{"id":"MGASA-2020-0440","summary":"Updated jruby packages fix security vulnerabilities","details":"Response Splitting attack in the HTTP server of WEBrick (CVE-2017-17742).\n\nDelete directory using symlink when decompressing tar (CVE-2019-8320).\n\nEscape sequence injection vulnerability in verbose (CVE-2019-8321).\n\nEscape sequence injection vulnerability in gem owner (CVE-2019-8322).\n\nEscape sequence injection vulnerability in API response handling (CVE-2019-8323).\n\nInstalling a malicious gem may lead to arbitrary code execution\n(CVE-2019-8324).\n\nEscape sequence injection vulnerability in errors (CVE-2019-8325).\n\nRegular Expression Denial of Service vulnerability of WEBrick's Digest access\nauthentication (CVE-2019-16201).\n\nHTTP Response Splitting attack in the HTTP server of WEBrick (CVE-2019-16254).\n\nCode injection vulnerability (CVE-2019-16255).\n\nA potential HTTP request smuggling vulnerability in WEBrick was reported.\nWEBrick (bundled along with jruby) was too tolerant against an invalid\nTransfer-Encoding header. This may lead to inconsistent interpretation between\nWEBrick and some HTTP proxy servers, which may allow the attacker to \"smuggle\"\na request (CVE-2020-25613).\n","modified":"2026-04-16T00:10:31.081020379Z","published":"2020-11-27T20:14:57Z","upstream":["CVE-2017-17742","CVE-2019-16201","CVE-2019-16254","CVE-2019-16255","CVE-2019-8320","CVE-2019-8321","CVE-2019-8322","CVE-2019-8323","CVE-2019-8324","CVE-2019-8325","CVE-2020-25613"],"references":[{"type":"ADVISORY","url":"https://advisories.mageia.org/MGASA-2020-0440.html"},{"type":"REPORT","url":"https://bugs.mageia.org/show_bug.cgi?id=27402"},{"type":"WEB","url":"https://www.debian.org/lts/security/2020/dla-2330"},{"type":"WEB","url":"https://www.debian.org/lts/security/2020/dla-2392"},{"type":"REPORT","url":"https://bugs.mageia.org/show_bug.cgi?id=25875"},{"type":"REPORT","url":"https://bugs.mageia.org/show_bug.cgi?id=27402"}],"affected":[{"package":{"name":"jruby","ecosystem":"Mageia:7","purl":"pkg:rpm/mageia/jruby?arch=source&distro=mageia-7"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.7.22-7.2.mga7"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2020-0440.json"}}],"schema_version":"1.7.5","credits":[{"name":"Mageia","contact":["https://wiki.mageia.org/en/Packages_Security_Team"],"type":"COORDINATOR"}]}