headlines
headlines copied to clipboard
[Security] Bump puma from 4.3.3 to 4.3.8
Bumps puma from 4.3.3 to 4.3.8. This update includes security fixes.
Vulnerabilities fixed
Sourced from The GitHub Security Advisory Database.
HTTP Smuggling via Transfer-Encoding Header in Puma
Impact
This is a similar but different vulnerability to the one patched in 3.12.5 and 4.3.4.
A client could smuggle a request through a proxy, causing the proxy to send a response back to another unknown client.
If the proxy uses persistent connections and the client adds another request in via HTTP pipelining, the proxy may mistake it as the first request's body. Puma, however, would see it as two requests, and when processing the second request, send back a response that the proxy does not expect. If the proxy has reused the persistent connection to Puma to send another request for a different client, the second response from the first client will be sent to the second client.
Patches
The problem has been fixed in Puma 3.12.6 and Puma 4.3.5.
For more information
If you have any questions or comments about this advisory:
- Open an issue in Puma
- See our security policy
Affected versions: >= 4.0.0, < 4.3.5
Sourced from The GitHub Security Advisory Database.
HTTP Smuggling via Transfer-Encoding Header in Puma
Impact
By using an invalid transfer-encoding header, an attacker could smuggle an HTTP response.
Originally reported by
@ZeddYu
, who has our thanks for the detailed report.Patches
The problem has been fixed in Puma 3.12.5 and Puma 4.3.4.
For more information
If you have any questions or comments about this advisory:
- Open an issue in Puma
- See our security policy
Affected versions: >= 4.0.0, < 4.3.4
Sourced from The Ruby Advisory Database.
HTTP Smuggling via Transfer-Encoding Header in Puma
Impact
By using an invalid transfer-encoding header, an attacker could smuggle an HTTP response.
Patches
The problem has been fixed in Puma 3.12.5 and Puma 4.3.4.
Patched versions: ~> 3.12.5; >= 4.3.4 Unaffected versions: none
Sourced from The Ruby Advisory Database.
HTTP Smuggling via Transfer-Encoding Header in Puma
Impact
This is a similar but different vulnerability to the one patched in 3.12.5 and 4.3.4.
A client could smuggle a request through a proxy, causing the proxy to send a response back to another unknown client.
If the proxy uses persistent connections and the client adds another request in via HTTP pipelining, the proxy may mistake it as the first request's body. Puma, however, would see it as two requests, and when processing the second request, send back a response that the proxy does not expect. If the proxy has reused the persistent connection to Puma to send another request for a different client, the second response from the first client will be sent to the second client.
Patches
The problem has been fixed in Puma 3.12.6 and Puma 4.3.5.
Patched versions: ~> 3.12.6; >= 4.3.5 Unaffected versions: none
Sourced from The GitHub Security Advisory Database.
Keepalive Connections Causing Denial Of Service in puma This vulnerability is related to CVE-2019-16770.
Impact
The fix for CVE-2019-16770 was incomplete. The original fix only protected existing connections that had already been accepted from having their requests starved by greedy persistent-connections saturating all threads in the same process. However, new connections may still be starved by greedy persistent-connections saturating all threads in all processes in the cluster.
A
puma
server which received more concurrentkeep-alive
connections than the server had threads in its threadpool would service only a subset of connections, denying service to the unserved connections.Patches
This problem has been fixed in
puma
4.3.8 and 5.3.1.Workarounds
Setting
queue_requests false
also fixes the issue. This is not advised when usingpuma
without a reverse proxy, such asnginx
orapache
, because you will open yourself to slow client attacks (e.g. slowloris).The fix is very small. A git patch is available here for those using unsupported versions of Puma.
For more information
... (truncated)
Affected versions: <= 4.3.7
Release notes
Sourced from puma's releases.
v4.3.8
- Security
- Close keepalive connections after the maximum number of fast inlined requests (#2625)
v4.3.6
https://github.com/puma/puma/compare/v4.3.5...4.3.6
A quick fix for a build error on Mac OS and a JSON require fix for those using phased restart.
Changelog
Sourced from puma's changelog.
4.3.8 / 2021-05-11
- Security
- Close keepalive connections after the maximum number of fast inlined requests (#2625)
4.3.7 / 2020-11-30
4.3.6 / 2020-09-05
- Bugfixes
4.3.4/4.3.5 and 3.12.5/3.12.6 / 2020-05-22
Each patchlevel release contains a separate security fix. We recommend simply upgrading to 4.3.5/3.12.6.
- Security
- Fix: Fixed two separate HTTP smuggling vulnerabilities that used the Transfer-Encoding header. CVE-2020-11076 and CVE-2020-11077.
Commits
b911c13
4.3.8 release note09bb777
Bump version constant8088950
Close keepalive connections after MAX_FAST_INLINE requestsf3c95af
4.3.777a90ec
Backport set CONTENT_LENGTH for chunked requests (#2496)a418e5c
Updates to 4.3.6 to pass CI, adds Ubuntu 20.04 [changelog skip] (#2380)3e3647a
v4.3.673cfdf5
Merge pull request #2314 from venables/fix-includefa54f4d
Merge pull request #2269 from MSP-Greg/json-requirea24b51b
Bump version- Additional commits viewable in compare view
Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase
.
Dependabot commands and options
You can trigger Dependabot actions by commenting on this PR:
-
@dependabot rebase
will rebase this PR -
@dependabot recreate
will recreate this PR, overwriting any edits that have been made to it -
@dependabot merge
will merge this PR after your CI passes on it -
@dependabot squash and merge
will squash and merge this PR after your CI passes on it -
@dependabot cancel merge
will cancel a previously requested merge and block automerging -
@dependabot reopen
will reopen this PR if it is closed -
@dependabot close
will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually -
@dependabot ignore this major version
will close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself) -
@dependabot ignore this minor version
will close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself) -
@dependabot ignore this dependency
will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself) -
@dependabot use these labels
will set the current labels as the default for future PRs for this repo and language -
@dependabot use these reviewers
will set the current reviewers as the default for future PRs for this repo and language -
@dependabot use these assignees
will set the current assignees as the default for future PRs for this repo and language -
@dependabot use this milestone
will set the current milestone as the default for future PRs for this repo and language -
@dependabot badge me
will comment on this PR with code to add a "Dependabot enabled" badge to your readme
Additionally, you can set the following in your Dependabot dashboard:
- Update frequency (including time of day and day of week)
- Pull request limits (per update run and/or open at any time)
- Out-of-range updates (receive only lockfile updates, if desired)
- Security updates (receive only security updates, if desired)