Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2024-22189 (GCVE-0-2024-22189)
Vulnerability from cvelistv5 – Published: 2024-04-04 14:25 – Updated: 2024-08-23 19:29- CWE-770 - Allocation of Resources Without Limits or Throttling
| URL | Tags |
|---|---|
| https://github.com/quic-go/quic-go/security/advis… | x_refsource_CONFIRM |
| https://github.com/quic-go/quic-go/commit/4a99b81… | x_refsource_MISC |
| https://seemann.io/posts/2024-03-19-exploiting-qu… | x_refsource_MISC |
| https://www.youtube.com/watch?v=JqXtYcZAtIA&t=3683s | x_refsource_MISC |
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-01T22:35:34.903Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "https://github.com/quic-go/quic-go/security/advisories/GHSA-c33x-xqrf-c478",
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://github.com/quic-go/quic-go/security/advisories/GHSA-c33x-xqrf-c478"
},
{
"name": "https://github.com/quic-go/quic-go/commit/4a99b816ae3ab03ae5449d15aac45147c85ed47a",
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://github.com/quic-go/quic-go/commit/4a99b816ae3ab03ae5449d15aac45147c85ed47a"
},
{
"name": "https://seemann.io/posts/2024-03-19-exploiting-quics-connection-id-management",
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://seemann.io/posts/2024-03-19-exploiting-quics-connection-id-management"
},
{
"name": "https://www.youtube.com/watch?v=JqXtYcZAtIA\u0026t=3683s",
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.youtube.com/watch?v=JqXtYcZAtIA\u0026t=3683s"
}
],
"title": "CVE Program Container"
},
{
"affected": [
{
"cpes": [
"cpe:2.3:a:quic-go_project:quic-go:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "quic-go",
"vendor": "quic-go_project",
"versions": [
{
"lessThan": "0.42.0",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
}
],
"metrics": [
{
"other": {
"content": {
"id": "CVE-2024-22189",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-04-09T14:56:31.456906Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-08-23T19:29:41.592Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "quic-go",
"vendor": "quic-go",
"versions": [
{
"status": "affected",
"version": "\u003c 0.42.0"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "quic-go is an implementation of the QUIC protocol in Go. Prior to version 0.42.0, an attacker can cause its peer to run out of memory sending a large number of `NEW_CONNECTION_ID` frames that retire old connection IDs. The receiver is supposed to respond to each retirement frame with a `RETIRE_CONNECTION_ID` frame. The attacker can prevent the receiver from sending out (the vast majority of) these `RETIRE_CONNECTION_ID` frames by collapsing the peers congestion window (by selectively acknowledging received packets) and by manipulating the peer\u0027s RTT estimate. Version 0.42.0 contains a patch for the issue. No known workarounds are available."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-770",
"description": "CWE-770: Allocation of Resources Without Limits or Throttling",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-04-04T14:25:43.663Z",
"orgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
"shortName": "GitHub_M"
},
"references": [
{
"name": "https://github.com/quic-go/quic-go/security/advisories/GHSA-c33x-xqrf-c478",
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://github.com/quic-go/quic-go/security/advisories/GHSA-c33x-xqrf-c478"
},
{
"name": "https://github.com/quic-go/quic-go/commit/4a99b816ae3ab03ae5449d15aac45147c85ed47a",
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/quic-go/quic-go/commit/4a99b816ae3ab03ae5449d15aac45147c85ed47a"
},
{
"name": "https://seemann.io/posts/2024-03-19-exploiting-quics-connection-id-management",
"tags": [
"x_refsource_MISC"
],
"url": "https://seemann.io/posts/2024-03-19-exploiting-quics-connection-id-management"
},
{
"name": "https://www.youtube.com/watch?v=JqXtYcZAtIA\u0026t=3683s",
"tags": [
"x_refsource_MISC"
],
"url": "https://www.youtube.com/watch?v=JqXtYcZAtIA\u0026t=3683s"
}
],
"source": {
"advisory": "GHSA-c33x-xqrf-c478",
"discovery": "UNKNOWN"
},
"title": "QUIC\u0027s Connection ID Mechanism vulnerable to Memory Exhaustion Attack"
}
},
"cveMetadata": {
"assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
"assignerShortName": "GitHub_M",
"cveId": "CVE-2024-22189",
"datePublished": "2024-04-04T14:25:43.663Z",
"dateReserved": "2024-01-08T04:59:27.370Z",
"dateUpdated": "2024-08-23T19:29:41.592Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2024-22189",
"date": "2026-05-20",
"epss": "0.00089",
"percentile": "0.25161"
},
"fkie_nvd": {
"descriptions": "[{\"lang\": \"en\", \"value\": \"quic-go is an implementation of the QUIC protocol in Go. Prior to version 0.42.0, an attacker can cause its peer to run out of memory sending a large number of `NEW_CONNECTION_ID` frames that retire old connection IDs. The receiver is supposed to respond to each retirement frame with a `RETIRE_CONNECTION_ID` frame. The attacker can prevent the receiver from sending out (the vast majority of) these `RETIRE_CONNECTION_ID` frames by collapsing the peers congestion window (by selectively acknowledging received packets) and by manipulating the peer\u0027s RTT estimate. Version 0.42.0 contains a patch for the issue. No known workarounds are available.\"}, {\"lang\": \"es\", \"value\": \"quic-go es una implementaci\\u00f3n del protocolo QUIC en Go. Antes de la versi\\u00f3n 0.42.0, un atacante pod\\u00eda hacer que su par se quedara sin memoria enviando una gran cantidad de tramas `NEW_CONNECTION_ID` que retiraban los ID de conexi\\u00f3n antiguos. Se supone que el receptor debe responder a cada cuadro de retiro con un cuadro `RETIRE_CONNECTION_ID`. El atacante puede evitar que el receptor env\\u00ede (la gran mayor\\u00eda de) estas tramas `RETIRE_CONNECTION_ID` colapsando la ventana de congesti\\u00f3n del par (al reconocer selectivamente los paquetes recibidos) y manipulando la estimaci\\u00f3n de RTT del par. La versi\\u00f3n 0.42.0 contiene un parche para el problema. No hay workarounds disponibles.\"}]",
"id": "CVE-2024-22189",
"lastModified": "2024-11-21T08:55:45.517",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"security-advisories@github.com\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\", \"baseScore\": 7.5, \"baseSeverity\": \"HIGH\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 3.9, \"impactScore\": 3.6}]}",
"published": "2024-04-04T15:15:37.990",
"references": "[{\"url\": \"https://github.com/quic-go/quic-go/commit/4a99b816ae3ab03ae5449d15aac45147c85ed47a\", \"source\": \"security-advisories@github.com\"}, {\"url\": \"https://github.com/quic-go/quic-go/security/advisories/GHSA-c33x-xqrf-c478\", \"source\": \"security-advisories@github.com\"}, {\"url\": \"https://seemann.io/posts/2024-03-19-exploiting-quics-connection-id-management\", \"source\": \"security-advisories@github.com\"}, {\"url\": \"https://www.youtube.com/watch?v=JqXtYcZAtIA\u0026t=3683s\", \"source\": \"security-advisories@github.com\"}, {\"url\": \"https://github.com/quic-go/quic-go/commit/4a99b816ae3ab03ae5449d15aac45147c85ed47a\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://github.com/quic-go/quic-go/security/advisories/GHSA-c33x-xqrf-c478\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://seemann.io/posts/2024-03-19-exploiting-quics-connection-id-management\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://www.youtube.com/watch?v=JqXtYcZAtIA\u0026t=3683s\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]",
"sourceIdentifier": "security-advisories@github.com",
"vulnStatus": "Awaiting Analysis",
