MGASA-2020-0423

Source
https://advisories.mageia.org/MGASA-2020-0423.html
Import Source
https://advisories.mageia.org/MGASA-2020-0423.json
JSON Data
https://api.osv.dev/v1/vulns/MGASA-2020-0423
Related
Published
2020-11-13T21:20:36Z
Modified
2020-11-13T20:38:17Z
Summary
Updated ruby packages fix a security vulnerability
Details

A potential HTTP request smuggling vulnerability in WEBrick was reported. WEBrick was too tolerant against an invalid Transfer-Encoding header. This may lead to inconsistent interpretation between WEBrick and some HTTP proxy servers, which may allow the attacker to “smuggle” a request (CVE-2020-25613).

References
Credits

Affected packages

Mageia:7 / ruby

Package

Name
ruby
Purl
pkg:rpm/mageia/ruby?distro=mageia-7

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.5.8-22.mga7

Ecosystem specific

{
    "section": "core"
}