<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for rubygem-puma</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE-SU-2025:03466-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2025-10-07T11:33:53Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2025-10-07T11:33:53Z</InitialReleaseDate>
    <CurrentReleaseDate>2025-10-07T11:33:53Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for rubygem-puma</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for rubygem-puma fixes the following issues:

Update to version 5.6.9.

- CVE-2024-45614: improper header normalization allows for clients to clobber proxy set headers, which can lead to
  information leaks (bsc#1230848, fixed in an earlier update).
- CVE-2024-21647: unbounded resource consumption due to invalid parsing of chunked encoding in HTTP/1.1 can lead to
  denial-of-service attacks (bsc#1218638, fixed in an earlier update)
- CVE-2023-40175: incorrect behavior when parsing chunked transfer encoding bodies and zero-length Content-Length
  headers can lead to HTTP request smuggling attacks (bsc#1214425, fixed in an earlier update).
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">SUSE-2025-3466,SUSE-SLE-Product-HA-15-SP3-2025-3466,SUSE-SLE-Product-HA-15-SP4-2025-3466,SUSE-SLE-Product-HA-15-SP5-2025-3466</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202503466-1/</URL>
      <Description>Link for SUSE-SU-2025:03466-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://lists.suse.com/pipermail/sle-updates/2025-October/042013.html</URL>
      <Description>E-Mail link for SUSE-SU-2025:03466-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1214425</URL>
      <Description>SUSE Bug 1214425</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1218638</URL>
      <Description>SUSE Bug 1218638</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1230848</URL>
      <Description>SUSE Bug 1230848</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-40175/</URL>
      <Description>SUSE CVE CVE-2023-40175 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-21647/</URL>
      <Description>SUSE CVE CVE-2024-21647 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-45614/</URL>
      <Description>SUSE CVE CVE-2024-45614 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="SUSE Linux Enterprise High Availability Extension 15 SP3">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise High Availability Extension 15 SP3">
        <FullProductName ProductID="SUSE Linux Enterprise High Availability Extension 15 SP3" CPE="cpe:/o:suse:sle-ha:15:sp3">SUSE Linux Enterprise High Availability Extension 15 SP3</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise High Availability Extension 15 SP4">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise High Availability Extension 15 SP4">
        <FullProductName ProductID="SUSE Linux Enterprise High Availability Extension 15 SP4" CPE="cpe:/o:suse:sle-ha:15:sp4">SUSE Linux Enterprise High Availability Extension 15 SP4</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise High Availability Extension 15 SP5">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise High Availability Extension 15 SP5">
        <FullProductName ProductID="SUSE Linux Enterprise High Availability Extension 15 SP5" CPE="cpe:/o:suse:sle-ha:15:sp5">SUSE Linux Enterprise High Availability Extension 15 SP5</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="ruby2.5-rubygem-puma-5.6.9-150000.3.18.1">
      <FullProductName ProductID="ruby2.5-rubygem-puma-5.6.9-150000.3.18.1">ruby2.5-rubygem-puma-5.6.9-150000.3.18.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="ruby2.5-rubygem-puma-doc-5.6.9-150000.3.18.1">
      <FullProductName ProductID="ruby2.5-rubygem-puma-doc-5.6.9-150000.3.18.1">ruby2.5-rubygem-puma-doc-5.6.9-150000.3.18.1</FullProductName>
    </Branch>
    <Relationship ProductReference="ruby2.5-rubygem-puma-5.6.9-150000.3.18.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise High Availability Extension 15 SP3">
      <FullProductName ProductID="SUSE Linux Enterprise High Availability Extension 15 SP3:ruby2.5-rubygem-puma-5.6.9-150000.3.18.1">ruby2.5-rubygem-puma-5.6.9-150000.3.18.1 as a component of SUSE Linux Enterprise High Availability Extension 15 SP3</FullProductName>
    </Relationship>
    <Relationship ProductReference="ruby2.5-rubygem-puma-5.6.9-150000.3.18.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise High Availability Extension 15 SP4">
      <FullProductName ProductID="SUSE Linux Enterprise High Availability Extension 15 SP4:ruby2.5-rubygem-puma-5.6.9-150000.3.18.1">ruby2.5-rubygem-puma-5.6.9-150000.3.18.1 as a component of SUSE Linux Enterprise High Availability Extension 15 SP4</FullProductName>
    </Relationship>
    <Relationship ProductReference="ruby2.5-rubygem-puma-5.6.9-150000.3.18.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise High Availability Extension 15 SP5">
      <FullProductName ProductID="SUSE Linux Enterprise High Availability Extension 15 SP5:ruby2.5-rubygem-puma-5.6.9-150000.3.18.1">ruby2.5-rubygem-puma-5.6.9-150000.3.18.1 as a component of SUSE Linux Enterprise High Availability Extension 15 SP5</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Puma is a Ruby/Rack web server built for parallelism. Prior to versions 6.3.1 and 5.6.7, puma exhibited incorrect behavior when parsing chunked transfer encoding bodies and zero-length Content-Length headers in a way that allowed HTTP request smuggling. Severity of this issue is highly dependent on the nature of the web site using puma is. This could be caused by either incorrect parsing of trailing fields in chunked transfer encoding bodies or by parsing of blank/zero-length Content-Length headers. Both issues have been addressed and this vulnerability has been fixed in versions 6.3.1 and 5.6.7. Users are advised to upgrade. There are no known workarounds for this vulnerability.</Note>
    </Notes>
    <CVE>CVE-2023-40175</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise High Availability Extension 15 SP3:ruby2.5-rubygem-puma-5.6.9-150000.3.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Availability Extension 15 SP4:ruby2.5-rubygem-puma-5.6.9-150000.3.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Availability Extension 15 SP5:ruby2.5-rubygem-puma-5.6.9-150000.3.18.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202503466-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-40175.html</URL>
        <Description>CVE-2023-40175</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1214425</URL>
        <Description>SUSE Bug 1214425</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Puma is a web server for Ruby/Rack applications built for parallelism. Prior to version 6.4.2, puma exhibited incorrect behavior when parsing chunked transfer encoding bodies in a way that allowed HTTP request smuggling. Fixed versions limits the size of chunk extensions. Without this limit, an attacker could cause unbounded resource (CPU, network bandwidth) consumption. This vulnerability has been fixed in versions 6.4.2 and 5.6.8.