"weaknesses": "[{\"source\": \"security-advisories@github.com\", \"type\": \"Secondary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-770\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2024-22189\",\"sourceIdentifier\":\"security-advisories@github.com\",\"published\":\"2024-04-04T15:15:37.990\",\"lastModified\":\"2024-11-21T08:55:45.517\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"quic-go is an implementation of the QUIC protocol in Go. Prior to version 0.42.0, an attacker can cause its peer to run out of memory sending a large number of `NEW_CONNECTION_ID` frames that retire old connection IDs. The receiver is supposed to respond to each retirement frame with a `RETIRE_CONNECTION_ID` frame. The attacker can prevent the receiver from sending out (the vast majority of) these `RETIRE_CONNECTION_ID` frames by collapsing the peers congestion window (by selectively acknowledging received packets) and by manipulating the peer\u0027s RTT estimate. Version 0.42.0 contains a patch for the issue. No known workarounds are available.\"},{\"lang\":\"es\",\"value\":\"quic-go es una implementaci\u00f3n del protocolo QUIC en Go. Antes de la versi\u00f3n 0.42.0, un atacante pod\u00eda hacer que su par se quedara sin memoria enviando una gran cantidad de tramas `NEW_CONNECTION_ID` que retiraban los ID de conexi\u00f3n antiguos. Se supone que el receptor debe responder a cada cuadro de retiro con un cuadro `RETIRE_CONNECTION_ID`. El atacante puede evitar que el receptor env\u00ede (la gran mayor\u00eda de) estas tramas `RETIRE_CONNECTION_ID` colapsando la ventana de congesti\u00f3n del par (al reconocer selectivamente los paquetes recibidos) y manipulando la estimaci\u00f3n de RTT del par. La versi\u00f3n 0.42.0 contiene un parche para el problema. No hay workarounds disponibles.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-770\"}]}],\"references\":[{\"url\":\"https://github.com/quic-go/quic-go/commit/4a99b816ae3ab03ae5449d15aac45147c85ed47a\",\"source\":\"security-advisories@github.com\"},{\"url\":\"https://github.com/quic-go/quic-go/security/advisories/GHSA-c33x-xqrf-c478\",\"source\":\"security-advisories@github.com\"},{\"url\":\"https://seemann.io/posts/2024-03-19-exploiting-quics-connection-id-management\",\"source\":\"security-advisories@github.com\"},{\"url\":\"https://www.youtube.com/watch?v=JqXtYcZAtIA\u0026t=3683s\",\"source\":\"security-advisories@github.com\"},{\"url\":\"https://github.com/quic-go/quic-go/commit/4a99b816ae3ab03ae5449d15aac45147c85ed47a\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://github.com/quic-go/quic-go/security/advisories/GHSA-c33x-xqrf-c478\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://seemann.io/posts/2024-03-19-exploiting-quics-connection-id-management\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://www.youtube.com/watch?v=JqXtYcZAtIA\u0026t=3683s\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://github.com/quic-go/quic-go/security/advisories/GHSA-c33x-xqrf-c478\", \"name\": \"https://github.com/quic-go/quic-go/security/advisories/GHSA-c33x-xqrf-c478\", \"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"]}, {\"url\": \"https://github.com/quic-go/quic-go/commit/4a99b816ae3ab03ae5449d15aac45147c85ed47a\", \"name\": \"https://github.com/quic-go/quic-go/commit/4a99b816ae3ab03ae5449d15aac45147c85ed47a\", \"tags\": [\"x_refsource_MISC\", \"x_transferred\"]}, {\"url\": \"https://seemann.io/posts/2024-03-19-exploiting-quics-connection-id-management\", \"name\": \"https://seemann.io/posts/2024-03-19-exploiting-quics-connection-id-management\", \"tags\": [\"x_refsource_MISC\", \"x_transferred\"]}, {\"url\": \"https://www.youtube.com/watch?v=JqXtYcZAtIA\u0026t=3683s\", \"name\": \"https://www.youtube.com/watch?v=JqXtYcZAtIA\u0026t=3683s\", \"tags\": [\"x_refsource_MISC\", \"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-01T22:35:34.903Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2024-22189\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"yes\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-04-09T14:56:31.456906Z\"}}}], \"affected\": [{\"cpes\": [\"cpe:2.3:a:quic-go_project:quic-go:*:*:*:*:*:*:*:*\"], \"vendor\": \"quic-go_project\", \"product\": \"quic-go\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"0.42.0\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unknown\"}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-08-23T19:23:41.017Z\"}}], \"cna\": {\"title\": \"QUIC\u0027s Connection ID Mechanism vulnerable to Memory Exhaustion Attack\", \"source\": {\"advisory\": \"GHSA-c33x-xqrf-c478\", \"discovery\": \"UNKNOWN\"}, \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 7.5, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\", \"integrityImpact\": \"NONE\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"NONE\"}}], \"affected\": [{\"vendor\": \"quic-go\", \"product\": \"quic-go\", \"versions\": [{\"status\": \"affected\", \"version\": \"\u003c 0.42.0\"}]}], \"references\": [{\"url\": \"https://github.com/quic-go/quic-go/security/advisories/GHSA-c33x-xqrf-c478\", \"name\": \"https://github.com/quic-go/quic-go/security/advisories/GHSA-c33x-xqrf-c478\", \"tags\": [\"x_refsource_CONFIRM\"]}, {\"url\": \"https://github.com/quic-go/quic-go/commit/4a99b816ae3ab03ae5449d15aac45147c85ed47a\", \"name\": \"https://github.com/quic-go/quic-go/commit/4a99b816ae3ab03ae5449d15aac45147c85ed47a\", \"tags\": [\"x_refsource_MISC\"]}, {\"url\": \"https://seemann.io/posts/2024-03-19-exploiting-quics-connection-id-management\", \"name\": \"https://seemann.io/posts/2024-03-19-exploiting-quics-connection-id-management\", \"tags\": [\"x_refsource_MISC\"]}, {\"url\": \"https://www.youtube.com/watch?v=JqXtYcZAtIA\u0026t=3683s\", \"name\": \"https://www.youtube.com/watch?v=JqXtYcZAtIA\u0026t=3683s\", \"tags\": [\"x_refsource_MISC\"]}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"quic-go is an implementation of the QUIC protocol in Go. Prior to version 0.42.0, an attacker can cause its peer to run out of memory sending a large number of `NEW_CONNECTION_ID` frames that retire old connection IDs. The receiver is supposed to respond to each retirement frame with a `RETIRE_CONNECTION_ID` frame. The attacker can prevent the receiver from sending out (the vast majority of) these `RETIRE_CONNECTION_ID` frames by collapsing the peers congestion window (by selectively acknowledging received packets) and by manipulating the peer\u0027s RTT estimate. Version 0.42.0 contains a patch for the issue. No known workarounds are available.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-770\", \"description\": \"CWE-770: Allocation of Resources Without Limits or Throttling\"}]}], \"providerMetadata\": {\"orgId\": \"a0819718-46f1-4df5-94e2-005712e83aaa\", \"shortName\": \"GitHub_M\", \"dateUpdated\": \"2024-04-04T14:25:43.663Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2024-22189\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2024-08-23T19:29:41.592Z\", \"dateReserved\": \"2024-01-08T04:59:27.370Z\", \"assignerOrgId\": \"a0819718-46f1-4df5-94e2-005712e83aaa\", \"datePublished\": \"2024-04-04T14:25:43.663Z\", \"assignerShortName\": \"GitHub_M\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
BDU:2024-03135
Vulnerability from fstec - Published: 04.04.2024{
"CVSS 2.0": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"CVSS 3.0": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CVSS 4.0": null,
"remediation_\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": null,
"remediation_\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435": null,
"\u0412\u0435\u043d\u0434\u043e\u0440 \u041f\u041e": "\u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
"\u0412\u0435\u0440\u0441\u0438\u044f \u041f\u041e": "\u0434\u043e 0.42.0 (Quic-Go)",
"\u0412\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u0435 \u043c\u0435\u0440\u044b \u043f\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044e": "\u0418\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439:\nhttps://github.com/quic-go/quic-go/commit/4a99b816ae3ab03ae5449d15aac45147c85ed47a",
"\u0414\u0430\u0442\u0430 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0438\u044f": "04.04.2024",
"\u0414\u0430\u0442\u0430 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0433\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f": "22.04.2024",
"\u0414\u0430\u0442\u0430 \u043f\u0443\u0431\u043b\u0438\u043a\u0430\u0446\u0438\u0438": "22.04.2024",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": "BDU:2024-03135",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440\u044b \u0434\u0440\u0443\u0433\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "CVE-2024-22189",
"\u0418\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0430",
"\u041a\u043b\u0430\u0441\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u0434\u0430",
"\u041d\u0430\u0437\u0432\u0430\u043d\u0438\u0435 \u041f\u041e": "Quic-Go",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u041e\u0421 \u0438 \u0442\u0438\u043f \u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0439 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u044b": null,
