OESA-2021-1420

Source
https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2021-1420
Import Source
https://repo.openeuler.org/security/data/osv/OESA-2021-1420.json
JSON Data
https://api.osv.dev/v1/vulns/OESA-2021-1420
Upstream
Published
2021-11-05T11:03:20Z
Modified
2025-09-03T06:16:52.314208Z
Summary
rubygem-excon security update
Details

EXtended http(s) CONnections.

Security Fix(es):

In RubyGem excon before 0.71.0, there was a race condition around persistent connections, where a connection which is interrupted (such as by a timeout) would leave data on the socket. Subsequent requests would then read this data, returning content from the previous response. The race condition window appears to be short, and it would be difficult to purposefully exploit this.(CVE-2019-16779)

Database specific
{
    "severity": "Medium"
}
References

Affected packages

openEuler:20.03-LTS-SP1 / rubygem-excon

Package

Name
rubygem-excon
Purl
pkg:rpm/openEuler/rubygem-excon&distro=openEuler-20.03-LTS-SP1

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.62.0-3.oe1

Ecosystem specific

{
    "noarch": [
        "rubygem-excon-help-0.62.0-3.oe1.noarch.rpm",
        "rubygem-excon-0.62.0-3.oe1.noarch.rpm"
    ],
    "src": [
        "rubygem-excon-0.62.0-3.oe1.src.rpm"
    ]
}

openEuler:20.03-LTS-SP2 / rubygem-excon

Package

Name
rubygem-excon
Purl
pkg:rpm/openEuler/rubygem-excon&distro=openEuler-20.03-LTS-SP2

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.62.0-3.oe1

Ecosystem specific

{
    "noarch": [
        "rubygem-excon-0.62.0-3.oe1.noarch.rpm",
        "rubygem-excon-help-0.62.0-3.oe1.noarch.rpm"
    ],
    "src": [
        "rubygem-excon-0.62.0-3.oe1.src.rpm"
    ]
}