aboutsummaryrefslogtreecommitdiffstats
path: root/english
diff options
context:
space:
mode:
authorAbhijith PA <abhijith@debian.org>2020-10-08 10:04:25 +0530
committerAbhijith PA <abhijith@debian.org>2020-10-08 10:04:25 +0530
commit1721318e4931a6644ae5d066132365cb278ba026 (patch)
treefef3734ad04aa8f8f0513d8787a24b468c44abd0 /english
parent5e385c31962f9e1020362c580654b3b158f32575 (diff)
DLA-2398-1
Diffstat (limited to 'english')
-rw-r--r--english/lts/security/2020/dla-2398.data10
-rw-r--r--english/lts/security/2020/dla-2398.wml43
2 files changed, 53 insertions, 0 deletions
diff --git a/english/lts/security/2020/dla-2398.data b/english/lts/security/2020/dla-2398.data
new file mode 100644
index 00000000000..d4f9e050fd6
--- /dev/null
+++ b/english/lts/security/2020/dla-2398.data
@@ -0,0 +1,10 @@
+<define-tag pagetitle>DLA-2398-1 puma</define-tag>
+<define-tag report_date>2020-10-08</define-tag>
+<define-tag secrefs>CVE-2020-11076 CVE-2020-11077</define-tag>
+<define-tag packages>puma</define-tag>
+<define-tag isvulnerable>yes</define-tag>
+<define-tag fixed>yes</define-tag>
+<define-tag fixed-section>no</define-tag>
+
+#use wml::debian::security
+
diff --git a/english/lts/security/2020/dla-2398.wml b/english/lts/security/2020/dla-2398.wml
new file mode 100644
index 00000000000..1cb678fa32a
--- /dev/null
+++ b/english/lts/security/2020/dla-2398.wml
@@ -0,0 +1,43 @@
+<define-tag description>LTS security update</define-tag>
+<define-tag moreinfo>
+<p>Several security vulnerabilities have been discovered in puma, highly
+concurrent HTTP server for Ruby/Rack applications.</p>
+
+<ul>
+
+<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-11076">CVE-2020-11076</a>
+
+ <p>By using an invalid transfer-encoding header, an attacker could smuggle
+ an HTTP response.</p></li>
+
+<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-11077">CVE-2020-11077</a>
+
+ <p>client could smuggle a request through a proxy, causing the proxy to
+ send a response back to another unknown client. If the proxy uses
+ persistent connections and the client adds another request in via HTTP
+ pipelining, the proxy may mistake it as the first request's body. Puma,
+ however, would see it as two requests, and when processing the second
+ request, send back a response that the proxy does not expect. If the
+ proxy has reused the persistent connection to Puma to send another
+ request for a different client, the second response from the first
+ client will be sent to the second client.</p></li>
+
+</ul>
+
+<p>For Debian 9 stretch, this problem has been fixed in version
+3.6.0-1+deb9u1.</p>
+
+<p>We recommend that you upgrade your puma packages.</p>
+
+<p>For the detailed security status of puma please refer to
+its security tracker page at:
+<a href="https://security-tracker.debian.org/tracker/puma">https://security-tracker.debian.org/tracker/puma</a></p>
+
+<p>Further information about Debian LTS security advisories, how to apply
+these updates to your system and frequently asked questions can be
+found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
+</define-tag>
+
+# do not modify the following line
+#include "$(ENGLISHDIR)/lts/security/2020/dla-2398.data"
+# $Id: $

© 2014-2024 Faster IT GmbH | imprint | privacy policy