"-Synchronized-Data."

This commit is contained in:
CVE Team 2023-09-23 19:00:31 +00:00
parent ac938c397d
commit be5186e610
No known key found for this signature in database
GPG Key ID: E3252B3D49582C98

View File

@ -34,7 +34,7 @@
"description_data": [
{
"lang": "eng",
"value": "The Tungstenite crate through 0.20.0 for Rust allows remote attackers to cause a denial of service (minutes of CPU consumption) via an excessive length of an HTTP header in a client handshake. The length affects both how many times a parse is attempted (e.g., thousands of times) and the average amount of data for each parse attempt (e.g., millions of bytes)."
"value": "The Tungstenite crate before 0.20.1 for Rust allows remote attackers to cause a denial of service (minutes of CPU consumption) via an excessive length of an HTTP header in a client handshake. The length affects both how many times a parse is attempted (e.g., thousands of times) and the average amount of data for each parse attempt (e.g., millions of bytes)."
}
]
},
@ -66,6 +66,36 @@
"url": "https://crates.io/crates/tungstenite/versions",
"refsource": "MISC",
"name": "https://crates.io/crates/tungstenite/versions"
},
{
"refsource": "CONFIRM",
"name": "https://github.com/snapview/tungstenite-rs/commit/8b3ecd3cc0008145ab4bc8d0657c39d09db8c7e2",
"url": "https://github.com/snapview/tungstenite-rs/commit/8b3ecd3cc0008145ab4bc8d0657c39d09db8c7e2"
},
{
"refsource": "MISC",
"name": "https://github.com/advisories/GHSA-9mcr-873m-xcxp",
"url": "https://github.com/advisories/GHSA-9mcr-873m-xcxp"
},
{
"refsource": "MISC",
"name": "https://github.com/github/advisory-database/pull/2752",
"url": "https://github.com/github/advisory-database/pull/2752"
},
{
"refsource": "MISC",
"name": "https://bugzilla.suse.com/show_bug.cgi?id=1215563",
"url": "https://bugzilla.suse.com/show_bug.cgi?id=1215563"
},
{
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=2240110",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2240110"
},
{
"refsource": "MISC",
"name": "https://security-tracker.debian.org/tracker/CVE-2023-43669",
"url": "https://security-tracker.debian.org/tracker/CVE-2023-43669"
}
]
}