DEBIAN-CVE-2019-11065

Source
https://security-tracker.debian.org/tracker/DEBIAN-CVE-2019-11065
Import Source
https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2019-11065.json
JSON Data
https://api.test.osv.dev/v1/vulns/DEBIAN-CVE-2019-11065
Upstream
Published
2019-04-10T00:29:00Z
Modified
2025-09-19T06:12:44Z
Summary
[none]
Details

Gradle versions from 1.4 to 5.3.1 use an insecure HTTP URL to download dependencies when the built-in JavaScript or CoffeeScript Gradle plugins are used. Dependency artifacts could have been maliciously compromised by a MITM attack against the ajax.googleapis.com web site.

References

Affected packages

Debian:11 / gradle

Package

Name
gradle
Purl
pkg:deb/debian/gradle?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.4.1-10

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:12 / gradle

Package

Name
gradle
Purl
pkg:deb/debian/gradle?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.4.1-10

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13 / gradle

Package

Name
gradle
Purl
pkg:deb/debian/gradle?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.4.1-10

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:14 / gradle

Package

Name
gradle
Purl
pkg:deb/debian/gradle?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.4.1-10

Ecosystem specific

{
    "urgency": "not yet assigned"
}