Skip to content

Implement support for client-initiated $/progress #204

Implement support for client-initiated $/progress

Implement support for client-initiated $/progress #204

GitHub Actions / Security audit failed Jan 5, 2024 in 0s

Security advisories found

1 advisory(ies)

Details

Vulnerabilities

RUSTSEC-2023-0065

Tungstenite allows remote attackers to cause a denial of service

Details
Package tungstenite
Version 0.19.0
URL snapview/tungstenite-rs#376
Date 2023-09-25
Patched versions >=0.20.1

The Tungstenite crate through 0.20.0 for Rust allows remote attackers to cause
a denial of service (minutes of CPU consumption) via an excessive length of an
HTTP header in a client handshake. The length affects both how many times a parse
is attempted (e.g., thousands of times) and the average amount of data for each
parse attempt (e.g., millions of bytes).