First published: Mon Jan 08 2024(Updated: )
### Impact Prior to versions 6.4.2 and 5.6.8, puma exhibited dangerous behavior when parsing chunked transfer encoding bodies. Fixed versions limit the size of chunk extensions. Without this limit, an attacker could cause unbounded resource (CPU, network bandwidth) consumption. ### Patches The vulnerability has been fixed in 6.4.2 and 5.6.8. ### Workarounds No known workarounds. ### References * [HTTP Request Smuggling](https://portswigger.net/web-security/request-smuggling) * Open an issue in [Puma](https://github.com/puma/puma) * See our [security policy](https://github.com/puma/puma/security/policy)
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
rubygems/puma | <5.6.8 | 5.6.8 |
rubygems/puma | >=6.0.0<6.4.2 | 6.4.2 |
Puma Puma | <5.6.8 | |
Puma Puma | >=6.0.0<6.4.2 | |
debian/puma | <=3.12.0-2+deb10u2<=3.12.0-2+deb10u3<=4.3.8-1<=4.3.8-1+deb11u2<=5.6.5-3 | 6.4.2-4 |
ubuntu/puma | <3.12.4-1ubuntu2+ | 3.12.4-1ubuntu2+ |
ubuntu/puma | <5.5.2-2ubuntu2+ | 5.5.2-2ubuntu2+ |
ubuntu/puma | <5.6.5-3ubuntu1.2 | 5.6.5-3ubuntu1.2 |
ubuntu/puma | <5.6.5-4ubuntu2.1 | 5.6.5-4ubuntu2.1 |
redhat/puma | <6.4.2 | 6.4.2 |
redhat/puma | <5.6.8 | 5.6.8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.