Debian Package Tracker
Register | Log in
Subscribe

jruby

100% pure-Java implementation of Ruby

Choose email to subscribe with

general
  • source: jruby (main)
  • version: 9.3.9.0+ds-8
  • maintainer: Debian Java Maintainers (archive) (DMD)
  • uploaders: Jérôme Charaoui [DMD] – Thomas Goirand [DMD]
  • arch: all
  • std-ver: 4.6.1
  • VCS: Git (Browse, QA)
versions [more versions can be listed by madison] [old versions available from snapshot.debian.org]
[pool directory]
  • o-o-stable: 9.1.17.0-3
  • o-o-sec: 9.1.17.0-3+deb10u1
  • stable: 9.3.9.0+ds-8
  • unstable: 9.3.9.0+ds-8
versioned links
  • 9.1.17.0-3: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 9.1.17.0-3+deb10u1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 9.3.9.0+ds-8: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
binaries
  • jruby (2 bugs: 0, 2, 0, 0)
action needed
A new upstream version is available: 9.4.3.0 high
A new upstream version 9.4.3.0 is available, you should consider packaging it.
Created: 2022-12-04 Last update: 2023-10-08 02:40
3 security issues in sid high

There are 3 open security issues in sid.

3 important issues:
  • CVE-2023-28755: A ReDoS issue was discovered in the URI component through 0.12.0 in Ruby through 3.2.1. The URI parser mishandles invalid URLs that have specific characters. It causes an increase in execution time for parsing strings to URI objects. The fixed versions are 0.12.1, 0.11.1, 0.10.2 and 0.10.0.1.
  • CVE-2023-28756: A ReDoS issue was discovered in the Time component through 0.2.1 in Ruby through 3.2.1. The Time parser mishandles invalid URLs that have specific characters. It causes an increase in execution time for parsing strings to Time objects. The fixed versions are 0.1.1 and 0.2.2.
  • CVE-2023-36617: A ReDoS issue was discovered in the URI component before 0.12.2 for Ruby. The URI parser mishandles invalid URLs that have specific characters. There is an increase in execution time for parsing strings to URI objects with rfc2396_parser.rb and rfc3986_parser.rb. NOTE: this issue exists becuse of an incomplete fix for CVE-2023-28755. Version 0.10.3 is also a fixed version.
Created: 2023-04-02 Last update: 2023-09-09 18:38
3 security issues in trixie high

There are 3 open security issues in trixie.

3 important issues:
  • CVE-2023-28755: A ReDoS issue was discovered in the URI component through 0.12.0 in Ruby through 3.2.1. The URI parser mishandles invalid URLs that have specific characters. It causes an increase in execution time for parsing strings to URI objects. The fixed versions are 0.12.1, 0.11.1, 0.10.2 and 0.10.0.1.
  • CVE-2023-28756: A ReDoS issue was discovered in the Time component through 0.2.1 in Ruby through 3.2.1. The Time parser mishandles invalid URLs that have specific characters. It causes an increase in execution time for parsing strings to Time objects. The fixed versions are 0.1.1 and 0.2.2.
  • CVE-2023-36617: A ReDoS issue was discovered in the URI component before 0.12.2 for Ruby. The URI parser mishandles invalid URLs that have specific characters. There is an increase in execution time for parsing strings to URI objects with rfc2396_parser.rb and rfc3986_parser.rb. NOTE: this issue exists becuse of an incomplete fix for CVE-2023-28755. Version 0.10.3 is also a fixed version.
Created: 2023-06-11 Last update: 2023-08-07 18:39
The package has not entered testing even though the delay is over normal
The package has not entered testing even though the 2-day delay is over. Check why.
Created: 2023-09-09 Last update: 2023-10-08 03:02
lintian reports 12 warnings normal
Lintian reports 12 warnings about this package. You should make the package lintian clean getting rid of them.
Created: 2023-01-17 Last update: 2023-01-17 09:33
2 low-priority security issues in bookworm low

There are 2 open security issues in bookworm.

2 issues left for the package maintainer to handle:
  • CVE-2023-28755: (needs triaging) A ReDoS issue was discovered in the URI component through 0.12.0 in Ruby through 3.2.1. The URI parser mishandles invalid URLs that have specific characters. It causes an increase in execution time for parsing strings to URI objects. The fixed versions are 0.12.1, 0.11.1, 0.10.2 and 0.10.0.1.
  • CVE-2023-28756: (needs triaging) A ReDoS issue was discovered in the Time component through 0.2.1 in Ruby through 3.2.1. The Time parser mishandles invalid URLs that have specific characters. It causes an increase in execution time for parsing strings to Time objects. The fixed versions are 0.1.1 and 0.2.2.

You can find information about how to handle these issues in the security team's documentation.

