First published: Wed Sep 16 2020(Updated: )
It was discovered that websocket-extensions does not properly parse special headers. A remote attacker could use this issue to cause regex backtracking, resulting in a denial of service. (CVE-2020-7663)
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/ruby-websocket-extensions | <0.1.2-1+deb9u1build0.20.04.1 | 0.1.2-1+deb9u1build0.20.04.1 |
=20.04 | ||
All of | ||
ubuntu/ruby-websocket-extensions | <0.1.2-1+deb9u1build0.18.04.1 | 0.1.2-1+deb9u1build0.18.04.1 |
=18.04 | ||
All of | ||
ubuntu/ruby-websocket-extensions | <0.1.2-1+deb9u1build0.16.04.1 | 0.1.2-1+deb9u1build0.16.04.1 |
=16.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2020-7663.
The affected software is ruby-websocket-extensions.
The severity of this vulnerability is not specified.
To fix the vulnerability, you should update ruby-websocket-extensions to version 0.1.2-1+deb9u1build0.20.04.1 for Ubuntu 20.04, version 0.1.2-1+deb9u1build0.18.04.1 for Ubuntu 18.04, or version 0.1.2-1+deb9u1build0.16.04.1 for Ubuntu 16.04.
You can find more information about this vulnerability on the Ubuntu Security website at https://ubuntu.com/security/CVE-2020-7663.