In Puma (RubyGem) before 4.3.4 and 3.12.5, an attacker could smuggle an HTTP response, by using an invalid transfer-encoding header. The problem has been fixed in Puma 3.12.5 and Puma 4.3.4. References: https://github.com/puma/puma/security/advisories/GHSA-x7jg-6pwg-fx5h https://github.com/puma/puma/blob/master/History.md#434435-and-31253126--2020-05-22 Upstream commit: https://github.com/puma/puma/commit/f24d5521295a2152c286abb0a45a1e1e2bd275bd
Created rubygem-puma tracking bugs for this issue: Affects: fedora-all [bug 1842540]
External References: https://github.com/puma/puma/security/advisories/GHSA-x7jg-6pwg-fx5h
Mitigation: Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.
Statement: Red Hat Gluster Storage 3 Web Administration component uses affected RubyGem Puma, which does not have the http body chunk verification.