{"id":"AZL-13562","summary":"CVE-2023-22795 affecting package ruby for versions less than 3.1.4-1","details":"A regular expression based DoS vulnerability in Action Dispatch \u003c6.1.7.1 and \u003c7.0.4.1 related to the If-None-Match header. A specially crafted HTTP If-None-Match header can cause the regular expression engine to enter a state of catastrophic backtracking, when on a version of Ruby below 3.2.0. This can cause the process to use large amounts of CPU and memory, leading to a possible DoS vulnerability All users running an affected release should either upgrade or use one of the workarounds immediately.","modified":"2026-04-01T05:08:37.341070Z","published":"2023-02-09T20:15:11Z","upstream":["CVE-2023-22795"],"references":[{"type":"WEB","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-22795"}],"affected":[{"package":{"name":"ruby","ecosystem":"Azure Linux:2","purl":"pkg:rpm/azure-linux/ruby"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3.1.4-1"}]}],"database_specific":{"source":"https://github.com/microsoft/AzureLinuxVulnerabilityData/blob/main/osv/AZL-13562.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}]}