Created: 2023-06-10 Last update: 2023-09-09 18:38
debian/patches: 1 patch to forward upstream low

Among the 11 debian patches available in version 9.3.9.0+ds-8 of the package, we noticed the following issues:

  • 1 patch where the metadata indicates that the patch has not yet been forwarded upstream. You should either forward the patch upstream or update the metadata to document its real status.
Created: 2023-02-26 Last update: 2023-02-27 20:59
Standards version of the package is outdated. wishlist
The package should be updated to follow the last version of Debian Policy (Standards-Version 4.6.2 instead of 4.6.1).
Created: 2022-12-17 Last update: 2023-01-17 08:43
testing migrations
  • excuses:
    • Migration status for jruby (- to 9.3.9.0+ds-8): BLOCKED: Rejected/violates migration policy/introduces a regression
    • Issues preventing migration:
    • ∙ ∙ Updating jruby would introduce bugs in testing: #1042129
    • Additional info:
    • ∙ ∙ Piuparts tested OK - https://piuparts.debian.org/sid/source/j/jruby.html
    • ∙ ∙ autopkgtest for jruby/9.3.9.0+ds-8: amd64: Pass, arm64: Pass, armel: Pass, armhf: Pass, i386: Pass, ppc64el: Pass, s390x: Pass
    • ∙ ∙ Required age reduced by 3 days because of autopkgtest
    • ∙ ∙ 264 days old (needed 2 days)
    • Not considered
news
[rss feed]
  • [2023-09-10] jruby REMOVED from testing (Debian testing watch)
  • [2023-09-10] jruby REMOVED from testing (Debian testing watch)
  • [2023-04-30] Accepted jruby 9.1.17.0-3+deb10u1 (source) into oldstable (Adrian Bunk)
  • [2023-01-20] jruby 9.3.9.0+ds-8 MIGRATED to testing (Debian testing watch)
  • [2023-01-16] Accepted jruby 9.3.9.0+ds-8 (source) into unstable (Jérôme Charaoui)
  • [2023-01-11] Accepted jruby 9.3.9.0+ds-7 (source) into unstable (Jérôme Charaoui)
  • [2023-01-09] Accepted jruby 9.3.9.0+ds-6 (source) into unstable (Jérôme Charaoui)
  • [2022-12-27] Accepted jruby 9.3.9.0+ds-5 (source) into unstable (Jérôme Charaoui)
  • [2022-12-23] Accepted jruby 9.3.9.0+ds-4 (source) into unstable (Jérôme Charaoui)
  • [2022-12-10] Accepted jruby 9.3.9.0+ds-3 (source) into unstable (Jérôme Charaoui)
  • [2022-12-09] Accepted jruby 9.3.9.0+ds-2 (source) into unstable (Jérôme Charaoui)
  • [2022-12-03] Accepted jruby 9.3.9.0+ds-1 (source) into unstable (Jérôme Charaoui)
  • [2021-02-18] jruby REMOVED from testing (Debian testing watch)
  • [2020-10-01] Accepted jruby 1.7.26-1+deb9u3 (source all) into oldstable (Utkarsh Gupta)
  • [2020-08-16] Accepted jruby 1.7.26-1+deb9u2 (source) into oldstable (Adrian Bunk)
  • [2019-12-10] Accepted jruby 1.5.6-9+deb8u2 (source all) into oldoldstable (Markus Koschany)
  • [2019-06-03] jruby 9.1.17.0-3 MIGRATED to testing (Debian testing watch)
  • [2019-05-29] Accepted jruby 9.1.17.0-3 (source) into unstable (Hideki Yamane)
  • [2019-05-20] Accepted jruby 1.5.6-9+deb8u1 (source all) into oldstable (Abhijith PA)
  • [2019-05-08] jruby 9.1.17.0-2.1 MIGRATED to testing (Debian testing watch)
  • [2019-05-03] Accepted jruby 9.1.17.0-2.1 (source) into unstable (Salvatore Bonaccorso)
  • [2019-03-08] jruby 9.1.17.0-2 MIGRATED to testing (Debian testing watch)
  • [2019-02-26] Accepted jruby 9.1.17.0-2 (source) into unstable (Andrej Shadura)
  • [2019-02-25] Accepted jruby 9.1.17.0-1 (source) into unstable (Andrej Shadura)
  • [2018-06-12] Accepted jruby 1.7.26-1+deb9u1 (source all) into proposed-updates->stable-new, proposed-updates (Markus Koschany)
  • [2018-06-08] Accepted jruby 1.7.26-1+deb9u1 (source all) into stable->embargoed, stable (Markus Koschany)
  • [2018-04-17] Accepted jruby 1.5.6-5+deb7u2 (source all) into oldoldstable (Markus Koschany)
  • [2018-04-01] Accepted jruby 1.5.6-5+deb7u1 (source all) into oldoldstable (Santiago R.R.) (signed by: Santiago Ruano Rincón)
  • [2017-10-15] Accepted jruby 9.1.13.0-1~bpo9+1 (source all) into stretch-backports (Miguel Landaeta)
  • [2017-10-11] jruby 9.1.13.0-1 MIGRATED to testing (Debian testing watch)
  • 1
  • 2
bugs [bug history graph]
  • all: 4
  • RC: 1
  • I&N: 3
  • M&W: 0
  • F&P: 0
  • patch: 0
links
  • homepage
  • lintian (0, 12)
  • buildd: logs
  • popcon
  • browse source code
  • edit tags
  • other distros
  • security tracker
  • screenshots
  • debian patches
  • debci
ubuntu Ubuntu logo [Information about Ubuntu for Debian Developers]
  • version: 9.3.9.0+ds-1
  • 5 bugs

Debian Package Tracker — Copyright 2013-2018 The Distro Tracker Developers
Report problems to the tracker.debian.org pseudo-package in the Debian BTS.
Documentation — Bugs — Git Repository — Contributing