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0440\u0435\u0430\u043b\u0438\u0437\u0430\u0446\u0438\u0438 \u043f\u0440\u043e\u0442\u043e\u043a\u043e\u043b\u0430 QUIC \u0431\u0438\u0431\u043b\u0438\u043e\u0442\u0435\u043a\u0438 quic-go \u044f\u0437\u044b\u043a\u0430 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u044f go, \u0441\u0432\u044f\u0437\u0430\u043d\u043d\u0430\u044f \u0441 \u043d\u0435\u043e\u0433\u0440\u0430\u043d\u0438\u0447\u0435\u043d\u043d\u044b\u043c \u0440\u0430\u0441\u043f\u0440\u0435\u0434\u0435\u043b\u0435\u043d\u0438\u0435\u043c \u0440\u0435\u0441\u0443\u0440\u0441\u043e\u0432, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u0432\u044b\u0437\u0432\u0430\u0442\u044c \u043e\u0442\u043a\u0430\u0437 \u0432 \u043e\u0431\u0441\u043b\u0443\u0436\u0438\u0432\u0430\u043d\u0438\u0438",
"\u041d\u0430\u043b\u0438\u0447\u0438\u0435 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "\u041d\u0435\u043e\u0433\u0440\u0430\u043d\u0438\u0447\u0435\u043d\u043d\u043e\u0435 \u0440\u0430\u0441\u043f\u0440\u0435\u0434\u0435\u043b\u0435\u043d\u0438\u0435 \u0440\u0435\u0441\u0443\u0440\u0441\u043e\u0432 \u0438\u043b\u0438 \u0434\u0440\u043e\u0441\u0441\u0435\u043b\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u0435 (CWE-770)",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0440\u0435\u0430\u043b\u0438\u0437\u0430\u0446\u0438\u0438 \u043f\u0440\u043e\u0442\u043e\u043a\u043e\u043b\u0430 QUIC \u0431\u0438\u0431\u043b\u0438\u043e\u0442\u0435\u043a\u0438 quic-go \u044f\u0437\u044b\u043a\u0430 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u044f Go \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u043d\u0435\u043e\u0433\u0440\u0430\u043d\u0438\u0447\u0435\u043d\u043d\u044b\u043c \u0440\u0430\u0441\u043f\u0440\u0435\u0434\u0435\u043b\u0435\u043d\u0438\u0435\u043c \u0440\u0435\u0441\u0443\u0440\u0441\u043e\u0432. \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442\u044c \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e, \u0434\u0435\u0439\u0441\u0442\u0432\u0443\u044e\u0449\u0435\u043c\u0443 \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e, \u0432\u044b\u0437\u0432\u0430\u0442\u044c \u043e\u0442\u043a\u0430\u0437 \u0432 \u043e\u0431\u0441\u043b\u0443\u0436\u0438\u0432\u0430\u043d\u0438\u0438",
"\u041f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": null,
"\u041f\u0440\u043e\u0447\u0430\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f": null,
"\u0421\u0432\u044f\u0437\u044c \u0441 \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0430\u043c\u0438 \u0418\u0411": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u0421\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u0430",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f": "\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438": "\u041c\u0430\u043d\u0438\u043f\u0443\u043b\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u0441\u0443\u0440\u0441\u0430\u043c\u0438",
"\u0421\u0441\u044b\u043b\u043a\u0438 \u043d\u0430 \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u0438": "https://github.com/quic-go/quic-go/commit/4a99b816ae3ab03ae5449d15aac45147c85ed47a\nhttps://github.com/quic-go/quic-go/security/advisories/GHSA-c33x-xqrf-c478\nhttps://seemann.io/posts/2024-03-19-exploiting-quics-connection-id-management/\nhttps://www.youtube.com/watch?v=JqXtYcZAtIA\u0026t=3683s",
"\u0421\u0442\u0430\u0442\u0443\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041f\u043e\u0434\u0442\u0432\u0435\u0440\u0436\u0434\u0435\u043d\u0430 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u0435\u043c",
"\u0422\u0438\u043f \u041f\u041e": "\u041f\u0440\u0438\u043a\u043b\u0430\u0434\u043d\u043e\u0435 \u041f\u041e \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0445 \u0441\u0438\u0441\u0442\u0435\u043c",
"\u0422\u0438\u043f \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "CWE-770",
"\u0423\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0412\u044b\u0441\u043e\u043a\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 2.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 7,8)\n\u0412\u044b\u0441\u043e\u043a\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 3.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 7,5)"
}
FKIE_CVE-2024-22189
Vulnerability from fkie_nvd - Published: 2024-04-04 15:15 - Updated: 2026-04-15 00:35| Vendor | Product | Version |
|---|
{
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "quic-go is an implementation of the QUIC protocol in Go. Prior to version 0.42.0, an attacker can cause its peer to run out of memory sending a large number of `NEW_CONNECTION_ID` frames that retire old connection IDs. The receiver is supposed to respond to each retirement frame with a `RETIRE_CONNECTION_ID` frame. The attacker can prevent the receiver from sending out (the vast majority of) these `RETIRE_CONNECTION_ID` frames by collapsing the peers congestion window (by selectively acknowledging received packets) and by manipulating the peer\u0027s RTT estimate. Version 0.42.0 contains a patch for the issue. No known workarounds are available."
},
{
"lang": "es",
"value": "quic-go es una implementaci\u00f3n del protocolo QUIC en Go. Antes de la versi\u00f3n 0.42.0, un atacante pod\u00eda hacer que su par se quedara sin memoria enviando una gran cantidad de tramas `NEW_CONNECTION_ID` que retiraban los ID de conexi\u00f3n antiguos. Se supone que el receptor debe responder a cada cuadro de retiro con un cuadro `RETIRE_CONNECTION_ID`. El atacante puede evitar que el receptor env\u00ede (la gran mayor\u00eda de) estas tramas `RETIRE_CONNECTION_ID` colapsando la ventana de congesti\u00f3n del par (al reconocer selectivamente los paquetes recibidos) y manipulando la estimaci\u00f3n de RTT del par. La versi\u00f3n 0.42.0 contiene un parche para el problema. No hay workarounds disponibles."
}
],
"id": "CVE-2024-22189",
"lastModified": "2026-04-15T00:35:42.020",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "security-advisories@github.com",
"type": "Secondary"
}
]
},
"published": "2024-04-04T15:15:37.990",
"references": [
{
"source": "security-advisories@github.com",
"url": "https://github.com/quic-go/quic-go/commit/4a99b816ae3ab03ae5449d15aac45147c85ed47a"
},
{
"source": "security-advisories@github.com",
"url": "https://github.com/quic-go/quic-go/security/advisories/GHSA-c33x-xqrf-c478"
},
{
"source": "security-advisories@github.com",
"url": "https://seemann.io/posts/2024-03-19-exploiting-quics-connection-id-management"
},
{
"source": "security-advisories@github.com",
"url": "https://www.youtube.com/watch?v=JqXtYcZAtIA\u0026t=3683s"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://github.com/quic-go/quic-go/commit/4a99b816ae3ab03ae5449d15aac45147c85ed47a"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://github.com/quic-go/quic-go/security/advisories/GHSA-c33x-xqrf-c478"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://seemann.io/posts/2024-03-19-exploiting-quics-connection-id-management"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://www.youtube.com/watch?v=JqXtYcZAtIA\u0026t=3683s"
}
],
"sourceIdentifier": "security-advisories@github.com",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-770"
}
],
"source": "security-advisories@github.com",
"type": "Secondary"
}
]
}
GHSA-C33X-XQRF-C478
Vulnerability from github – Published: 2024-04-02 14:16 – Updated: 2024-04-05 18:53An attacker can cause its peer to run out of memory by sending a large number of NEW_CONNECTION_ID frames that retire old connection IDs. The receiver is supposed to respond to each retirement frame with a RETIRE_CONNECTION_ID frame. The attacker can prevent the receiver from sending out (the vast majority of) these RETIRE_CONNECTION_ID frames by collapsing the peers congestion window (by selectively acknowledging received packets) and by manipulating the peer's RTT estimate.
I published a more detailed description of the attack and its mitigation in this blog post: https://seemann.io/posts/2024-03-19-exploiting-quics-connection-id-management/. I also presented this attack in the IETF QUIC working group session at IETF 119: https://youtu.be/JqXtYcZAtIA?si=nJ31QKLBSTRXY35U&t=3683
There's no way to mitigate this attack, please update quic-go to a version that contains the fix.
