Debian Linux Security Advisory 5146-1 - Multiple security vulnerabilities were discovered in Puma, a HTTP server for Ruby/Rack applications, which could result in HTTP request smuggling or information disclosure.
875d2755cc0a513d860625e8cd44e53f4aa7ee7212205db738d63af27b06de7a
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
- -------------------------------------------------------------------------
Debian Security Advisory DSA-5146-1 security@debian.org
https://www.debian.org/security/ Moritz Muehlenhoff
May 24, 2022 https://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : puma
CVE ID : CVE-2021-41136 CVE-2022-23634 CVE-2022-24790
Multiple security vulnerabilities were discovered in Puma, a HTTP server
for Ruby/Rack applications, which could result in HTTP request smuggling
or information disclosure.
For the stable distribution (bullseye), this problem has been fixed in
version 4.3.8-1+deb11u2.
We recommend that you upgrade your puma packages.
For the detailed security status of puma please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/puma
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
Mailing list: debian-security-announce@lists.debian.org
-----BEGIN PGP SIGNATURE-----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=w9Nx
-----END PGP SIGNATURE-----