CVE-2022-23634
11.02.2022, 22:15
Puma is a Ruby/Rack web server built for parallelism. Prior to `puma` version `5.6.2`, `puma` may not always call `close` on the response body. Rails, prior to version `7.0.2.2`, depended on the response body being closed in order for its `CurrentAttributes` implementation to work correctly. The combination of these two behaviors (Puma not closing the body + Rails' Executor implementation) causes information leakage. This problem is fixed in Puma versions 5.6.2 and 4.3.11. This problem is fixed in Rails versions 7.02.2, 6.1.4.6, 6.0.4.6, and 5.2.6.2. Upgrading to a patched Rails _or_ Puma version fixes the vulnerability.Enginsight
Vendor | Product | Version |
---|---|---|
puma | puma | 𝑥 < 4.3.11 |
puma | puma | 5.0.0 ≤ 𝑥 < 5.6.2 |
rubyonrails | rails | 5.0.0 ≤ 𝑥 < 5.2.6.2 |
rubyonrails | rails | 6.0.0 ≤ 𝑥 < 6.0.4.6 |
rubyonrails | rails | 6.1.0 ≤ 𝑥 < 6.1.4.6 |
rubyonrails | rails | 7.0.0 ≤ 𝑥 < 7.0.2.2 |
debian | debian_linux | 9.0 |
debian | debian_linux | 10.0 |
debian | debian_linux | 11.0 |
𝑥
= Vulnerable software versions

Debian Releases

Ubuntu Releases
Common Weakness Enumeration
- CWE-200 - Exposure of Sensitive Information to an Unauthorized ActorThe product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.
- CWE-404 - Improper Resource Shutdown or ReleaseThe program does not release or incorrectly releases a resource before it is made available for re-use.
References