Lucene search

K
debianDebianDEBIAN:DLA-209-1:3C908
HistoryApr 29, 2015 - 10:47 a.m.

[SECURITY] [DLA 209-1] jruby security update

2015-04-2910:47:27
lists.debian.org
11

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

0.01 Low

EPSS

Percentile

83.2%

Package : jruby
Version : 1.5.1-1+deb6u1
CVE ID : CVE-2011-4838
Debian Bug : 686867

JRuby before 1.6.5.1 computes hash values without restricting the ability to
trigger hash collisions predictably, which allows context-dependent attackers
to cause a denial of service (CPU consumption) via crafted input to an
application that maintains a hash table. Note: This update includes
corrections to the original fix for later Debian releases to avoid the issues
identified in CVE-2012-5370.
Attachment:
signature.asc
Description: This is a digitally signed message part.

OSVersionArchitecturePackageVersionFilename
Debian6alljruby< 1.5.1-1+deb6u1jruby_1.5.1-1+deb6u1_all.deb

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

0.01 Low

EPSS

Percentile

83.2%