vulnerability

SUSE: CVE-2019-16779: SUSE Linux Security Advisory

Severity
4
CVSS
(AV:N/AC:M/Au:N/C:P/I:N/A:N)
Published
Dec 16, 2019
Added
Jan 15, 2020
Modified
Feb 4, 2022

Description

In RubyGem excon before 0.71.0, there was a race condition around persistent connections, where a connection which is interrupted (such as by a timeout) would leave data on the socket. Subsequent requests would then read this data, returning content from the previous response. The race condition window appears to be short, and it would be difficult to purposefully exploit this.

Solution(s)

suse-upgrade-ruby2-1-rubygem-exconsuse-upgrade-ruby2-5-rubygem-exconsuse-upgrade-ruby2-5-rubygem-excon-docsuse-upgrade-ruby2-5-rubygem-excon-testsuite
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.