logo
DATABASE RESOURCES PRICING ABOUT US

ruby2.3 - security update

Description

A potential HTTP request smuggling vulnerability in WEBrick was reported. WEBrick (bundled along with ruby2.3) was too tolerant against an invalid Transfer-Encoding header. This may lead to inconsistent interpretation between WEBrick and some HTTP proxy servers, which may allow the attacker to “smuggle” a request. For Debian 9 stretch, this problem has been fixed in version 2.3.3-1+deb9u9. We recommend that you upgrade your ruby2.3 packages. For the detailed security status of ruby2.3 please refer to its security tracker page at: <https://security-tracker.debian.org/tracker/ruby2.3> Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: <https://wiki.debian.org/LTS>


Affected Software


CPE Name Name Version
ruby2.3 2.3.3-1+deb9u7
ruby2.3 2.3.3-1+deb9u4
ruby2.3 2.3.3-1+deb9u2
ruby2.3 2.3.3-1+deb9u1
ruby2.3 2.3.3-1
ruby2.3 2.3.3-1+deb9u5
ruby2.3 2.3.3-1+deb9u8
ruby2.3 2.3.3-1+deb9u3
ruby2.3 2.3.3-1+deb9u6

Related