The Tungstenite crate before 0.20.1 for Rust allows remote attackers to cause a denial of service (minutes of CPU consumption) via an excessive length of an HTTP header in a client handshake. The length affects both how many times a parse is attempted (e.g., thousands of times) and the average amount of data for each parse attempt (e.g., millions of bytes).
https://security-tracker.debian.org/tracker/CVE-2023-43669
https://github.com/snapview/tungstenite-rs/issues/376
https://github.com/snapview/tungstenite-rs/commit/8b3ecd3cc0008145ab4bc8d0657c39d09db8c7e2
https://github.com/github/advisory-database/pull/2752
https://github.com/advisories/GHSA-9mcr-873m-xcxp
https://cwe.mitre.org/data/definitions/407.html
https://crates.io/crates/tungstenite/versions