openSUSE Security Update: Security update for rubygem-puma
______________________________________________________________________________

Announcement ID:    openSUSE-SU-2020:1001-1
Rating:             moderate
References:         #1172175 #1172176 
Cross-References:   CVE-2020-11076 CVE-2020-11077
Affected Products:
                    openSUSE Leap 15.2
______________________________________________________________________________

   An update that fixes two vulnerabilities is now available.

Description:

   This update for rubygem-puma to version 4.3.5 fixes the following issues:

   - CVE-2020-11077: Fixed a HTTP smuggling issue related to proxy usage
     (bsc#1172175).
   - CVE-2020-11076: Fixed a HTTP smuggling issue when using an invalid
     transfer-encoding header (bsc#1172176).
   - Disabled TLSv1.0 and TLSv1.1 (jsc#SLE-6965).

   This update was imported from the SUSE:SLE-15:Update update project.


Patch Instructions:

   To install this openSUSE Security Update use the SUSE recommended installation methods
   like YaST online_update or "zypper patch".

   Alternatively you can run the command listed for your product:

   - openSUSE Leap 15.2:

      zypper in -t patch openSUSE-2020-1001=1



Package List:

   - openSUSE Leap 15.2 (x86_64):

      ruby2.5-rubygem-puma-4.3.5-lp152.4.3.1
      ruby2.5-rubygem-puma-debuginfo-4.3.5-lp152.4.3.1
      ruby2.5-rubygem-puma-doc-4.3.5-lp152.4.3.1
      rubygem-puma-debugsource-4.3.5-lp152.4.3.1


References:

   https://www.suse.com/security/cve/CVE-2020-11076.html
   https://www.suse.com/security/cve/CVE-2020-11077.html
   https://bugzilla.suse.com/1172175
   https://bugzilla.suse.com/1172176

-- 

openSUSE: 2020:1001-1: moderate: rubygem-puma

July 18, 2020
An update that fixes two vulnerabilities is now available.

Description

This update for rubygem-puma to version 4.3.5 fixes the following issues: - CVE-2020-11077: Fixed a HTTP smuggling issue related to proxy usage (bsc#1172175). - CVE-2020-11076: Fixed a HTTP smuggling issue when using an invalid transfer-encoding header (bsc#1172176). - Disabled TLSv1.0 and TLSv1.1 (jsc#SLE-6965). This update was imported from the SUSE:SLE-15:Update update project.

 

Patch

Patch Instructions: To install this openSUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: - openSUSE Leap 15.2: zypper in -t patch openSUSE-2020-1001=1


Package List

- openSUSE Leap 15.2 (x86_64): ruby2.5-rubygem-puma-4.3.5-lp152.4.3.1 ruby2.5-rubygem-puma-debuginfo-4.3.5-lp152.4.3.1 ruby2.5-rubygem-puma-doc-4.3.5-lp152.4.3.1 rubygem-puma-debugsource-4.3.5-lp152.4.3.1


References

https://www.suse.com/security/cve/CVE-2020-11076.html https://www.suse.com/security/cve/CVE-2020-11077.html https://bugzilla.suse.com/1172175 https://bugzilla.suse.com/1172176--


Severity
Announcement ID: openSUSE-SU-2020:1001-1
Rating: moderate
Affected Products: openSUSE Leap 15.2

Related News