DescriptionIn RubyGem excon before 0.71.0, there was a race condition around persistent connections, where a connection which is interrupted (such as by a timeout) would leave data on the socket. Subsequent requests would then read this data, returning content from the previous response. The race condition window appears to be short, and it would be difficult to purposefully exploit this.
Overall state of this security issue: Resolved
This issue is currently rated as having moderate severity.
|National Vulnerability Database|
|National Vulnerability Database||SUSE|
- SUSE-SU-2020:2053-1, published Mon Jul 27 07:12:27 MDT 2020
- openSUSE-SU-2020:0036-1, published Tue, 14 Jan 2020 00:36:27 +0100 (CET)
- openSUSE-SU-2020:0139-1, published Wed, 29 Jan 2020 21:38:48 +0100 (CET)
List of released packages
|Product(s)||Fixed package version(s)||References|
|SUSE Linux Enterprise Module for Containers 12|| ||Patchnames:
|SUSE Package Hub for SUSE Linux Enterprise 15 SP1|| ||Patchnames:
|openSUSE Leap 15.1|| ||Patchnames:
Status of this issue by product and package
Please note that this evaluation state might be work in progress, incomplete or outdated. Also information for service packs in the LTSS phase is only included for issues meeting the LTSS criteria. If in doubt, feel free to contact us for clarification.
|SUSE Linux Enterprise Module for Containers 12||rubygem-excon||Released|