-
CVSS Score
-Basic Information
CVE ID
-
GHSA ID
-
EPSS Score
-
CWE
-
Published
-
Updated
-
KEV Status
-
Technology
-
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| surrealdb | rust | < 1.1.0 | 1.1.0 |
The vulnerability stems from tungstenite's HTTP header processing during WebSocket handshakes. The commit diff shows SurrealDB updated from vulnerable tungstenite versions (<0.20.1) where these functions lacked proper header size validation. The original tungstenite issue (#376) specifically identifies the parsing loop in single_round() and try_parse() as the problem area. These functions repeatedly process oversized headers without early rejection, leading to CPU exhaustion. The functions are in the dependency chain through axum/tokio-tungstenite used by SurrealDB's WebSocket implementation.
Ongoing coverage of React2Shell