python-websockets version 4 contains a CWE-409: Improper Handling of Highly Compressed Data (Data Amplification) vulnerability in Servers and clients, unless configured with compression=None that can result in Denial of Service by memory exhaustion. This attack appear to be exploitable via Sending a specially crafted frame on an established connection. This vulnerability appears to have been fixed in 5. Upstream issue: https://github.com/aaugustin/websockets/pull/407 Upstream patch: https://github.com/aaugustin/websockets/pull/407/commits/5b96bdc9afbff9e9587be25a3af5933efbbafe1a
Created python-websockets tracking bugs for this issue: Affects: fedora-28 [bug 1595691]