[security-announce] openSUSE-SU-2020:1001-1: moderate: Security update for rubygem-puma
openSUSE Security Update: Security update for rubygem-puma ______________________________________________________________________________ Announcement ID: openSUSE-SU-2020:1001-1 Rating: moderate References: #1172175 #1172176 Cross-References: CVE-2020-11076 CVE-2020-11077 Affected Products: openSUSE Leap 15.2 ______________________________________________________________________________ An update that fixes two vulnerabilities is now available. Description: This update for rubygem-puma to version 4.3.5 fixes the following issues: - CVE-2020-11077: Fixed a HTTP smuggling issue related to proxy usage (bsc#1172175). - CVE-2020-11076: Fixed a HTTP smuggling issue when using an invalid transfer-encoding header (bsc#1172176). - Disabled TLSv1.0 and TLSv1.1 (jsc#SLE-6965). This update was imported from the SUSE:SLE-15:Update update project. Patch Instructions: To install this openSUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: - openSUSE Leap 15.2: zypper in -t patch openSUSE-2020-1001=1 Package List: - openSUSE Leap 15.2 (x86_64): ruby2.5-rubygem-puma-4.3.5-lp152.4.3.1 ruby2.5-rubygem-puma-debuginfo-4.3.5-lp152.4.3.1 ruby2.5-rubygem-puma-doc-4.3.5-lp152.4.3.1 rubygem-puma-debugsource-4.3.5-lp152.4.3.1 References: https://www.suse.com/security/cve/CVE-2020-11076.html https://www.suse.com/security/cve/CVE-2020-11077.html https://bugzilla.suse.com/1172175 https://bugzilla.suse.com/1172176 -- To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org For additional commands, e-mail: opensuse-security-announce+help@opensuse.org
participants (1)
-
opensuse-security@opensuse.org