Update dependency ws to v7.5.10 [SECURITY] #68
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
This PR contains the following updates:
7.4.3
->7.5.10
GitHub Vulnerability Alerts
CVE-2021-32640
Impact
A specially crafted value of the
Sec-Websocket-Protocol
header can be used to significantly slow down a ws server.Proof of concept
Patches
The vulnerability was fixed in ws@7.4.6 (websockets/ws@00c425e) and backported to ws@6.2.2 (websockets/ws@78c676d) and ws@5.2.3 (websockets/ws@76d47c1).
Workarounds
In vulnerable versions of ws, the issue can be mitigated by reducing the maximum allowed length of the request headers using the
--max-http-header-size=size
and/or themaxHeaderSize
options.Credits
The vulnerability was responsibly disclosed along with a fix in private by Robert McLaughlin from University of California, Santa Barbara.
CVE-2024-37890
Impact
A request with a number of headers exceeding the
server.maxHeadersCount
threshold could be used to crash a ws server.Proof of concept
Patches
The vulnerability was fixed in ws@8.17.1 (websockets/ws@e55e510) and backported to ws@7.5.10 (websockets/ws@22c2876), ws@6.2.3 (websockets/ws@eeb76d3), and ws@5.2.4 (websockets/ws@4abd8f6)
Workarounds
In vulnerable versions of ws, the issue can be mitigated in the following ways:
--max-http-header-size=size
and/or themaxHeaderSize
options so that no more headers than theserver.maxHeadersCount
limit can be sent.server.maxHeadersCount
to0
so that no limit is applied.Credits
The vulnerability was reported by Ryan LaPointe in https://github.com/websockets/ws/issues/2230.
References
Release Notes
websockets/ws (ws)
v7.5.10
Compare Source
Bug fixes
e55e510
to the 7.x release line (22c2876
).v7.5.9
Compare Source
Bug fixes
bc8bd34
to the 7.x release line (0435e6e
).v7.5.8
Compare Source
Bug fixes
0fdcc0a
to the 7.x release line (2758ed3
).d68ba9e
to the 7.x release line (dc1781b
).v7.5.7
Compare Source
Bug fixes
6946f5f
to the 7.x release line (1f72e2e
).v7.5.6
Compare Source
Bug fixes
b8186dd
to the 7.x release line (73dec34
).ed2b803
to the 7.x release line (22a26af
).v7.5.5
Compare Source
Bug fixes
ec9377c
to the 7.x release line (0e274ac
).v7.5.4
Compare Source
Bug fixes
6a72da3
to the 7.x release line (76087fb
).869c989
to the 7.x release line (2799793
).v7.5.3
Compare Source
Bug fixes
WebSocketServer
constructor now throws an error if more than one of thenoServer
,server
, andport
options are specefied (66e58d2
).'close'
event was emitted by aWebSocketServer
beforethe internal HTTP/S server was actually closed (
5a58730
).WebSocketServer.prototype.close()
was called (772236a
).v7.5.2
Compare Source
Bug fixes
Sec-WebSocket-Extensions
header but no extension was requested or if theserver indicates an extension not requested by the client (
aca94c8
).v7.5.1
Compare Source
Bug fixes
error occurred simultaneously on both peers (
b434b9f
).v7.5.0
Compare Source
Features
code
property describing the specific type of errorthat has occurred (#1901).
Bug fixes
framing error) occurs (
8806aa9
).connection is closed due to an error (
8806aa9
).v7.4.6
Compare Source
Bug fixes
00c425e
).A specially crafted value of the
Sec-Websocket-Protocol
header could be usedto significantly slow down a ws server.
The vulnerability was responsibly disclosed along with a fix in private by
Robert McLaughlin from University of California, Santa Barbara.
In vulnerable versions of ws, the issue can be mitigated by reducing the maximum
allowed length of the request headers using the
--max-http-header-size=size
and/or the
maxHeaderSize
options.v7.4.5
Compare Source
Bug fixes
utf-8-validate
is not installed(
23ba6b2
).websocket.close()
andwebsocket.terminate()
didnot close the connection (
67e25ff
).v7.4.4
Compare Source
Bug fixes
permessage-deflate extension (
9277437
).Configuration
📅 Schedule: Branch creation - "" (UTC), Automerge - At any time (no schedule defined).
🚦 Automerge: Enabled.
♻ Rebasing: Whenever PR is behind base branch, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
This PR was generated by Mend Renovate. View the repository job log.