{
"affected": [
{
"package": {
"ecosystem": "Go",
"name": "github.com/quic-go/quic-go"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "0.42.0"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"aliases": [
"CVE-2024-22189"
],
"database_specific": {
"cwe_ids": [
"CWE-400",
"CWE-770"
],
"github_reviewed": true,
"github_reviewed_at": "2024-04-02T14:16:05Z",
"nvd_published_at": "2024-04-04T15:15:37Z",
"severity": "HIGH"
},
"details": "An attacker can cause its peer to run out of memory by sending a large number of NEW_CONNECTION_ID frames that retire old connection IDs. The receiver is supposed to respond to each retirement frame with a RETIRE_CONNECTION_ID frame. The attacker can prevent the receiver from sending out (the vast majority of) these RETIRE_CONNECTION_ID frames by collapsing the peers congestion window (by selectively acknowledging received packets) and by manipulating the peer\u0027s RTT estimate.\n\nI published a more detailed description of the attack and its mitigation in this blog post: https://seemann.io/posts/2024-03-19-exploiting-quics-connection-id-management/.\nI also presented this attack in the IETF QUIC working group session at IETF 119: https://youtu.be/JqXtYcZAtIA?si=nJ31QKLBSTRXY35U\u0026t=3683\n\nThere\u0027s no way to mitigate this attack, please update quic-go to a version that contains the fix.",
"id": "GHSA-c33x-xqrf-c478",
"modified": "2024-04-05T18:53:25Z",
"published": "2024-04-02T14:16:05Z",
"references": [
{
"type": "WEB",
"url": "https://github.com/quic-go/quic-go/security/advisories/GHSA-c33x-xqrf-c478"
},
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-22189"
},
{
"type": "WEB",
"url": "https://github.com/quic-go/quic-go/commit/4a99b816ae3ab03ae5449d15aac45147c85ed47a"
},
{
"type": "PACKAGE",
"url": "https://github.com/quic-go/quic-go"
},
{
"type": "WEB",
"url": "https://seemann.io/posts/2024-03-19-exploiting-quics-connection-id-management"
},
{
"type": "WEB",
"url": "https://www.youtube.com/watch?v=JqXtYcZAtIA\u0026t=3683s"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
],
"summary": "QUIC\u0027s Connection ID Mechanism vulnerable to Memory Exhaustion Attack"
}
GSD-2024-22189
Vulnerability from gsd - Updated: 2024-01-08 06:02{
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2024-22189"
],
"details": "quic-go is an implementation of the QUIC protocol in Go. Prior to version 0.42.0, an attacker can cause its peer to run out of memory sending a large number of `NEW_CONNECTION_ID` frames that retire old connection IDs. The receiver is supposed to respond to each retirement frame with a `RETIRE_CONNECTION_ID` frame. The attacker can prevent the receiver from sending out (the vast majority of) these `RETIRE_CONNECTION_ID` frames by collapsing the peers congestion window (by selectively acknowledging received packets) and by manipulating the peer\u0027s RTT estimate. Version 0.42.0 contains a patch for the issue. No known workarounds are available.",
"id": "GSD-2024-22189",
"modified": "2024-01-08T06:02:13.832244Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "security-advisories@github.com",
"ID": "CVE-2024-22189",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "quic-go",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "\u003c 0.42.0"
}
]
}
}
]
},
"vendor_name": "quic-go"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "quic-go is an implementation of the QUIC protocol in Go. Prior to version 0.42.0, an attacker can cause its peer to run out of memory sending a large number of `NEW_CONNECTION_ID` frames that retire old connection IDs. The receiver is supposed to respond to each retirement frame with a `RETIRE_CONNECTION_ID` frame. The attacker can prevent the receiver from sending out (the vast majority of) these `RETIRE_CONNECTION_ID` frames by collapsing the peers congestion window (by selectively acknowledging received packets) and by manipulating the peer\u0027s RTT estimate. Version 0.42.0 contains a patch for the issue. No known workarounds are available."
}
]
},
"impact": {
"cvss": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"cweId": "CWE-770",
"lang": "eng",
"value": "CWE-770: Allocation of Resources Without Limits or Throttling"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://github.com/quic-go/quic-go/security/advisories/GHSA-c33x-xqrf-c478",
"refsource": "MISC",
"url": "https://github.com/quic-go/quic-go/security/advisories/GHSA-c33x-xqrf-c478"
},
{
"name": "https://github.com/quic-go/quic-go/commit/4a99b816ae3ab03ae5449d15aac45147c85ed47a",
"refsource": "MISC",
"url": "https://github.com/quic-go/quic-go/commit/4a99b816ae3ab03ae5449d15aac45147c85ed47a"
},
{
"name": "https://seemann.io/posts/2024-03-19-exploiting-quics-connection-id-management",
"refsource": "MISC",
"url": "https://seemann.io/posts/2024-03-19-exploiting-quics-connection-id-management"
},
{
"name": "https://www.youtube.com/watch?v=JqXtYcZAtIA\u0026t=3683s",
"refsource": "MISC",
"url": "https://www.youtube.com/watch?v=JqXtYcZAtIA\u0026t=3683s"
}
]
},
"source": {
"advisory": "GHSA-c33x-xqrf-c478",
"discovery": "UNKNOWN"
}
},
"nvd.nist.gov": {
"cve": {
"descriptions": [
{
"lang": "en",
"value": "quic-go is an implementation of the QUIC protocol in Go. Prior to version 0.42.0, an attacker can cause its peer to run out of memory sending a large number of `NEW_CONNECTION_ID` frames that retire old connection IDs. The receiver is supposed to respond to each retirement frame with a `RETIRE_CONNECTION_ID` frame. The attacker can prevent the receiver from sending out (the vast majority of) these `RETIRE_CONNECTION_ID` frames by collapsing the peers congestion window (by selectively acknowledging received packets) and by manipulating the peer\u0027s RTT estimate. Version 0.42.0 contains a patch for the issue. No known workarounds are available."
}
],
"id": "CVE-2024-22189",
"lastModified": "2024-04-04T16:33:06.610",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "security-advisories@github.com",
"type": "Secondary"
}
]
},
"published": "2024-04-04T15:15:37.990",
"references": [
{
"source": "security-advisories@github.com",
"url": "https://github.com/quic-go/quic-go/commit/4a99b816ae3ab03ae5449d15aac45147c85ed47a"
},
{
"source": "security-advisories@github.com",
"url": "https://github.com/quic-go/quic-go/security/advisories/GHSA-c33x-xqrf-c478"
},
{
"source": "security-advisories@github.com",
"url": "https://seemann.io/posts/2024-03-19-exploiting-quics-connection-id-management"
},
{
"source": "security-advisories@github.com",
"url": "https://www.youtube.com/watch?v=JqXtYcZAtIA\u0026t=3683s"
}
],
"sourceIdentifier": "security-advisories@github.com",
"vulnStatus": "Awaiting Analysis",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-770"
}
],
"source": "security-advisories@github.com",
"type": "Secondary"
}
]
}
}
}
}
MSRC_CVE-2024-22189
Vulnerability from csaf_microsoft - Published: 2024-04-02 07:00 - Updated: 2026-02-18 02:04| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 17365-17086 | — | ||
| Unresolved product id: 17749-17084 | — | ||
| Unresolved product id: 19869-17084 | — | ||
| Unresolved product id: 19867-17086 | — |
| URL | Category |
|---|---|
| https://msrc.microsoft.com/csaf/vex/2024/msrc_cve… | self |
| https://support.microsoft.com/lifecycle | external |
| https://www.first.org/cvss | external |
| https://msrc.microsoft.com/csaf/vex/2024/msrc_cve… | self |
{
"document": {
"category": "csaf_vex",
"csaf_version": "2.0",
"distribution": {
"text": "Public",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en-US",
"notes": [
{
"category": "general",
"text": "To determine the support lifecycle for your software, see the Microsoft Support Lifecycle: https://support.microsoft.com/lifecycle",
"title": "Additional Resources"
},
{
"category": "legal_disclaimer",
"text": "The information provided in the Microsoft Knowledge Base is provided \\\"as is\\\" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.",
"title": "Disclaimer"
}
],
"publisher": {
"category": "vendor",
"contact_details": "secure@microsoft.com",
"name": "Microsoft Security Response Center",
"namespace": "https://msrc.microsoft.com"
},
"references": [
{
"category": "self",
"summary": "CVE-2024-22189 QUIC\u0027s Connection ID Mechanism vulnerable to Memory Exhaustion Attack - VEX",
"url": "https://msrc.microsoft.com/csaf/vex/2024/msrc_cve-2024-22189.json"
},
{
"category": "external",
"summary": "Microsoft Support Lifecycle",
"url": "https://support.microsoft.com/lifecycle"
},
{
"category": "external",
"summary": "Common Vulnerability Scoring System",
"url": "https://www.first.org/cvss"
}
],
"title": "QUIC\u0027s Connection ID Mechanism vulnerable to Memory Exhaustion Attack",
"tracking": {
"current_release_date": "2026-02-18T02:04:56.000Z",
"generator": {
"date": "2026-02-18T08:20:17.665Z",
"engine": {
"name": "MSRC Generator",
"version": "1.0"
}
},
"id": "msrc_CVE-2024-22189",
"initial_release_date": "2024-04-02T07:00:00.000Z",
"revision_history": [
{
"date": "2024-04-15T00:00:00.000Z",
"legacy_version": "1",
"number": "1",
"summary": "Information published."
},
{
"date": "2024-06-30T07:00:00.000Z",
"legacy_version": "1.1",
"number": "2",
"summary": "Information published."
},
{
"date": "2024-08-29T00:00:00.000Z",
"legacy_version": "1.2",
"number": "3",
"summary": "Information published."
},
{
"date": "2024-08-30T00:00:00.000Z",
"legacy_version": "1.3",
"number": "4",
"summary": "Information published."
