Security update for rubygem-puma
Announcement ID: | SUSE-SU-2020:2060-1 |
---|---|
Rating: | important |
References: | |
Cross-References: | |
CVSS scores: |
|
Affected Products: |
|
An update that solves four vulnerabilities and contains two features can now be installed.
Description:
This update for rubygem-puma fixes the following issues:
- Add patches for disabling TLSv1.0 and TLSv1.1 (jsc#SLE-6965):
- Add CVE-2020-11077.patch (bsc#1172175, CVE-2020-11077)
- Add CVE-2020-11076.patch (bsc#1172176, CVE-2020-11076)
- Add CVE-2020-5247.patch (bsc#1165402) "Fixes a problem where we were not splitting newlines in headers according to Rack spec" The patch is reduced compared to the upstream version, which was patching also the parts that are not implemented in our old Puma version. This applies to unit test as well.
- Add CVE-2019-16770.patch (bsc#1158675, SOC-10999, CVE-2019-16770) This patch fixes a DoS vulnerability a malicious client could use to block a large amount of threads.
Patch Instructions:
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
-
SUSE OpenStack Cloud 6 LTSS 6
zypper in -t patch SUSE-OpenStack-Cloud-6-LTSS-2020-2060=1
Package List:
-
SUSE OpenStack Cloud 6 LTSS 6 (x86_64)
- ruby2.1-rubygem-puma-2.16.0-4.3.1
- ruby2.1-rubygem-puma-debuginfo-2.16.0-4.3.1
- rubygem-puma-debugsource-2.16.0-4.3.1
References:
- https://www.suse.com/security/cve/CVE-2019-16770.html
- https://www.suse.com/security/cve/CVE-2020-11076.html
- https://www.suse.com/security/cve/CVE-2020-11077.html
- https://www.suse.com/security/cve/CVE-2020-5247.html
- https://bugzilla.suse.com/show_bug.cgi?id=1158675
- https://bugzilla.suse.com/show_bug.cgi?id=1165402
- https://bugzilla.suse.com/show_bug.cgi?id=1172175
- https://bugzilla.suse.com/show_bug.cgi?id=1172176
- https://jira.suse.com/browse/SLE-6965
- https://jira.suse.com/browse/SOC-10999