CVE-2019-16770

In Puma before versions 3.12.2 and 4.3.1, a poorly-behaved client could use keepalive requests to monopolize Puma's reactor and create a denial of service attack. If more keepalive connections to Puma are opened than there are threads available, additional connections will wait permanently if the attacker sends requests frequently enough. This vulnerability is patched in Puma 4.3.1 and 3.12.2.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:puma:puma:*:*:*:*:*:ruby:*:*
cpe:2.3:a:puma:puma:*:*:*:*:*:ruby:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*

History

21 Nov 2024, 04:31

Type Values Removed Values Added
References () https://github.com/puma/puma/security/advisories/GHSA-7xx3-m584-x994 - Mitigation, Third Party Advisory () https://github.com/puma/puma/security/advisories/GHSA-7xx3-m584-x994 - Mitigation, Third Party Advisory
References () https://lists.debian.org/debian-lts-announce/2022/05/msg00034.html - Mailing List, Third Party Advisory () https://lists.debian.org/debian-lts-announce/2022/05/msg00034.html - Mailing List, Third Party Advisory
CVSS v2 : 5.0
v3 : 7.5
v2 : 5.0
v3 : 5.3

Information

Published : 2019-12-05 20:15

Updated : 2024-11-21 04:31


NVD link : CVE-2019-16770

Mitre link : CVE-2019-16770

CVE.ORG link : CVE-2019-16770


JSON object : View

Products Affected

puma

  • puma

debian

  • debian_linux
CWE
CWE-770

Allocation of Resources Without Limits or Throttling