UBUNTU-CVE-2019-16779

Source
https://ubuntu.com/security/CVE-2019-16779
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2019/UBUNTU-CVE-2019-16779.json
JSON Data
https://api.test.osv.dev/v1/vulns/UBUNTU-CVE-2019-16779
Related
Published
2019-12-16T20:15:00Z
Modified
2024-10-15T14:07:01Z
Severity
  • 5.9 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N CVSS Calculator
Summary
[none]
Details

In RubyGem excon before 0.71.0, there was a race condition around persistent connections, where a connection which is interrupted (such as by a timeout) would leave data on the socket. Subsequent requests would then read this data, returning content from the previous response. The race condition window appears to be short, and it would be difficult to purposefully exploit this.

References

Affected packages

Ubuntu:Pro:16.04:LTS / ruby-excon

Package

Name
ruby-excon
Purl
pkg:deb/ubuntu/ruby-excon?arch=src?distro=esm-apps/xenial

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

0.*

0.45.1-2

Ecosystem specific

{
    "ubuntu_priority": "medium"
}

Ubuntu:Pro:18.04:LTS / ruby-excon

Package

Name
ruby-excon
Purl
pkg:deb/ubuntu/ruby-excon?arch=src?distro=esm-apps/bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

0.*

0.54.0-1
0.60.0-1

Ecosystem specific

{
    "ubuntu_priority": "medium"
}

Ubuntu:20.04:LTS / ruby-excon

Package

Name
ruby-excon
Purl
pkg:deb/ubuntu/ruby-excon?arch=src?distro=focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.60.0-2

Affected versions

0.*

0.60.0-1

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "medium",
    "binaries": [
        {
            "binary_version": "0.60.0-2",
            "binary_name": "ruby-excon"
        }
    ]
}