{"_id":"5a035cfc10163e0010b0d43a","project":"555fbba928249c1900618a82","initVersion":{"_id":"59d693db6d3f930010332ec9","version":"2.8"},"user":{"_id":"559d8781454aef21005a5f6b","username":"","name":"Rachel Quick"},"__v":0,"hidden":true,"createdAt":"2017-11-08T19:37:32.068Z","fullscreen":false,"htmlmode":false,"html":"","body":"[block:callout]\n{\n  \"type\": \"danger\",\n  \"body\": \"IMPORTANT UPDATE FOR RECURLY CLIENT LIBRARIES RELEASED PRIOR TO MAY 9, 2018\"\n}\n[/block]\n\n[block:api-header]\n{\n  \"title\": \"Issue Summary\"\n}\n[/block]\nAs part of our ongoing security assessment, Recurly has become aware of a moderate potential security vulnerability for some use cases in our Ruby client.\n\nRecurly takes your security very seriously. Recurly has released patches for existing versions of the Ruby client library  to remediate potential vulnerabilities and recommends an immediate update.\n[block:api-header]\n{\n  \"title\": \"Impacted Versions\"\n}\n[/block]\nThe following versions of the Ruby client library are impacted:  \n2.0.x should upgrade to 2.0.14\n2.1.x should upgrade to 2.1.12\n2.2.x should upgrade to 2.2.6\n2.3.x should upgrade to 2.3.11\n2.4.x should upgrade to 2.4.12\n2.5.x should upgrade to 2.5.5\n2.6.x should upgrade to 2.6.4\n2.7.x  should upgrade to 2.7.9\n2.8.x should upgrade to 2.8.3\n2.9.x should upgrade to 2.9.3\n2.10.x should upgrade to 2.10.5\n2.11.x should upgrade to 2.11.4\n2.12.x should upgrade to 2.12.2\n2.13.x should upgrade to 2.13.1\n2.14.x should upgrade to 2.14.1\n2.15.x should upgrade to 2.15.3\n\n[block:api-header]\n{\n  \"title\": \"Regenerating API keys\"\n}\n[/block]\nWhile not explicitly recommended for the remediation with this client library, Recurly recommends as an additional security best practice to revoke/regenerate your API keys on a regular basis.\n[Follow our documentation](https://docs.recurly.com/docs/api-keys#section-revoking-an-api-key) on Revoking an API Key\n[block:api-header]\n{\n  \"title\": \"For Additional Support\"\n}\n[/block]\nPlease [contact support](https://support.recurly.com) for assistance related to this patch.","slug":"ruby-updates","title":"Ruby Updates"}

Ruby Updates


[block:callout] { "type": "danger", "body": "IMPORTANT UPDATE FOR RECURLY CLIENT LIBRARIES RELEASED PRIOR TO MAY 9, 2018" } [/block] [block:api-header] { "title": "Issue Summary" } [/block] As part of our ongoing security assessment, Recurly has become aware of a moderate potential security vulnerability for some use cases in our Ruby client. Recurly takes your security very seriously. Recurly has released patches for existing versions of the Ruby client library to remediate potential vulnerabilities and recommends an immediate update. [block:api-header] { "title": "Impacted Versions" } [/block] The following versions of the Ruby client library are impacted: 2.0.x should upgrade to 2.0.14 2.1.x should upgrade to 2.1.12 2.2.x should upgrade to 2.2.6 2.3.x should upgrade to 2.3.11 2.4.x should upgrade to 2.4.12 2.5.x should upgrade to 2.5.5 2.6.x should upgrade to 2.6.4 2.7.x should upgrade to 2.7.9 2.8.x should upgrade to 2.8.3 2.9.x should upgrade to 2.9.3 2.10.x should upgrade to 2.10.5 2.11.x should upgrade to 2.11.4 2.12.x should upgrade to 2.12.2 2.13.x should upgrade to 2.13.1 2.14.x should upgrade to 2.14.1 2.15.x should upgrade to 2.15.3 [block:api-header] { "title": "Regenerating API keys" } [/block] While not explicitly recommended for the remediation with this client library, Recurly recommends as an additional security best practice to revoke/regenerate your API keys on a regular basis. [Follow our documentation](https://docs.recurly.com/docs/api-keys#section-revoking-an-api-key) on Revoking an API Key [block:api-header] { "title": "For Additional Support" } [/block] Please [contact support](https://support.recurly.com) for assistance related to this patch.