Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2019-16779

Опубликовано: 16 дек. 2019
Источник: debian

Описание

In RubyGem excon before 0.71.0, there was a race condition around persistent connections, where a connection which is interrupted (such as by a timeout) would leave data on the socket. Subsequent requests would then read this data, returning content from the previous response. The race condition window appears to be short, and it would be difficult to purposefully exploit this.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
ruby-exconfixed0.60.0-2package
ruby-exconno-dsabusterpackage
ruby-exconno-dsastretchpackage

Примечания

  • https://github.com/excon/excon/security/advisories/GHSA-q58g-455p-8vw9

  • https://github.com/excon/excon/commit/ccb57d7a422f020dc74f1de4e8fb505ab46d8a29

Связанные уязвимости

CVSS3: 5.8
ubuntu
около 6 лет назад

In RubyGem excon before 0.71.0, there was a race condition around persistent connections, where a connection which is interrupted (such as by a timeout) would leave data on the socket. Subsequent requests would then read this data, returning content from the previous response. The race condition window appears to be short, and it would be difficult to purposefully exploit this.

CVSS3: 5.8
nvd
около 6 лет назад

In RubyGem excon before 0.71.0, there was a race condition around persistent connections, where a connection which is interrupted (such as by a timeout) would leave data on the socket. Subsequent requests would then read this data, returning content from the previous response. The race condition window appears to be short, and it would be difficult to purposefully exploit this.

suse-cvrf
около 6 лет назад

Security update for rubygem-excon

suse-cvrf
больше 5 лет назад

Security update for rubygem-excon

CVSS3: 5.8
github
около 6 лет назад

In RubyGem excon, interrupted Persistent Connections May Leak Response Data