Bug 2257340 (CVE-2024-21647) - CVE-2024-21647 rubygem-puma: HTTP request smuggling when parsing chunked Transfer-Encoding Bodies
Summary: CVE-2024-21647 rubygem-puma: HTTP request smuggling when parsing chunked Tran...
Status: NEW
Alias: CVE-2024-21647
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
Target Milestone: ---
Assignee: Product Security
QA Contact:
Depends On: 2257341 2257342 2257343 2257344
Blocks: 2257339
TreeView+ depends on / blocked
Reported: 2024-01-08 22:09 UTC by Marco Benatto
Modified: 2024-04-26 13:21 UTC (History)
10 users (show)

Fixed In Version: puma 6.4.2, puma 5.6.8
Doc Type: If docs needed, set a value
Doc Text:
A flaw was found in Puma rubygem. Versions prior 6.4.2 are susceptible to a HTTP smuggling attack when parsing chunked transfer encoding bodies on HTTP messages, which don't limit the size of the message chunk extensions. This issue may lead to uncontrolled resource consumption, possibly resulting in a denial of service of the attacked server.
Clone Of:
Last Closed:

Attachments (Terms of Use)

System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2024:2010 0 None None None 2024-04-23 17:17:01 UTC

Description Marco Benatto 2024-01-08 22:09:40 UTC
Puma is a web server for Ruby/Rack applications built for parallelism. Prior to version 6.4.2, puma exhibited incorrect behavior when parsing chunked transfer encoding bodies in a way that allowed HTTP request smuggling. Fixed versions limits the size of chunk extensions. Without this limit, an attacker could cause unbounded resource (CPU, network bandwidth) consumption. This vulnerability has been fixed in versions 6.4.2 and 5.6.8.


Comment 1 Marco Benatto 2024-01-08 22:10:00 UTC
Created rubygem-puma tracking bugs for this issue:

Affects: fedora-all [bug 2257341]

Comment 4 errata-xmlrpc 2024-04-23 17:17:00 UTC
This issue has been addressed in the following products:

  Red Hat Satellite 6.15 for RHEL 8

Via RHSA-2024:2010 https://access.redhat.com/errata/RHSA-2024:2010

Note You need to log in before you can comment on or make changes to this bug.