},
{
"date": "2024-08-31T00:00:00.000Z",
"legacy_version": "1.4",
"number": "5",
"summary": "Information published."
},
{
"date": "2024-09-01T00:00:00.000Z",
"legacy_version": "1.5",
"number": "6",
"summary": "Information published."
},
{
"date": "2024-09-02T00:00:00.000Z",
"legacy_version": "1.6",
"number": "7",
"summary": "Information published."
},
{
"date": "2024-09-03T00:00:00.000Z",
"legacy_version": "1.7",
"number": "8",
"summary": "Information published."
},
{
"date": "2024-09-05T00:00:00.000Z",
"legacy_version": "1.8",
"number": "9",
"summary": "Information published."
},
{
"date": "2024-09-06T00:00:00.000Z",
"legacy_version": "1.9",
"number": "10",
"summary": "Information published."
},
{
"date": "2024-09-07T00:00:00.000Z",
"legacy_version": "2",
"number": "11",
"summary": "Information published."
},
{
"date": "2024-09-08T00:00:00.000Z",
"legacy_version": "2.1",
"number": "12",
"summary": "Information published."
},
{
"date": "2024-09-11T00:00:00.000Z",
"legacy_version": "2.2",
"number": "13",
"summary": "Information published."
},
{
"date": "2026-02-18T02:04:56.000Z",
"legacy_version": "2.3",
"number": "14",
"summary": "Information published."
}
],
"status": "final",
"version": "14"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "2.0",
"product": {
"name": "CBL Mariner 2.0",
"product_id": "17086"
}
},
{
"category": "product_version",
"name": "3.0",
"product": {
"name": "Azure Linux 3.0",
"product_id": "17084"
}
}
],
"category": "product_name",
"name": "Azure Linux"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003ccbl2 coredns 1.11.1-6",
"product": {
"name": "\u003ccbl2 coredns 1.11.1-6",
"product_id": "4"
}
},
{
"category": "product_version",
"name": "cbl2 coredns 1.11.1-6",
"product": {
"name": "cbl2 coredns 1.11.1-6",
"product_id": "17365"
}
},
{
"category": "product_version_range",
"name": "\u003cazl3 coredns 1.11.1-2",
"product": {
"name": "\u003cazl3 coredns 1.11.1-2",
"product_id": "3"
}
},
{
"category": "product_version",
"name": "azl3 coredns 1.11.1-2",
"product": {
"name": "azl3 coredns 1.11.1-2",
"product_id": "17749"
}
},
{
"category": "product_version_range",
"name": "\u003cazl3 coredns 1.11.1-4",
"product": {
"name": "\u003cazl3 coredns 1.11.1-4",
"product_id": "1"
}
},
{
"category": "product_version",
"name": "azl3 coredns 1.11.1-4",
"product": {
"name": "azl3 coredns 1.11.1-4",
"product_id": "19869"
}
},
{
"category": "product_version_range",
"name": "\u003ccbl2 coredns 1.11.1-18",
"product": {
"name": "\u003ccbl2 coredns 1.11.1-18",
"product_id": "2"
}
},
{
"category": "product_version",
"name": "cbl2 coredns 1.11.1-18",
"product": {
"name": "cbl2 coredns 1.11.1-18",
"product_id": "19867"
}
}
],
"category": "product_name",
"name": "coredns"
}
],
"category": "vendor",
"name": "Microsoft"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003ccbl2 coredns 1.11.1-6 as a component of CBL Mariner 2.0",
"product_id": "17086-4"
},
"product_reference": "4",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cbl2 coredns 1.11.1-6 as a component of CBL Mariner 2.0",
"product_id": "17365-17086"
},
"product_reference": "17365",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003cazl3 coredns 1.11.1-2 as a component of Azure Linux 3.0",
"product_id": "17084-3"
},
"product_reference": "3",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "azl3 coredns 1.11.1-2 as a component of Azure Linux 3.0",
"product_id": "17749-17084"
},
"product_reference": "17749",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003cazl3 coredns 1.11.1-4 as a component of Azure Linux 3.0",
"product_id": "17084-1"
},
"product_reference": "1",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "azl3 coredns 1.11.1-4 as a component of Azure Linux 3.0",
"product_id": "19869-17084"
},
"product_reference": "19869",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003ccbl2 coredns 1.11.1-18 as a component of CBL Mariner 2.0",
"product_id": "17086-2"
},
"product_reference": "2",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cbl2 coredns 1.11.1-18 as a component of CBL Mariner 2.0",
"product_id": "19867-17086"
},
"product_reference": "19867",
"relates_to_product_reference": "17086"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-22189",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"notes": [
{
"category": "general",
"text": "GitHub_M",
"title": "Assigning CNA"
}
],
"product_status": {
"fixed": [
"17365-17086",
"17749-17084",
"19869-17084",
"19867-17086"
],
"known_affected": [
"17086-4",
"17084-3",
"17084-1",
"17086-2"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-22189 QUIC\u0027s Connection ID Mechanism vulnerable to Memory Exhaustion Attack - VEX",
"url": "https://msrc.microsoft.com/csaf/vex/2024/msrc_cve-2024-22189.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"date": "2024-04-15T00:00:00.000Z",
"details": "1.11.1-6:Security Update:https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade",
"product_ids": [
"17086-4",
"17086-2"
],
"url": "https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade"
},
{
"category": "vendor_fix",
"date": "2024-04-15T00:00:00.000Z",
"details": "1.11.1-2:Security Update:https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade",
"product_ids": [
"17084-3",
"17084-1"
],
"url": "https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"environmentalsScore": 0.0,
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 7.5,
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"17086-4",
"17084-3",
"17084-1",
"17086-2"
]
}
],
"title": "QUIC\u0027s Connection ID Mechanism vulnerable to Memory Exhaustion Attack"
}
]
}
OPENSUSE-SU-2024:0211-1
Vulnerability from csaf_opensuse - Published: 2024-07-22 09:11 - Updated: 2024-07-22 09:11| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15 SP5:caddy-2.8.4-bp155.2.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP5:caddy-2.8.4-bp155.2.3.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP5:caddy-2.8.4-bp155.2.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP5:caddy-2.8.4-bp155.2.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP5:caddy-2.8.4-bp155.2.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP5:caddy-bash-completion-2.8.4-bp155.2.3.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP5:caddy-fish-completion-2.8.4-bp155.2.3.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP5:caddy-zsh-completion-2.8.4-bp155.2.3.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.5:caddy-2.8.4-bp155.2.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.5:caddy-2.8.4-bp155.2.3.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.5:caddy-2.8.4-bp155.2.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.5:caddy-2.8.4-bp155.2.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.5:caddy-2.8.4-bp155.2.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.5:caddy-bash-completion-2.8.4-bp155.2.3.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.5:caddy-fish-completion-2.8.4-bp155.2.3.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.5:caddy-zsh-completion-2.8.4-bp155.2.3.1.noarch | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15 SP5:caddy-2.8.4-bp155.2.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP5:caddy-2.8.4-bp155.2.3.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP5:caddy-2.8.4-bp155.2.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP5:caddy-2.8.4-bp155.2.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP5:caddy-2.8.4-bp155.2.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP5:caddy-bash-completion-2.8.4-bp155.2.3.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP5:caddy-fish-completion-2.8.4-bp155.2.3.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP5:caddy-zsh-completion-2.8.4-bp155.2.3.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.5:caddy-2.8.4-bp155.2.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.5:caddy-2.8.4-bp155.2.3.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.5:caddy-2.8.4-bp155.2.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.5:caddy-2.8.4-bp155.2.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.5:caddy-2.8.4-bp155.2.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.5:caddy-bash-completion-2.8.4-bp155.2.3.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.5:caddy-fish-completion-2.8.4-bp155.2.3.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.5:caddy-zsh-completion-2.8.4-bp155.2.3.1.noarch | — |
