Categories
NVD NVD Nist GOV

NVD – CVE-2020-10711

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to [email protected].

Categories
NVD NVD Nist GOV

NVD – CVE-2020-10719

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to [email protected].

Categories
NVD NVD Nist GOV

NVD – CVE-2020-10751

Awaiting Analysis


This vulnerability is currently awaiting analysis.

A flaw was found in the Linux kernels SELinux LSM hook implementation before version 5.7, where it incorrectly assumed that an skb would only contain a single netlink message. The hook would incorrectly only validate the first netlink message in the skb and allow or deny the rest of the messages within the skb with the granted permission without further processing.

Categories
NVD NVD Nist GOV

NVD – CVE-2020-11076

CVE-2020-11076 Detail

Current Description

In Puma (RubyGem) before 4.3.4 and 3.12.5, an attacker could smuggle an HTTP response, by using an invalid transfer-encoding header. The problem has been fixed in Puma 3.12.5 and Puma 4.3.4.

Source:  MITRE
View Analysis Description

Analysis Description

In Puma (RubyGem) before 4.3.4 and 3.12.5, an attacker could smuggle an HTTP response, by using an invalid transfer-encoding header. The problem has been fixed in Puma 3.12.5 and Puma 4.3.4.

Source:  MITRE

Severity

CVSS 3.x Severity and Metrics:

CVSS 2.0 Severity and Metrics:

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to [email protected].

Weakness Enumeration

CWE-ID CWE Name Source
CWE-444 Inconsistent Interpretation of HTTP Requests (‘HTTP Request Smuggling’) NIST   GitHub, Inc.  

Known Affected Software Configurations Switch to CPE 2.2

Configuration 1 ( hide )

 cpe:2.3:a:puma:puma:*:*:*:*:*:ruby:*:*
     Show Matching CPE(s)
From (including)
3.0.0
Up to (excluding)
3.12.6
 cpe:2.3:a:puma:puma:*:*:*:*:*:ruby:*:*
     Show Matching CPE(s)
From (including)
4.0.0
Up to (excluding)
4.3.5

Change History

1 change record found – show changes

Initial Analysis5/27/2020 10:38:56 AM

Action Type Old Value New Value
Added CPE Configuration
OR
     *cpe:2.3:a:puma:puma:*:*:*:*:*:ruby:*:* versions from (including) 3.0.0 up to (excluding) 3.12.6
     *cpe:2.3:a:puma:puma:*:*:*:*:*:ruby:*:* versions from (including) 4.0.0 up to (excluding) 4.3.5
Added CVSS V2
NIST (AV:N/AC:L/Au:N/C:N/I:P/A:N)
Added CVSS V3.1
NIST AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
Added CWE
NIST CWE-444
Changed Reference Type
https://github.com/puma/puma/blob/master/History.md#434435-and-31253126--2020-05-22 No Types Assigned
https://github.com/puma/puma/blob/master/History.md#434435-and-31253126--2020-05-22 Release Notes, Third Party Advisory
Changed Reference Type
https://github.com/puma/puma/commit/f24d5521295a2152c286abb0a45a1e1e2bd275bd No Types Assigned
https://github.com/puma/puma/commit/f24d5521295a2152c286abb0a45a1e1e2bd275bd Patch, Third Party Advisory
Changed Reference Type
https://github.com/puma/puma/security/advisories/GHSA-x7jg-6pwg-fx5h No Types Assigned
https://github.com/puma/puma/security/advisories/GHSA-x7jg-6pwg-fx5h Third Party Advisory

Quick Info

CVE Dictionary Entry:
CVE-2020-11076
NVD Published Date:
05/22/2020
NVD Last Modified:
05/27/2020

Categories
NVD NVD Nist GOV

NVD – CVE-2020-11077

Undergoing Analysis


This vulnerability is currently undergoing analysis and not all information is available. Please check back soon to view the completed vulnerability summary.

In Puma (RubyGem) before 4.3.5 and 3.12.6, a client could smuggle a request through a proxy, causing the proxy to send a response back to another unknown client. If the proxy uses persistent connections and the client adds another request in via HTTP pipelining, the proxy may mistake it as the first request’s body. Puma, however, would see it as two requests, and when processing the second request, send back a response that the proxy does not expect. If the proxy has reused the persistent connection to Puma to send another request for a different client, the second response from the first client will be sent to the second client. This is a similar but different vulnerability from CVE-2020-11076. The problem has been fixed in Puma 3.12.6 and Puma 4.3.5.

Categories
NVD NVD Nist GOV

NVD – CVE-2020-11970

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to [email protected].

Hyperlink Resource
Categories
NVD NVD Nist GOV

NVD – CVE-2020-12387

Undergoing Analysis


This vulnerability is currently undergoing analysis and not all information is available. Please check back soon to view the completed vulnerability summary.

A race condition when running shutdown code for Web Worker led to a use-after-free vulnerability. This resulted in a potentially exploitable crash. This vulnerability affects Firefox ESR < 68.8, Firefox < 76, and Thunderbird < 68.8.0.

Categories
NVD NVD Nist GOV

NVD – CVE-2020-12388

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to [email protected].

Categories
NVD NVD Nist GOV

NVD – CVE-2020-12389

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to [email protected].

Categories
NVD NVD Nist GOV

NVD – CVE-2020-12390

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to [email protected].