{"_id":"5a035cfc10163e0010b0d43a","project":"555fbba928249c1900618a82","initVersion":{"_id":"59d693db6d3f930010332ec9","version":"2.8"},"user":{"_id":"559d8781454aef21005a5f6b","username":"","name":"Rachel Quick"},"__v":0,"hidden":true,"createdAt":"2017-11-08T19:37:32.068Z","fullscreen":false,"htmlmode":false,"html":"","body":"[block:api-header]\n{\n  \"title\": \"Issue Summary\"\n}\n[/block]\nOn 6-Nov-2017 Recurly became aware of a potential security vulnerability for some use cases in our Ruby Client and, as part of our immediate investigation, uncovered a separate potential issue with our Python and .NET Clients. \n\nRecurly takes your security very seriously. Recurly has released patches for existing versions of the Ruby client library  to remediate potential vulnerabilities and recommends an **immediate** update.\n[block:api-header]\n{\n  \"title\": \"Impacted Versions\"\n}\n[/block]\nThe following versions of the Ruby client library are impacted:\n2.0.0 to 2.0.11 should update to 2.0.13\n2.1.0 to 2.1.9 should update to 2.1.11\n2.2.0 to 2.2.3 should update to 2.2.5\n2.3.0 to 2.3.8 should update to 2.3.10\n2.4.0 to 2.4.9 should update to 2.4.11\n2.5.0 to 2.5.1 should update to 2.5.3\n2.6.0 to 2.6.1 should update to 2.6.3\n2.7.0 to 2.7.6 should update to 2.7.8\n2.8.0 should update to 2.8.2\n2.9.0 should update to 2.9.2\n2.10.0 to 2.10.3 should update to 2.10.4\n2.11.0 to 2.11.1 should update to 2.11.3\n[block:api-header]\n{\n  \"title\": \"Regenerating API keys\"\n}\n[/block]\nAs an additional security recommendation, please revoke/regenerate your API keys.\n[Follow our documentation](https://docs.recurly.com/docs/api-keys#section-revoking-an-api-key) on Revoking an API Key\n[block:api-header]\n{\n  \"title\": \"For Additional Support\"\n}\n[/block]\nPlease [contact support](support.recurly.com) for assistance related to this patch.","slug":"ruby-updates","title":"Ruby Updates"}

Ruby Updates


[block:api-header] { "title": "Issue Summary" } [/block] On 6-Nov-2017 Recurly became aware of a potential security vulnerability for some use cases in our Ruby Client and, as part of our immediate investigation, uncovered a separate potential issue with our Python and .NET Clients. Recurly takes your security very seriously. Recurly has released patches for existing versions of the Ruby client library to remediate potential vulnerabilities and recommends an **immediate** update. [block:api-header] { "title": "Impacted Versions" } [/block] The following versions of the Ruby client library are impacted: 2.0.0 to 2.0.11 should update to 2.0.13 2.1.0 to 2.1.9 should update to 2.1.11 2.2.0 to 2.2.3 should update to 2.2.5 2.3.0 to 2.3.8 should update to 2.3.10 2.4.0 to 2.4.9 should update to 2.4.11 2.5.0 to 2.5.1 should update to 2.5.3 2.6.0 to 2.6.1 should update to 2.6.3 2.7.0 to 2.7.6 should update to 2.7.8 2.8.0 should update to 2.8.2 2.9.0 should update to 2.9.2 2.10.0 to 2.10.3 should update to 2.10.4 2.11.0 to 2.11.1 should update to 2.11.3 [block:api-header] { "title": "Regenerating API keys" } [/block] As an additional security recommendation, please revoke/regenerate your API keys. [Follow our documentation](https://docs.recurly.com/docs/api-keys#section-revoking-an-api-key) on Revoking an API Key [block:api-header] { "title": "For Additional Support" } [/block] Please [contact support](support.recurly.com) for assistance related to this patch.