debian Importer Fixing VCID-ajtx-8w3u-rkae https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:11:23.968016+00:00 Debian Importer Fixing VCID-af1f-xwwy-jfa8 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:00:01.813516+00:00 Debian Importer Fixing VCID-8hm4-c4w4-gfen https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:53:08.630385+00:00 Debian Importer Fixing VCID-xgmc-a5rk-zqag https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:49:20.674603+00:00 Debian Importer Fixing VCID-t78a-dw4s-vqf5 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:46:20.346523+00:00 Debian Importer Fixing VCID-xkby-43zv-x3f7 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:23:12.956035+00:00 Debian Importer Fixing VCID-9t45-d5mf-3uar https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:22:05.843378+00:00 Debian Importer Fixing VCID-t9y5-hd9b-bkc4 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:56:44.616054+00:00 Debian Importer Fixing VCID-ee8m-jtmh-dfbs https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:48:11.305244+00:00 Debian Importer Fixing VCID-y56y-5am7-wkhr https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:43:11.778125+00:00 Debian Importer Fixing VCID-zb9m-getz-3keh https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:41:42.127954+00:00 Debian Importer Fixing VCID-jkwe-c323-3yez https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:41:21.201706+00:00 Debian Importer Fixing VCID-ky5r-bch5-m7dv https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:34:47.594052+00:00 Debian Importer Fixing VCID-kp26-vpgn-k7az https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:29:28.013950+00:00 Debian Importer Fixing VCID-8d7n-bfhu-dkfd https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:25:24.912396+00:00 Debian Importer Fixing VCID-tq93-h2ag-s3bx https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:50:20.059685+00:00 Debian Importer Fixing VCID-w4ns-f42m-pyec https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:34:42.122354+00:00 Debian Importer Fixing VCID-f6d8-e8tp-c3am https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:30:00.990928+00:00 Debian Importer Fixing VCID-1cad-uybu-2uau https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:18:17.211783+00:00 Debian Importer Fixing VCID-mamm-cvdr-subf https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:13:50.484162+00:00 Debian Importer Fixing VCID-f7x5-hz5f-hyd3 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:00:10.256737+00:00 Debian Importer Fixing VCID-5fqj-uwnz-93af https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:59:20.835711+00:00 Debian Importer Fixing VCID-ha3g-uyse-wybx https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:55:41.023851+00:00 Debian Importer Fixing VCID-djpm-b9q2-3qde https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:38:56.859452+00:00 Debian Importer Fixing VCID-mgcb-jfts-xkge https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-13T09:16:07.680137+00:00 Debian Importer Fixing VCID-vcz9-dvf4-47am https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:40:24.900504+00:00 Debian Importer Fixing VCID-4eas-fpqk-7ugd https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:35:49.824460+00:00 Debian Importer Fixing VCID-ajtx-8w3u-rkae https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:20:14.828348+00:00 Debian Importer Fixing VCID-af1f-xwwy-jfa8 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:11:42.007522+00:00 Debian Importer Fixing VCID-8hm4-c4w4-gfen https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:06:52.303642+00:00 Debian Importer Fixing VCID-xgmc-a5rk-zqag https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:04:01.392563+00:00 Debian Importer Fixing VCID-t78a-dw4s-vqf5 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:01:39.145358+00:00 Debian Importer Fixing VCID-xkby-43zv-x3f7 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:45:17.192794+00:00 Debian Importer Fixing VCID-9t45-d5mf-3uar https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:44:25.591099+00:00 Debian Importer Fixing VCID-t9y5-hd9b-bkc4 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:25:22.234476+00:00 Debian Importer Fixing VCID-ee8m-jtmh-dfbs https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:18:40.862699+00:00 Debian Importer Fixing VCID-y56y-5am7-wkhr https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:14:58.554426+00:00 Debian Importer Fixing VCID-zb9m-getz-3keh https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:14:04.780437+00:00 Debian Importer Fixing VCID-jkwe-c323-3yez https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:13:51.553806+00:00 Debian Importer Fixing VCID-ky5r-bch5-m7dv https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:08:49.946855+00:00 Debian Importer