-
Notifications
You must be signed in to change notification settings - Fork 0
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Update dependency ws to v7.5.10 [SECURITY] #108
base: master
Are you sure you want to change the base?
Conversation
0989272
to
04f2584
Compare
04f2584
to
c68e4c6
Compare
⚠ Artifact update problemRenovate failed to update an artifact related to this branch. You probably do not want to merge this PR as-is. ♻ Renovate will retry this branch, including artifacts, only when one of the following happens:
The artifact failure details are included below: File name: yarn.lock
|
c68e4c6
to
d3a0385
Compare
d3a0385
to
fb9145d
Compare
5881dd8
to
fb9145d
Compare
|
This PR contains the following updates:
7.2.1
->7.5.10
GitHub Vulnerability Alerts
CVE-2021-32640
Impact
A specially crafted value of the
Sec-Websocket-Protocol
header can be used to significantly slow down a ws server.Proof of concept
Patches
The vulnerability was fixed in [email protected] (websockets/ws@00c425e) and backported to [email protected] (websockets/ws@78c676d) and [email protected] (websockets/ws@76d47c1).
Workarounds
In vulnerable versions of ws, the issue can be mitigated by reducing the maximum allowed length of the request headers using the
--max-http-header-size=size
and/or themaxHeaderSize
options.Credits
The vulnerability was responsibly disclosed along with a fix in private by Robert McLaughlin from University of California, Santa Barbara.
CVE-2024-37890
Impact
A request with a number of headers exceeding the
server.maxHeadersCount
threshold could be used to crash a ws server.Proof of concept
Patches
The vulnerability was fixed in [email protected] (websockets/ws@e55e510) and backported to [email protected] (websockets/ws@22c2876), [email protected] (websockets/ws@eeb76d3), and [email protected] (websockets/ws@4abd8f6)
Workarounds
In vulnerable versions of ws, the issue can be mitigated in the following ways:
--max-http-header-size=size
and/or themaxHeaderSize
options so that no more headers than theserver.maxHeadersCount
limit can be sent.server.maxHeadersCount
to0
so that no limit is applied.Credits
The vulnerability was reported by Ryan LaPointe in https://github.com/websockets/ws/issues/2230.
References
Release Notes
websockets/ws (ws)
v7.5.10
Compare Source
Bug fixes
e55e510
to the 7.x release line (22c2876
).v7.5.9
Compare Source
Bug fixes
bc8bd34
to the 7.x release line (0435e6e
).v7.5.8
Compare Source
Bug fixes
0fdcc0a
to the 7.x release line (2758ed3
).d68ba9e
to the 7.x release line (dc1781b
).v7.5.7
Compare Source
Bug fixes
6946f5f
to the 7.x release line (1f72e2e
).v7.5.6
Compare Source
Bug fixes
b8186dd
to the 7.x release line (73dec34
).ed2b803
to the 7.x release line (22a26af
).v7.5.5
Compare Source
Bug fixes
ec9377c
to the 7.x release line (0e274ac
).v7.5.4
Compare Source
Bug fixes
6a72da3
to the 7.x release line (76087fb
).869c989
to the 7.x release line (2799793
).v7.5.3
Compare Source
Bug fixes
WebSocketServer
constructor now throws an error if more than one of thenoServer
,server
, andport
options are specefied (66e58d2
).'close'
event was emitted by aWebSocketServer
beforethe internal HTTP/S server was actually closed (
5a58730
).WebSocketServer.prototype.close()
was called (772236a
).v7.5.2
Compare Source
Bug fixes
Sec-WebSocket-Extensions
header but no extension was requested or if theserver indicates an extension not requested by the client (
aca94c8
).v7.5.1
Compare Source
Bug fixes
error occurred simultaneously on both peers (
b434b9f
).v7.5.0
Compare Source
Features
code
property describing the specific type of errorthat has occurred (#1901).
Bug fixes
framing error) occurs (
8806aa9
).connection is closed due to an error (
8806aa9
).v7.4.6
Compare Source
Bug fixes
00c425e
).A specially crafted value of the
Sec-Websocket-Protocol
header could be usedto significantly slow down a ws server.
The vulnerability was responsibly disclosed along with a fix in private by
Robert McLaughlin from University of California, Santa Barbara.
In vulnerable versions of ws, the issue can be mitigated by reducing the maximum
allowed length of the request headers using the
--max-http-header-size=size
and/or the
maxHeaderSize
options.v7.4.5
Compare Source
Bug fixes
utf-8-validate
is not installed(
23ba6b2
).websocket.close()
andwebsocket.terminate()
didnot close the connection (
67e25ff
).v7.4.4
Compare Source
Bug fixes
permessage-deflate extension (
9277437
).v7.4.3
Compare Source
Bug fixes
takeover is disabled (#1840).
v7.4.2
Compare Source
Bug fixes
a2c0d44
).v7.4.1
Compare Source
Bug fixes
'error'
event bug in Node.js < 13 whichcaused an uncaught error during the WebSocket handshake (
38d6ab3
).v7.4.0
Compare Source
Features
WebSocketServer.prototype.handleUpgrade()
now takes theclient HTTP GET request as second argument (
7d39f19
).Bug fixes
eabed8f
).CONNECTING
,OPEN
,CLOSING
,CLOSED
,binaryType
,bufferedAmount
,extensions
,onclose
,onerror
,onmessage
,onopen
,protocol
,readyState
, andurl
properties are now enumerable (2069e68
).v7.3.1
Compare Source
Bug fixes
websocket.bufferedAmount
accuracy (e1349c0
,a162942
).v7.3.0
Compare Source
Features
WebSocket.prototype.addEventListener()
now supports theonce
option (#1754).v7.2.5
Compare Source
Bug fixes
651d662
).v7.2.3
Compare Source
Bug fixes
WebSocket#{p{i,o}ng,close}()
now thow an error if the data to send is toolarge to fit in a control frame (
e54f08d
).v7.2.2
Compare Source
Bug fixes
webSocketStream.end()
could cause the processto crash (
9535702
).or a masked frame is received on the client (#1681).
Configuration
📅 Schedule: Branch creation - "" (UTC), Automerge - At any time (no schedule defined).
🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.
♻ Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
This PR was generated by Mend Renovate. View the repository job log.