Source: rust-tungstenite Version: 0.20.0-1 Severity: important Tags: security upstream Forwarded: https://github.com/snapview/tungstenite-rs/issues/376 X-Debbugs-Cc: car...@debian.org, Debian Security Team <t...@security.debian.org>
Hi, The following vulnerability was published for rust-tungstenite. CVE-2023-43669[0]: | The Tungstenite crate through 0.20.0 for Rust allows remote | attackers to cause a denial of service (minutes of CPU consumption) | via an excessive length of an HTTP header in a client handshake. The | length affects both how many times a parse is attempted (e.g., | thousands of times) and the average amount of data for each parse | attempt (e.g., millions of bytes). If you fix the vulnerability please also make sure to include the CVE (Common Vulnerabilities & Exposures) id in your changelog entry. For further information see: [0] https://security-tracker.debian.org/tracker/CVE-2023-43669 https://www.cve.org/CVERecord?id=CVE-2023-43669 [1] https://github.com/snapview/tungstenite-rs/issues/376 Regards, Salvatore