Name | CVE-2020-11020 |
Description | Faye (NPM, RubyGem) versions greater than 0.5.0 and before 1.0.4, 1.1.3 and 1.2.5, has the potential for authentication bypass in the extension system. The vulnerability allows any client to bypass checks put in place by server-side extensions, by appending extra segments to the message channel. It is patched in versions 1.0.4, 1.1.3 and 1.2.5. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
Debian Bugs | 959392 |
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|---|---|---|
ruby-faye (PTS) | sid, trixie, bookworm, bullseye | 1.4.0-1 | fixed |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|---|---|---|---|---|---|
ruby-faye | source | (unstable) | 1.4.0-1 | 959392 |
[buster] - ruby-faye <no-dsa> (Minor issue)
https://github.com/faye/faye/security/advisories/GHSA-qpg4-4w7w-2mq5
https://github.com/faye/faye/commit/65d297d341b607f3cb0b5fa6021a625a991cc30e