File _patchinfo of Package patchinfo.40797
<patchinfo incident="40797"> <issue tracker="bnc" id="1218638">VUL-0: CVE-2024-21647: rubygem-puma: DoS when parsing chunked Transfer-Encoding bodies</issue> <issue tracker="bnc" id="1230848">VUL-0: CVE-2024-45614: rubygem-puma: Header normalization allows for client to clobber proxy set headers</issue> <issue tracker="bnc" id="1214425">VUL-0: CVE-2023-40175: rubygem-puma: HTTP request smuggling when parsing chunked transfer encoding bodies and zero-length content-length headers</issue> <issue tracker="cve" id="2024-45614"/> <issue tracker="cve" id="2024-21647"/> <issue tracker="cve" id="2023-40175"/> <packager>aburlakov</packager> <rating>important</rating> <category>security</category> <summary>Security update for rubygem-puma</summary> <description>This update for rubygem-puma fixes the following issues: Update to version 5.6.9. - CVE-2024-45614: improper header normalization allows for clients to clobber proxy set headers, which can lead to information leaks (bsc#1230848, fixed in an earlier update). - CVE-2024-21647: unbounded resource consumption due to invalid parsing of chunked encoding in HTTP/1.1 can lead to denial-of-service attacks (bsc#1218638, fixed in an earlier update) - CVE-2023-40175: incorrect behavior when parsing chunked transfer encoding bodies and zero-length Content-Length headers can lead to HTTP request smuggling attacks (bsc#1214425, fixed in an earlier update). </description> </patchinfo>