Vulnerability CVE-2023-39322: Information

Description

QUIC connections do not set an upper bound on the amount of data buffered when reading post-handshake messages, allowing a malicious QUIC connection to cause unbounded memory growth. With fix, connections now consistently reject messages larger than 65KiB in size.

Severity: HIGH (7.5) Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Published: Sept. 8, 2023
Modified: Nov. 25, 2023
Error type identifier: CWE-770

Fixed packages

Package name
Branch
Fixed in version
Version from repository
Errata ID
Task #
State
golangsisyphus1.21.1-alt11.22.3-alt1ALT-PU-2023-5463-1328866Fixed
golangsisyphus_riscv641.21.1-alt0.port1.22.2-alt1ALT-PU-2023-5614-1-Fixed
golangp101.20.8-alt11.21.9-alt1ALT-PU-2023-5464-2328867Fixed
golangc10f11.20.8-alt11.21.9-alt1ALT-PU-2023-5492-2328868Fixed
golangc9f21.20.11-alt11.20.11-alt1ALT-PU-2023-7055-2333913Fixed

References to Advisories, Solutions, and Tools

    1. Configuration 1

      cpe:2.3:a:golang:go:*:*:*:*:*:*:*:*
      Start including
      1.21.0
      End excliding
      1.21.1