CVE-2019-16770

In Puma before versions 3.12.2 and 4.3.1, a poorly-behaved client could use keepalive requests to monopolize Puma's reactor and create a denial of service attack. If more keepalive connections to Puma are opened than there are threads available, additional connections will wait permanently if the attacker sends requests frequently enough. This vulnerability is patched in Puma 4.3.1 and 3.12.2.
References
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:puma:puma:*:*:*:*:*:ruby:*:*
cpe:2.3:a:puma:puma:*:*:*:*:*:ruby:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*

History

08 Oct 2022, 02:42

Type Values Removed Values Added
First Time Debian debian Linux
Debian
CPE cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
References (MLIST) https://lists.debian.org/debian-lts-announce/2022/05/msg00034.html - (MLIST) https://lists.debian.org/debian-lts-announce/2022/05/msg00034.html - Mailing List, Third Party Advisory

26 May 2022, 01:15

Type Values Removed Values Added
References
  • (MLIST) https://lists.debian.org/debian-lts-announce/2022/05/msg00034.html -

Information

Published : 2019-12-05 20:15

Updated : 2023-12-10 13:13


NVD link : CVE-2019-16770

Mitre link : CVE-2019-16770

CVE.ORG link : CVE-2019-16770


JSON object : View

Products Affected

puma

  • puma

debian

  • debian_linux
CWE
CWE-770

Allocation of Resources Without Limits or Throttling