Vendor Fix
|
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for caddy",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for caddy fixes the following issues:\n\nUpdate to version 2.8.4:\n\n * cmd: fix regression in auto-detect of Caddyfile (#6362)\n * Tag v2.8.3 was mistakenly made on the v2.8.2 commit and is skipped\n\nUpdate to version 2.8.2:\n\n * cmd: fix auto-detetction of .caddyfile extension (#6356)\n * caddyhttp: properly sanitize requests for root path (#6360)\n * caddytls: Implement certmagic.RenewalInfoGetter\n\nUpdate to version 2.8.1:\n\n * caddyhttp: Fix merging consecutive `client_ip` or `remote_ip` matchers (#6350)\n * core: MkdirAll appDataDir in InstanceID with 0o700 (#6340)\n\nUpdate to version 2.8.0:\n\n * acmeserver: Add `sign_with_root` for Caddyfile (#6345)\n * caddyfile: Reject global request matchers earlier (#6339)\n * core: Fix bug in AppIfConfigured (fix #6336)\n * fix a typo (#6333)\n * autohttps: Move log WARN to INFO, reduce confusion (#6185)\n * reverseproxy: Support HTTP/3 transport to backend (#6312)\n * context: AppIfConfigured returns error; consider not-yet-provisioned modules (#6292)\n * Fix lint error about deprecated method in smallstep/certificates/authority\n * go.mod: Upgrade dependencies\n * caddytls: fix permission requirement with AutomationPolicy (#6328)\n * caddytls: remove ClientHelloSNICtxKey (#6326)\n * caddyhttp: Trace individual middleware handlers (#6313)\n * templates: Add `pathEscape` template function and use it in file browser (#6278)\n * caddytls: set server name in context (#6324)\n * chore: downgrade minimum Go version in go.mod (#6318)\n * caddytest: normalize the JSON config (#6316)\n * caddyhttp: New experimental handler for intercepting responses (#6232)\n * httpcaddyfile: Set challenge ports when http_port or https_port are used\n * logging: Add support for additional logger filters other than hostname (#6082)\n * caddyhttp: Log 4xx as INFO; 5xx as ERROR (close #6106)\n * caddyhttp: Alter log message when request is unhandled (close #5182)\n * reverseproxy: Pointer to struct when loading modules; remove LazyCertPool (#6307)\n * tracing: add trace_id var (`http.vars.trace_id` placeholder) (#6308)\n * go.mod: CertMagic v0.21.0\n * reverseproxy: Implement health_follow_redirects (#6302)\n * caddypki: Allow use of root CA without a key. Fixes #6290 (#6298)\n * go.mod: Upgrade to quic-go v0.43.1\n * reverseproxy: HTTP transport: fix PROXY protocol initialization (#6301)\n * caddytls: Ability to drop connections (close #6294)\n * httpcaddyfile: Fix expression matcher shortcut in snippets (#6288)\n * caddytls: Evict internal certs from cache based on issuer (#6266)\n * chore: add warn logs when using deprecated fields (#6276)\n * caddyhttp: Fix linter warning about deprecation\n * go.mod: Upgrade to quic-go v0.43.0\n * fileserver: Set \u0027Vary: Accept-Encoding\u0027 header (see #5849)\n * events: Add debug log\n * reverseproxy: handle buffered data during hijack (#6274)\n * ci: remove `android` and `plan9` from cross-build workflow (#6268)\n * run `golangci-lint run --fix --fast` (#6270)\n * caddytls: Option to configure certificate lifetime (#6253)\n * replacer: Implement `file.*` global replacements (#5463)\n * caddyhttp: Address some Go 1.20 features (#6252)\n * Quell linter (false positive)\n * reverse_proxy: Add grace_period for SRV upstreams to Caddyfile (#6264)\n * doc: add `verifier` in `ClientAuthentication` caddyfile marshaler doc (#6263)\n * caddytls: Add Caddyfile support for on-demand permission module (close #6260)\n * reverseproxy: Remove long-deprecated buffering properties\n * reverseproxy: Reuse buffered request body even if partially drained\n * reverseproxy: Accept EOF when buffering\n * logging: Fix default access logger (#6251)\n * fileserver: Improve Vary handling (#5849)\n * cmd: Only validate config is proper JSON if config slice has data (#6250)\n * staticresp: Use the evaluated response body for sniffing JSON content-type (#6249)\n * encode: Slight fix for the previous commit\n * encode: Improve Etag handling (fix #5849)\n * httpcaddyfile: Skip automate loader if disable_certs is specified (fix #6148)\n * caddyfile: Populate regexp matcher names by default (#6145)\n * caddyhttp: record num. bytes read when response writer is hijacked (#6173)\n * caddyhttp: Support multiple logger names per host (#6088)\n * chore: fix some typos in comments (#6243)\n * encode: Configurable compression level for zstd (#6140)\n * caddytls: Remove shim code supporting deprecated lego-dns (#6231)\n * connection policy: add `local_ip` matcher (#6074)\n * reverseproxy: Wait for both ends of websocket to close (#6175)\n * caddytls: Upgrade ACMEz to v2; support ZeroSSL API; various fixes (#6229)\n * caddytls: Still provision permission module if ask is specified\n * fileserver: read etags from precomputed files (#6222)\n * fileserver: Escape # and ? in img src (fix #6237)\n * reverseproxy: Implement modular CA provider for TLS transport (#6065)\n * caddyhttp: Apply auto HTTPS redir to all interfaces (fix #6226)\n * cmd: Fix panic related to config filename (fix #5919)\n * cmd: Assume Caddyfile based on filename prefix and suffix (#5919)\n * admin: Make `Etag` a header, not a trailer (#6208)\n * caddyhttp: remove duplicate strings.Count in path matcher (fixes #6233) (#6234)\n * caddyconfig: Use empty struct instead of bool in map (close #6224) (#6227)\n * gitignore: Add rule for caddyfile.go (#6225)\n * chore: Fix broken links in README.md (#6223)\n * chore: Upgrade some dependencies (#6221)\n * caddyhttp: Add plaintext response to `file_server browse` (#6093)\n * admin: Use xxhash for etag (#6207)\n * modules: fix some typo in conments (#6206)\n * caddyhttp: Replace sensitive headers with REDACTED (close #5669)\n * caddyhttp: close quic connections when server closes (#6202)\n * reverseproxy: Use xxhash instead of fnv32 for LB (#6203)\n * caddyhttp: add http.request.local{,.host,.port} placeholder (#6182)\n * chore: remove repetitive word (#6193)\n * Added a null check to avoid segfault on rewrite query ops (#6191)\n * rewrite: `uri query` replace operation (#6165)\n * logging: support `ms` duration format and add docs (#6187)\n * replacer: use RWMutex to protect static provider (#6184)\n * caddyhttp: Allow `header` replacement with empty string (#6163)\n * vars: Make nil values act as empty string instead of `\u0027\u003cnil\u003e\u0027` (#6174)\n * chore: Update quic-go to v0.42.0 (#6176)\n * caddyhttp: Accept XFF header values with ports, when parsing client IP (#6183)\n * reverseproxy: configurable active health_passes and health_fails (#6154)\n * reverseproxy: Configurable forward proxy URL (#6114)\n * caddyhttp: upgrade to cel v0.20.0 (#6161)\n * chore: Bump Chroma to v2.13.0, includes new Caddyfile lexer (#6169)\n * caddyhttp: suppress flushing if the response is being buffered (#6150)\n * chore: encode: use FlushError instead of Flush (#6168)\n * encode: write status immediately when status code is informational (#6164)\n * httpcaddyfile: Keep deprecated `skip_log` in directive order (#6153)\n * httpcaddyfile: Add `RegisterDirectiveOrder` function for plugin authors (#5865)\n * rewrite: Implement `uri query` operations (#6120)\n * fix struct names (#6151)\n * fileserver: Preserve query during canonicalization redirect (#6109)\n * logging: Implement `log_append` handler (#6066)\n * httpcaddyfile: Allow nameless regexp placeholder shorthand (#6113)\n * logging: Implement `append` encoder, allow flatter filters config (#6069)\n * ci: fix the integration test `TestLeafCertLoaders` (#6149)\n * vars: Allow overriding `http.auth.user.id` in replacer as a special case (#6108)\n * caddytls: clientauth: leaf verifier: make trusted leaf certs source pluggable (#6050)\n * cmd: Adjust config load logs/errors (#6032)\n * reverseproxy: SRV dynamic upstream failover (#5832)\n * ci: bump golangci/golangci-lint-action from 3 to 4 (#6141)\n * core: OnExit