Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-3947-1 | puma security update |
EUVD |
EUVD-2024-0323 | Puma is a web server for Ruby/Rack applications built for parallelism. Prior to version 6.4.2, puma exhibited incorrect behavior when parsing chunked transfer encoding bodies in a way that allowed HTTP request smuggling. Fixed versions limits the size of chunk extensions. Without this limit, an attacker could cause unbounded resource (CPU, network bandwidth) consumption. This vulnerability has been fixed in versions 6.4.2 and 5.6.8. |
Github GHSA |
GHSA-c2f4-cvqm-65w2 | Puma HTTP Request/Response Smuggling vulnerability |
Ubuntu USN |
USN-6597-1 | Puma vulnerability |
Ubuntu USN |
USN-6682-1 | Puma vulnerabilities |
Mon, 03 Nov 2025 22:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Tue, 03 Jun 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-11-03T21:53:27.921Z
Reserved: 2023-12-29T16:10:20.366Z
Link: CVE-2024-21647
Updated: 2025-11-03T21:53:27.921Z
Status : Modified
Published: 2024-01-08T14:15:47.640
Modified: 2025-11-03T22:16:44.987
Link: CVE-2024-21647
OpenCVE Enrichment
No data.
Debian DLA
EUVD
Github GHSA
Ubuntu USN