Sign Up
Log In
Log In
or
Sign Up
Places
All Projects
Status Monitor
Collapse sidebar
SUSE:SLE-12-SP4:Update
patchinfo.15815
_patchinfo
Overview
Repositories
Revisions
Requests
Users
Attributes
Meta
File _patchinfo of Package patchinfo.15815
<patchinfo incident="15815"> <issue tracker="jsc" id="SOC-10999"/> <issue tracker="jsc" id="SLE-6965"/> <issue tracker="cve" id="2019-16770"/> <issue tracker="cve" id="2020-5247"/> <issue tracker="cve" id="2020-11076"/> <issue tracker="cve" id="2020-11077"/> <issue tracker="bnc" id="1172175">VUL-0: CVE-2020-11077: rubygem-puma: client could smuggle a request through a proxy, causing the proxy to send a response back to another unknown client</issue> <issue tracker="bnc" id="1158675">VUL-1: CVE-2019-16770: rubygem-puma: A poorly-behaved client could use keepalive requests to monopolize Puma's reactor and create a denial of service attack</issue> <issue tracker="bnc" id="1165402">VUL-1: CVE-2020-5247: rubygem-puma: if an application allows untrusted input in a response header, an attacker can use newline characters (i.e. `CR`, `LF` or`/r`, `/n`) to end the header and inject malicious content</issue> <issue tracker="bnc" id="1172176">VUL-1: CVE-2020-11076: rubygem-puma: attacker could smuggle an HTTP response, by using an invalid transfer-encoding header</issue> <packager>dmaiocchi</packager> <rating>important</rating> <category>security</category> <summary>Security update for rubygem-puma</summary> <description>This update for rubygem-puma fixes the following issues: - Add patches for disabling TLSv1.0 and TLSv1.1 (jsc#SLE-6965): - Add CVE-2020-11077.patch (bsc#1172175, CVE-2020-11077) - Add CVE-2020-11076.patch (bsc#1172176, CVE-2020-11076) - Add CVE-2020-5247.patch (bsc#1165402) "Fixes a problem where we were not splitting newlines in headers according to Rack spec" The patch is reduced compared to the upstream version, which was patching also the parts that are not implemented in our old Puma version. This applies to unit test as well. - Add CVE-2019-16770.patch (bsc#1158675, SOC-10999, CVE-2019-16770) This patch fixes a DoS vulnerability a malicious client could use to block a large amount of threads. </description> </patchinfo>
Locations
Projects
Search
Status Monitor
Help
OpenBuildService.org
Documentation
API Documentation
Code of Conduct
Contact
Support
@OBShq
Terms
openSUSE Build Service is sponsored by
The Open Build Service is an
openSUSE project
.
Sign Up
Log In
Places
Places
All Projects
Status Monitor