hooks (#6128)\n * cmd: fix the output of the `Usage` section (#6138)\n * caddytls: verifier: caddyfile: re-add Caddyfile support (#6127)\n * acmeserver: add policy field to define allow/deny rules (#5796)\n * reverseproxy: cookie should be Secure and SameSite=None when TLS (#6115)\n * caddytest: Rename adapt tests to `*.caddyfiletest` extension (#6119)\n * tests: uses testing.TB interface for helper to be able to use test server in benchmarks. (#6103)\n * caddyfile: Assert having a space after heredoc marker to simply check (#6117)\n * chore: Update Chroma to get the new Caddyfile lexer (#6118)\n * reverseproxy: use context.WithoutCancel (#6116)\n * caddyfile: Reject directives in the place of site addresses (#6104)\n * caddyhttp: Register post-shutdown callbacks (#5948)\n * caddyhttp: Only attempt to enable full duplex for HTTP/1.x (#6102)\n * caddyauth: Drop support for `scrypt` (#6091)\n * Revert \u0027caddyfile: Reject long heredoc markers (#6098)\u0027 (#6100)\n * caddyauth: Rename `basicauth` to `basic_auth` (#6092)\n * logging: Inline Caddyfile syntax for `ip_mask` filter (#6094)\n * caddyfile: Reject long heredoc markers (#6098)\n * chore: Rename CI jobs, run on M1 mac (#6089)\n * fix: add back text/*\n * fix: add more media types to the compressed by default list\n * acmeserver: support specifying the allowed challenge types (#5794)\n * matchers: Drop `forwarded` option from `remote_ip` matcher (#6085)\n * caddyhttp: Test cases for `%2F` and `%252F` (#6084)\n * fileserver: Browse can show symlink target if enabled (#5973)\n * core: Support NO_COLOR env var to disable log coloring (#6078)\n * Update comment in setcap helper script\n * caddytls: Make on-demand \u0027ask\u0027 permission modular (#6055)\n * core: Add `ctx.Slogger()` which returns an `slog` logger (#5945)\n * chore: Update quic-go to v0.41.0, bump Go minimum to 1.21 (#6043)\n * chore: enabling a few more linters (#5961)\n * caddyfile: Correctly close the heredoc when the closing marker appears immediately (#6062)\n * caddyfile: Switch to slices.Equal for better performance (#6061)\n * tls: modularize trusted CA providers (#5784)\n * logging: Automatic `wrap` default for `filter` encoder (#5980)\n * caddyhttp: Fix panic when request missing ClientIPVarKey (#6040)\n * caddyfile: Normalize \u0026 flatten all unmarshalers (#6037)\n * cmd: reverseproxy: log: use caddy logger (#6042)\n * matchers: `query` now ANDs multiple keys (#6054)\n * caddyfile: Add heredoc support to `fmt` command (#6056)\n * refactor: move automaxprocs init in caddycmd.Main()\n * caddyfile: Allow heredoc blank lines (#6051)\n * httpcaddyfile: Add optional status code argument to `handle_errors` directive (#5965)\n * httpcaddyfile: Rewrite `root` and `rewrite` parsing to allow omitting matcher (#5844)\n * fileserver: Implement caddyfile.Unmarshaler interface (#5850)\n * reverseproxy: Add `tls_curves` option to HTTP transport (#5851)\n * caddyhttp: Security enhancements for client IP parsing (#5805)\n * replacer: Fix escaped closing braces (#5995)\n * filesystem: Globally declared filesystems, `fs` directive (#5833)\n * ci/cd: use the build tag `nobadger` to exclude badgerdb (#6031)\n * httpcaddyfile: Fix redir \u003cto\u003e html (#6001)\n * httpcaddyfile: Support client auth verifiers (#6022)\n * tls: add reuse_private_keys (#6025)\n * reverseproxy: Only change Content-Length when full request is buffered (#5830)\n * Switch Solaris-derivatives away from listen_unix (#6021)\n * chore: check against errors of `io/fs` instead of `os` (#6011)\n * caddyhttp: support unix sockets in `caddy respond` command (#6010)\n * fileserver: Add total file size to directory listing (#6003)\n * httpcaddyfile: Fix cert file decoding to load multiple PEM in one file (#5997)\n * cmd: use automaxprocs for better perf in containers (#5711)\n * logging: Add `zap.Option` support (#5944)\n * httpcaddyfile: Sort skip_hosts for deterministic JSON (#5990)\n * metrics: Record request metrics on HTTP errors (#5979)\n * go.mod: Updated quic-go to v0.40.1 (#5983)\n * fileserver: Enable compression for command by default (#5855)\n * fileserver: New --precompressed flag (#5880)\n * caddyhttp: Add `uuid` to access logs when used (#5859)\n * proxyprotocol: use github.com/pires/go-proxyproto (#5915)\n * cmd: Preserve LastModified date when exporting storage (#5968)\n * core: Always make AppDataDir for InstanceID (#5976)\n * chore: cross-build for AIX (#5971)\n * caddytls: Sync distributed storage cleaning (#5940)\n * caddytls: Context to DecisionFunc (#5923)\n * tls: accept placeholders in string values of certificate loaders (#5963)\n * templates: Offically make templates extensible (#5939)\n * http2 uses new round-robin scheduler (#5946)\n * panic when reading from backend failed to propagate stream error (#5952)\n * chore: Bump otel to v1.21.0. (#5949)\n * httpredirectlistener: Only set read limit for when request is HTTP (#5917)\n * fileserver: Add .m4v for browse template icon\n * Revert \u0027caddyhttp: Use sync.Pool to reduce lengthReader allocations (#5848)\u0027 (#5924)\n * go.mod: update quic-go version to v0.40.0 (#5922)\n * update quic-go to v0.39.3 (#5918)\n * chore: Fix usage pool comment (#5916)\n * test: acmeserver: add smoke test for the ACME server directory (#5914)\n * Upgrade acmeserver to github.com/go-chi/chi/v5 (#5913)\n * caddyhttp: Adjust `scheme` placeholder docs (#5910)\n * go.mod: Upgrade quic-go to v0.39.1\n * go.mod: CVE-2023-45142 Update opentelemetry (#5908)\n * templates: Delete headers on `httpError` to reset to clean slate (#5905)\n * httpcaddyfile: Remove port from logger names (#5881)\n * core: Apply SO_REUSEPORT to UDP sockets (#5725)\n * caddyhttp: Use sync.Pool to reduce lengthReader allocations (#5848)\n * cmd: Add newline character to version string in CLI output (#5895)\n * core: quic listener will manage the underlying socket by itself (#5749)\n * templates: Clarify `include` args docs, add `.ClientIP` (#5898)\n * httpcaddyfile: Fix TLS automation policy merging with get_certificate (#5896)\n * cmd: upgrade: resolve symlink of the executable (#5891)\n * caddyfile: Fix variadic placeholder false positive when token contains `:` (#5883)\n\n- CVEs:\n * CVE-2024-22189 (boo#1222468)\n * CVE-2023-45142\n\n- Remove the manual user/group provides: the package uses\n sysusers.d; the auto-provides were not working due to the broken\n go_provides.\n\n- Provide user and group (due to RPM 4.19)\n- Update caddy.sysusers to also create a group\n\n- Update to version 2.7.6:\n\n * caddytls: Sync distributed storage cleaning (#5940)\n * caddytls: Context to DecisionFunc (#5923)\n * tls: accept placeholders in string values of certificate loaders (#5963)\n * templates: Offically make templates extensible (#5939)\n * http2 uses new round-robin scheduler (#5946)\n * panic when reading from backend failed to propagate stream error (#5952)\n * chore: Bump otel to v1.21.0. (#5949)\n * httpredirectlistener: Only set read limit for when request is HTTP (#5917)\n * fileserver: Add .m4v for browse template icon\n * Revert \u0027caddyhttp: Use sync.Pool to reduce lengthReader allocations (#5848)\u0027 (#5924)\n * go.mod: update quic-go version to v0.40.0 (#5922)\n * update quic-go to v0.39.3 (#5918)\n * chore: Fix usage pool comment (#5916)\n * test: acmeserver: add smoke test for the ACME server directory (#5914)\n * Upgrade acmeserver to github.com/go-chi/chi/v5 (#5913)\n * caddyhttp: Adjust `scheme` placeholder docs (#5910)\n * go.mod: Upgrade quic-go to v0.39.1\n * go.mod: CVE-2023-45142 Update opentelemetry (#5908)\n * templates: Delete headers on `httpError` to reset to clean slate (#5905)\n * httpcaddyfile: Remove port from logger names (#5881)\n * core: Apply SO_REUSEPORT to UDP sockets (#5725)\n * caddyhttp: Use sync.Pool to reduce lengthReader allocations (#5848)\n * cmd: Add newline character to version string in CLI output (#5895)\n * core: quic listener will manage the underlying socket by itself (#5749)\n * templates: Clarify `include` args docs, add `.ClientIP` (#5898)\n * httpcaddyfile: Fix TLS automation policy merging with get_certificate (#5896)\n * cmd: upgrade: resolve symlink of the