File _patchinfo of Package patchinfo.15625
<patchinfo incident="15625">
<issue tracker="jsc" id="SLE-6965"/>
<issue tracker="bnc" id="1172175">VUL-1: CVE-2020-11077: rubygem-puma: client could smuggle a request through a proxy, causing the proxy to send a response back to another unknown client</issue>
<issue tracker="bnc" id="1172176">VUL-1: CVE-2020-11076: rubygem-puma: attacker could smuggle an HTTP response, by using an invalid transfer-encoding header</issue>
<issue tracker="cve" id="2020-11076"/>
<issue tracker="cve" id="2020-11077"/>
<packager>dmaiocchi</packager>
<rating>moderate</rating>
<category>security</category>
<summary>Security update for rubygem-puma</summary>
<description>This update for rubygem-puma to version 4.3.5 fixes the following issues:
- CVE-2020-11077: Fixed a HTTP smuggling issue related to proxy usage (bsc#1172175).
- CVE-2020-11076: Fixed a HTTP smuggling issue when using an invalid transfer-encoding header (bsc#1172176).
- Disabled TLSv1.0 and TLSv1.1 (jsc#SLE-6965).
</description>
</patchinfo>