CVE-2020-7663

Priority
Description
websocket-extensions ruby module prior to 0.1.5 allows Denial of Service
(DoS) via Regex Backtracking. The extension parser may take quadratic time
when parsing a header containing an unclosed string parameter value whose
content is a repeating two-byte sequence of a backslash and some other
character. This could be abused by an attacker to conduct Regex Denial Of
Service (ReDoS) on a single-threaded server by providing a malicious
payload with the Sec-WebSocket-Extensions header.
Notes
Package
Upstream:needs-triage
Ubuntu 12.04 ESM (Precise Pangolin):DNE
Ubuntu 14.04 ESM (Trusty Tahr):DNE
Ubuntu 16.04 LTS (Xenial Xerus):released (0.1.2-1+deb9u1build0.16.04.1)
Ubuntu 18.04 LTS (Bionic Beaver):released (0.1.2-1+deb9u1build0.18.04.1)
Ubuntu 20.04 LTS (Focal Fossa):released (0.1.2-1+deb9u1build0.20.04.1)
Ubuntu 20.10 (Groovy Gorilla):needs-triage
More Information

Updated: 2020-09-17 02:15:25 UTC (commit 1c296be4b9e6836587e688d2a545a4715db491fa)