VYPR

rpm package

suse/rubygem-puma&distro=SUSE OpenStack Cloud 6-LTSS

pkg:rpm/suse/rubygem-puma&distro=SUSE%20OpenStack%20Cloud%206-LTSS

Vulnerabilities (4)

  • CVE-2020-11077May 22, 2020
    affected < 2.16.0-4.3.1fixed 2.16.0-4.3.1

    In Puma (RubyGem) before 4.3.5 and 3.12.6, a client could smuggle a request through a proxy, causing the proxy to send a response back to another unknown client. If the proxy uses persistent connections and the client adds another request in via HTTP pipelining, the proxy may mis

  • CVE-2020-11076May 22, 2020
    affected < 2.16.0-4.3.1fixed 2.16.0-4.3.1

    In Puma (RubyGem) before 4.3.4 and 3.12.5, an attacker could smuggle an HTTP response, by using an invalid transfer-encoding header. The problem has been fixed in Puma 3.12.5 and Puma 4.3.4.

  • CVE-2020-5247Feb 28, 2020
    affected < 2.16.0-4.3.1fixed 2.16.0-4.3.1

    In Puma (RubyGem) before 4.3.2 and before 3.12.3, if an application using Puma allows untrusted input in a response header, an attacker can use newline characters (i.e. `CR`, `LF` or`/r`, `/n`) to end the header and inject malicious content, such as additional headers or an entir

  • CVE-2019-16770Dec 5, 2019
    affected < 2.16.0-4.3.1fixed 2.16.0-4.3.1

    In Puma before versions 3.12.2 and 4.3.1, a poorly-behaved client could use keepalive requests to monopolize Puma's reactor and create a denial of service attack. If more keepalive connections to Puma are opened than there are threads available, additional connections will wait p