</Note>
    </Notes>
    <CVE>CVE-2024-21647</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise High Availability Extension 15 SP3:ruby2.5-rubygem-puma-5.6.9-150000.3.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Availability Extension 15 SP4:ruby2.5-rubygem-puma-5.6.9-150000.3.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Availability Extension 15 SP5:ruby2.5-rubygem-puma-5.6.9-150000.3.18.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202503466-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-21647.html</URL>
        <Description>CVE-2024-21647</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1218638</URL>
        <Description>SUSE Bug 1218638</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Puma is a Ruby/Rack web server built for parallelism. In affected versions clients could clobber values set by intermediate proxies (such as X-Forwarded-For) by providing a underscore version of the same header (X-Forwarded_For). Any users relying on proxy set variables is affected. v6.4.3/v5.6.9 now discards any headers using underscores if the non-underscore version also exists. Effectively, allowing the proxy defined headers to always win. Users are advised to upgrade. Nginx has a underscores_in_headers configuration variable to discard these headers at the proxy level as a mitigation. Any users that are implicitly trusting the proxy defined headers for security should immediately cease doing so until upgraded to the fixed versions.</Note>
    </Notes>
    <CVE>CVE-2024-45614</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise High Availability Extension 15 SP3:ruby2.5-rubygem-puma-5.6.9-150000.3.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Availability Extension 15 SP4:ruby2.5-rubygem-puma-5.6.9-150000.3.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Availability Extension 15 SP5:ruby2.5-rubygem-puma-5.6.9-150000.3.18.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202503466-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-45614.html</URL>
        <Description>CVE-2024-45614</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1230848</URL>
        <Description>SUSE Bug 1230848</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
