Page 3 of 11 results (0.003 seconds)

CVSS: 7.5EPSS: 0%CPEs: 3EXPL: 0

In Puma before versions 3.12.2 and 4.3.1, a poorly-behaved client could use keepalive requests to monopolize Puma's reactor and create a denial of service attack. If more keepalive connections to Puma are opened than there are threads available, additional connections will wait permanently if the attacker sends requests frequently enough. This vulnerability is patched in Puma 4.3.1 and 3.12.2. En Puma, anterior a las versiones 3.12.2 y 4.3.1, un cliente con mal comportamiento podría utilizar solicitudes de keepalive para monopolizar el reactor de Puma y crear un ataque de denegación de servicio. Si se abren más conexiones keepalive a Puma que hilos disponibles, las conexiones adicionales esperarán permanentemente si el atacante envía solicitudes con la suficiente frecuencia. • https://github.com/puma/puma/security/advisories/GHSA-7xx3-m584-x994 https://lists.debian.org/debian-lts-announce/2022/05/msg00034.html • CWE-770: Allocation of Resources Without Limits or Throttling •