ALT-PU-2021-2596-1
Closed vulnerabilities
BDU:2020-04071
Уязвимость HTTP-сервера для Ruby/Rack приложений Puma, связанная с недостатками обработки HTTP-запросов, позволяющая нарушителю оказать влияние на целостность информации
BDU:2021-05079
Уязвимость HTTP-сервера для Ruby/Rack приложений Puma, связанная с неконтролируемым расходом ресурсов, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2020-11076
In Puma (RubyGem) before 4.3.4 and 3.12.5, an attacker could smuggle an HTTP response, by using an invalid transfer-encoding header. The problem has been fixed in Puma 3.12.5 and Puma 4.3.4.
- openSUSE-SU-2020:0990
- openSUSE-SU-2020:1001
- https://github.com/puma/puma/blob/master/History.md#434435-and-31253126--2020-05-22
- https://github.com/puma/puma/commit/f24d5521295a2152c286abb0a45a1e1e2bd275bd
- https://github.com/puma/puma/security/advisories/GHSA-x7jg-6pwg-fx5h
- [debian-lts-announce] 20201007 [SECURITY] [DLA 2398-1] puma security update
- FEDORA-2020-fe354f24e8
- openSUSE-SU-2020:0990
- FEDORA-2020-fe354f24e8
- [debian-lts-announce] 20201007 [SECURITY] [DLA 2398-1] puma security update
- https://github.com/puma/puma/security/advisories/GHSA-x7jg-6pwg-fx5h
- https://github.com/puma/puma/commit/f24d5521295a2152c286abb0a45a1e1e2bd275bd
- https://github.com/puma/puma/blob/master/History.md#434435-and-31253126--2020-05-22
- openSUSE-SU-2020:1001
Modified: 2024-11-21
CVE-2020-11077
In Puma (RubyGem) before 4.3.5 and 3.12.6, a client could smuggle a request through a proxy, causing the proxy to send a response back to another unknown client. If the proxy uses persistent connections and the client adds another request in via HTTP pipelining, the proxy may mistake it as the first request's body. Puma, however, would see it as two requests, and when processing the second request, send back a response that the proxy does not expect. If the proxy has reused the persistent connection to Puma to send another request for a different client, the second response from the first client will be sent to the second client. This is a similar but different vulnerability from CVE-2020-11076. The problem has been fixed in Puma 3.12.6 and Puma 4.3.5.
- openSUSE-SU-2020:0990
- openSUSE-SU-2020:1001
- https://github.com/puma/puma/blob/master/History.md#434435-and-31253126--2020-05-22
- https://github.com/puma/puma/security/advisories/GHSA-w64w-qqph-5gxm
- [debian-lts-announce] 20201007 [SECURITY] [DLA 2398-1] puma security update
- FEDORA-2020-fe354f24e8
- openSUSE-SU-2020:0990
- FEDORA-2020-fe354f24e8
- [debian-lts-announce] 20201007 [SECURITY] [DLA 2398-1] puma security update
- https://github.com/puma/puma/security/advisories/GHSA-w64w-qqph-5gxm
- https://github.com/puma/puma/blob/master/History.md#434435-and-31253126--2020-05-22
- openSUSE-SU-2020:1001
Modified: 2024-11-21
CVE-2021-29509
Puma is a concurrent HTTP 1.1 server for Ruby/Rack applications. The fix for CVE-2019-16770 was incomplete. The original fix only protected existing connections that had already been accepted from having their requests starved by greedy persistent-connections saturating all threads in the same process. However, new connections may still be starved by greedy persistent-connections saturating all threads in all processes in the cluster. A `puma` server which received more concurrent `keep-alive` connections than the server had threads in its threadpool would service only a subset of connections, denying service to the unserved connections. This problem has been fixed in `puma` 4.3.8 and 5.3.1. Setting `queue_requests false` also fixes the issue. This is not advised when using `puma` without a reverse proxy, such as `nginx` or `apache`, because you will open yourself to slow client attacks (e.g. slowloris). The fix is very small and a git patch is available for those using unsupported versions of Puma.
- https://gist.github.com/nateberkopec/4b3ea5676c0d70cbb37c82d54be25837
- https://gist.github.com/nateberkopec/4b3ea5676c0d70cbb37c82d54be25837
- https://github.com/puma/puma/security/advisories/GHSA-q28m-8xjw-8vr5
- https://github.com/puma/puma/security/advisories/GHSA-q28m-8xjw-8vr5
- https://github.com/puma/puma/security/policy
- https://github.com/puma/puma/security/policy
- [debian-lts-announce] 20220827 [SECURITY] [DLA 3083-1] puma security update
- [debian-lts-announce] 20220827 [SECURITY] [DLA 3083-1] puma security update
- https://rubygems.org/gems/puma
- https://rubygems.org/gems/puma
- GLSA-202208-28
- GLSA-202208-28