Fixing VCID-kp26-vpgn-k7az https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:04:51.604117+00:00 Debian Importer Fixing VCID-8d7n-bfhu-dkfd https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:01:48.457314+00:00 Debian Importer Fixing VCID-tq93-h2ag-s3bx https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:34:34.674563+00:00 Debian Importer Fixing VCID-w4ns-f42m-pyec https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:22:51.298727+00:00 Debian Importer Fixing VCID-f6d8-e8tp-c3am https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:20:09.134278+00:00 Debian Importer Fixing VCID-1cad-uybu-2uau https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:13:03.372361+00:00 Debian Importer Fixing VCID-mamm-cvdr-subf https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:10:25.394066+00:00 Debian Importer Fixing VCID-f7x5-hz5f-hyd3 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:02:11.900136+00:00 Debian Importer Fixing VCID-5fqj-uwnz-93af https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:01:42.096816+00:00 Debian Importer Fixing VCID-ha3g-uyse-wybx https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:59:29.422867+00:00 Debian Importer Fixing VCID-djpm-b9q2-3qde https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:48:54.414943+00:00 Debian Importer Fixing VCID-mgcb-jfts-xkge https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-03T07:27:55.486079+00:00 Debian Importer Fixing VCID-ajtx-8w3u-rkae https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:55.447681+00:00 Debian Importer Fixing VCID-9x9w-2k98-wydm https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:55.415600+00:00 Debian Importer Fixing VCID-uxdx-abx7-fkdy https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:55.394632+00:00 Debian Importer Fixing VCID-xkby-43zv-x3f7 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:55.362202+00:00 Debian Importer Fixing VCID-t9y5-hd9b-bkc4 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:55.328921+00:00 Debian Importer Fixing VCID-vcz9-dvf4-47am https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:55.296883+00:00 Debian Importer Fixing VCID-f7x5-hz5f-hyd3 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:55.264582+00:00 Debian Importer Fixing VCID-xgmc-a5rk-zqag https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:55.232325+00:00 Debian Importer Fixing VCID-ky5r-bch5-m7dv https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:55.199986+00:00 Debian Importer Fixing VCID-ha3g-uyse-wybx https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:55.167647+00:00 Debian Importer Fixing VCID-jkwe-c323-3yez https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:55.135448+00:00 Debian Importer Fixing VCID-t78a-dw4s-vqf5 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:55.101501+00:00 Debian Importer Fixing VCID-f6d8-e8tp-c3am https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:55.069062+00:00 Debian Importer Fixing VCID-y56y-5am7-wkhr https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:55.037057+00:00 Debian Importer Fixing VCID-kp26-vpgn-k7az https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:55.004613+00:00 Debian Importer Fixing VCID-5fqj-uwnz-93af https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:54.976057+00:00 Debian Importer Fixing VCID-9t45-d5mf-3uar https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:54.944619+00:00 Debian Importer Fixing VCID-8hm4-c4w4-gfen https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:54.913329+00:00 Debian Importer Fixing VCID-mamm-cvdr-subf https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:54.881746+00:00 Debian Importer Fixing VCID-w4ns-f42m-pyec https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:54.850522+00:00 Debian Importer Fixing VCID-8d7n-bfhu-dkfd https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:54.819265+00:00 Debian Importer Fixing VCID-af1f-xwwy-jfa8 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:54.787323+00:00 Debian Importer Fixing VCID-tq93-h2ag-s3bx https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:54.755486+00:00 Debian Importer Fixing VCID-1cad-uybu-2uau https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:54.721899+00:00 Debian Importer Fixing VCID-zb9m-getz-3keh https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:54.694074+00:00 Debian Importer Fixing VCID-ee8m-jtmh-dfbs https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:54.666020+00:00 Debian Importer Fixing VCID-4eas-fpqk-7ugd https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:54.630907+00:00 Debian Importer Fixing VCID-mgcb-jfts-xkge https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:54.597859+00:00 Debian Importer Fixing VCID-djpm-b9q2-3qde https://security-tracker.debian.org/tracker/data/json 38.1.0