SUSE: 2020:2060-1 important: rubygem-puma
Summary
This update for rubygem-puma fixes the following issues: - Add patches for disabling TLSv1.0 and TLSv1.1 (jsc#SLE-6965): - Add CVE-2020-11077.patch (bsc#1172175, CVE-2020-11077) - Add CVE-2020-11076.patch (bsc#1172176, CVE-2020-11076) - Add CVE-2020-5247.patch (bsc#1165402) "Fixes a problem where we were not splitting newlines in headers according to Rack spec" The patch is reduced compared to the upstream version, which was patching also the parts that are not implemented in our old Puma version. This applies to unit test as well. - Add CVE-2019-16770.patch (bsc#1158675, SOC-10999, CVE-2019-16770) This patch fixes a DoS vulnerability a malicious client could use to block a large amount of threads. Patch Instructions: To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: - SUSE OpenStack Cloud 6-LTSS: zypper in -t patch SUSE-OpenStack-Cloud-6-LTSS-2020-2060=1 Package List: - SUSE OpenStack Cloud 6-LTSS (x86_64): ruby2.1-rubygem-puma-2.16.0-4.3.1 ruby2.1-rubygem-puma-debuginfo-2.16.0-4.3.1 rubygem-puma-debugsource-2.16.0-4.3.1
References
#1158675 #1165402 #1172175 #1172176
Cross- CVE-2019-16770 CVE-2020-11076 CVE-2020-11077
CVE-2020-5247
Affected Products:
SUSE OpenStack Cloud 6-LTSS
https://www.suse.com/security/cve/CVE-2019-16770.html
https://www.suse.com/security/cve/CVE-2020-11076.html
https://www.suse.com/security/cve/CVE-2020-11077.html
https://www.suse.com/security/cve/CVE-2020-5247.html
https://bugzilla.suse.com/1158675
https://bugzilla.suse.com/1165402
https://bugzilla.suse.com/1172175
https://bugzilla.suse.com/1172176