File _patchinfo of Package patchinfo.15815

<patchinfo incident="15815">
  <issue tracker="jsc" id="SOC-10999"/>
  <issue tracker="jsc" id="SLE-6965"/>
  <issue tracker="cve" id="2019-16770"/>
  <issue tracker="cve" id="2020-5247"/>
  <issue tracker="cve" id="2020-11076"/>
  <issue tracker="cve" id="2020-11077"/>
  <issue tracker="bnc" id="1172175">VUL-0: CVE-2020-11077: rubygem-puma: client could smuggle a request through a proxy, causing the proxy to send a response back to another unknown client</issue>
  <issue tracker="bnc" id="1158675">VUL-1: CVE-2019-16770: rubygem-puma: A poorly-behaved client could use keepalive requests to monopolize Puma's reactor and create a denial of service attack</issue>
  <issue tracker="bnc" id="1165402">VUL-1: CVE-2020-5247: rubygem-puma: if an application allows untrusted input in a response header, an attacker can use newline characters (i.e. `CR`, `LF` or`/r`, `/n`) to end the header and inject malicious content</issue>
  <issue tracker="bnc" id="1172176">VUL-1: CVE-2020-11076: rubygem-puma:  attacker could smuggle an HTTP response, by using an invalid transfer-encoding header</issue>
  <packager>dmaiocchi</packager>
  <rating>important</rating>
  <category>security</category>
  <summary>Security update for rubygem-puma</summary>
  <description>This update for rubygem-puma fixes the following issues:

- Add patches for disabling TLSv1.0 and TLSv1.1 (jsc#SLE-6965):
- Add CVE-2020-11077.patch (bsc#1172175, CVE-2020-11077)
- Add CVE-2020-11076.patch (bsc#1172176, CVE-2020-11076)
- Add CVE-2020-5247.patch (bsc#1165402)
  "Fixes a problem where we were not splitting newlines in headers
  according to Rack spec"
  The patch is reduced compared to the upstream version, which was
  patching also the parts that are not implemented in our old Puma
  version. This applies to unit test as well.
- Add CVE-2019-16770.patch (bsc#1158675, SOC-10999, CVE-2019-16770)
  This patch fixes a DoS vulnerability a malicious client could use to
  block a large amount of threads.
</description>
</patchinfo>
openSUSE Build Service is sponsored by