Bug 1215566

Summary: VUL-0: CVE-2023-43669: warp: tungstenite-rs embedded in warp has DoS with long HTTP request header
Product: [Novell Products] SUSE Security Incidents Reporter: Cathy Hu <cathy.hu>
Component: IncidentsAssignee: Atri Bhattacharya <badshah400>
Status: RESOLVED FIXED QA Contact: Security Team bot <security-team>
Severity: Major    
Priority: P3 - Medium CC: security-team
Version: unspecified   
Target Milestone: ---   
Hardware: Other   
OS: Other   
URL: https://smash.suse.de/issue/379560/
Whiteboard:
Found By: Security Response Team Services Priority:
Business Priority: Blocker: ---
Marketing QA Status: --- IT Deployment: ---
Bug Depends on:    
Bug Blocks: 1215563    

Description Cathy Hu 2023-09-21 10:23:24 UTC
+++ This bug was initially created as a clone of Bug #1215563 +++

CVE-2023-43669

The Tungstenite crate through 0.20.0 for Rust allows remote attackers to cause a
denial of service (minutes of CPU consumption) via an excessive length of an
HTTP header in a client handshake. The length affects both how many times a
parse is attempted (e.g., thousands of times) and the average amount of data for
each parse attempt (e.g., millions of bytes).

References:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-43669
https://www.cve.org/CVERecord?id=CVE-2023-43669
https://crates.io/crates/tungstenite/versions
https://cwe.mitre.org/data/definitions/407.html
https://github.com/snapview/tungstenite-rs/issues/376
Comment 1 Cathy Hu 2023-09-21 10:24:22 UTC
Unfortunately there is no fix for tungstenite yet, once it is out please consider to version bump to the fixed version.

Affected:
- openSUSE:Factory/warp embeds tungstenite (v0.17.3)
Comment 2 Atri Bhattacharya 2023-12-28 21:51:50 UTC
This is resolved with warp version 0.6.2 that is now in Factory. Thanks for the report.