executable (#5891)\n * caddyfile: Fix variadic placeholder false positive when token contains `:` (#5883)\n\n- Update to version 2.7.5:\n\n * admin: Respond with 4xx on non-existing config path (#5870)\n * ci: Force the Go version for govulncheck (#5879)\n * fileserver: Set canonical URL on browse template (#5867)\n * tls: Add X25519Kyber768Draft00 PQ \u0027curve\u0027 behind build tag (#5852)\n * reverseproxy: Add more debug logs (#5793)\n * reverseproxy: Fix `least_conn` policy regression (#5862)\n * reverseproxy: Add logging for dynamic A upstreams (#5857)\n * reverseproxy: Replace health header placeholders (#5861)\n * httpcaddyfile: Sort TLS SNI matcher for deterministic JSON output (#5860)\n * cmd: Fix exiting with custom status code, add `caddy -v` (#5874)\n * reverseproxy: fix parsing Caddyfile fails for unlimited request/response buffers (#5828)\n * reverseproxy: Fix retries on \u0027upstreams unavailable\u0027 error (#5841)\n * httpcaddyfile: Enable TLS for catch-all site if `tls` directive is specified (#5808)\n * encode: Add `application/wasm*` to the default content types (#5869)\n * fileserver: Add command shortcuts `-l` and `-a` (#5854)\n * go.mod: Upgrade dependencies incl. x/net/http\n * templates: Add dummy `RemoteAddr` to `httpInclude` request, proxy compatibility (#5845)\n * reverseproxy: Allow fallthrough for response handlers without routes (#5780)\n * fix: caddytest.AssertResponseCode error message (#5853)\n * caddyhttp: Use LimitedReader for HTTPRedirectListener\n * fileserver: browse template SVG icons and UI tweaks (#5812)\n * reverseproxy: fix nil pointer dereference in AUpstreams.GetUpstreams (#5811)\n * httpcaddyfile: fix placeholder shorthands in named routes (#5791)\n * cmd: Prevent overwriting existing env vars with `--envfile` (#5803)\n * ci: Run govulncheck (#5790)\n * logging: query filter for array of strings (#5779)\n * logging: Clone array on log filters, prevent side-effects (#5786)\n * fileserver: Export BrowseTemplate\n * ci: ensure short-sha is exported correctly on all platforms (#5781)\n * caddyfile: Fix case where heredoc marker is empty after newline (#5769)\n * go.mod: Update quic-go to v0.38.0 (#5772)\n * chore: Appease gosec linter (#5777)\n * replacer: change timezone to UTC for \u0027time.now.http\u0027 placeholders (#5774)\n * caddyfile: Adjust error formatting (#5765)\n * update quic-go to v0.37.6 (#5767)\n * httpcaddyfile: Stricter errors for site and upstream address schemes (#5757)\n * caddyfile: Loosen heredoc parsing (#5761)\n * fileserver: docs: clarify the ability to produce JSON array with `browse` (#5751)\n * fix package typo (#5764)\n\n- Switch to sysuser for user setup\n\nUpdate to version 2.7.4:\n\n * go.mod: Upgrade CertMagic and quic-go\n * reverseproxy: Always return new upstreams (fix #5736) (#5752)\n * ci: use gci linter (#5708)\n * fileserver: Slightly more fitting icons\n * cmd: Require config for caddy validate (fix #5612) (#5614)\n * caddytls: Update docs for on-demand config\n * fileserver: Don\u0027t repeat error for invalid method inside error context (#5705)\n * ci: Update to Go 1.21 (#5719)\n * ci: Add riscv64 (64-bit RISC-V) to goreleaser (#5720)\n * go.mod: Upgrade golang.org/x/net to 0.14.0 (#5718)\n * ci: Use gofumpt to format code (#5707)\n * templates: Fix httpInclude (fix #5698)\n\nUpdate to version 2.7.3:\n\n * go.mod: Upgrade to quic-go v0.37.3\n * cmd: Split unix sockets for admin endpoint addresses (#5696)\n * reverseproxy: do not parse upstream address too early if it contains replaceble parts (#5695)\n * caddyfile: check that matched key is not a substring of the replacement key (#5685)\n * chore: use `--clean` instead of `--rm-dist` for goreleaser (#5691)\n * go.mod: Upgrade quic-go to v0.37.2 (fix #5680)\n * fileserver: browse: Render SVG images in grid\n\n- Update to version 2.7.2:\n * reverseproxy: Fix hijack ordering which broke websockets (#5679)\n * httpcaddyfile: Fix `string does not match ~[]E` error (#5675)\n * encode: Fix infinite recursion (#5672)\n * caddyhttp: Make use of `http.ResponseController` (#5654)\n * go.mod: Upgrade dependencies esp. smallstep/certificates\n * core: Allow loopback hosts for admin endpoint (fix #5650) (#5664)\n * httpcaddyfile: Allow `hostnames` \u0026 logger name overrides for log directive (#5643)\n * reverseproxy: Connection termination cleanup (#5663)\n * go.mod: Use quic-go 0.37.1\n * reverseproxy: Export ipVersions type (#5648)\n * go.mod: Use latest CertMagic (v0.19.1)\n * caddyhttp: Preserve original error (fix #5652)\n * fileserver: add lazy image loading (#5646)\n * go.mod: Update quic-go to v0.37.0, bump to Go 1.20 minimum (#5644)\n * core: Refine mutex during reloads (fix #5628) (#5645)\n * go.mod: update quic-go to v0.36.2 (#5636)\n * fileserver: Tweak grid view of browse template\n * fileserver: add `export-template` sub-command to `file-server` (#5630)\n * caddyfile: Fix comparing if two tokens are on the same line (#5626)\n * caddytls: Reuse certificate cache through reloads (#5623)\n * Minor tweaks to security.md\n * reverseproxy: Pointer receiver\n * caddyhttp: Trim dot/space only on Windows (fix #5613)\n * update quic-go to v0.36.1 (#5611)\n * caddyconfig: Specify config adapter for HTTP loader (close #5607)\n * core: Embed net.UDPConn to gain optimizations (#5606)\n * chore: remove deprecated property `rlcp` in goreleaser config (#5608)\n * core: Skip `chmod` for abstract unix sockets (#5596)\n * core: Add optional unix socket file permissions (#4741)\n * reverseproxy: Honor `tls_except_port` for active health checks (#5591)\n * Appease linter\n * Fix compile on Windows, hopefully\n * core: Properly preserve unix sockets (fix #5568)\n * go.mod: Upgrade CertMagic for hotfix\n * go.mod: Upgrade some dependencies\n * chore: upgrade otel (#5586)\n * go.mod: Update quic-go to v0.36.0 (#5584)\n * reverseproxy: weighted_round_robin load balancing policy (#5579)\n * reverseproxy: Experimental streaming timeouts (#5567)\n * chore: remove refs of deprecated io/ioutil (#5576)\n * headers: Allow `\u003e` to defer shortcut for replacements (#5574)\n * caddyhttp: Support custom network for HTTP/3 (#5573)\n * reverseproxy: Fix parsing of source IP in case it\u0027s an ipv6 address (#5569)\n * fileserver: browse: Better grid layout (#5564)\n * caddytls: Clarify some JSON config docs\n * cmd: Implement storage import/export (#5532)\n * go.mod: Upgrade quic-go to 0.35.1\n * update quic-go to v0.35.0 (#5560)\n * templates: Add `readFile` action that does not evaluate templates (#5553)\n * caddyfile: Track import name instead of modifying filename (#5540)\n * core: Use SO_REUSEPORT_LB on FreeBSD (#5554)\n * caddyfile: Do not replace import tokens if they are part of a snippet (#5539)\n * fileserver: Don\u0027t set Etag if mtime is 0 or 1 (close #5548) (#5550)\n * fileserver: browse: minor tweaks for grid view, dark mode (#5545)\n * fileserver: Only set Etag if not already set (fix #5546) (#5547)\n * fileserver: Fix file browser breadcrumb font (#5543)\n * caddyhttp: Fix h3 shutdown (#5541)\n * fileserver: More filetypes for browse icons\n * fileserver: Fix file browser footer in grid mode (#5536)\n * cmd: Avoid spammy log messages (fix #5538)\n * httpcaddyfile: Sort Caddyfile slice\n * caddyhttp: Implement named routes, `invoke` directive (#5107)\n * rewrite: use escaped path, fix #5278 (#5504)\n * headers: Add \u003e Caddyfile shortcut for enabling defer (#5535)\n * go.mod: Upgrade several dependencies\n * reverseproxy: Expand port ranges to multiple upstreams in CLI + Caddyfile (#5494)\n * fileserver: Use EscapedPath for browse (#5534)\n * caddyhttp: Refactor cert Managers (fix #5415) (#5533)\n * Slightly more helpful error message\n * caddytls: Check for nil ALPN; close #5470 (#5473)\n * cmd: Reduce spammy logs from --watch\n * caddyhttp: Add a getter for Server.name (#5531)\n * caddytls: Configurable fallback SNI (#5527)\n * caddyhttp: Update quic\u0027s TLS configs after reload (#5517) (fix #4849)\n * Add doc comment about changing admin endpoint\n * feature: watch include directory (#5521)\n * chore: remove deprecated linters (#5525)\n * go.mod: Upgrade CertMagic again\n * go.mod: Upgrade CertMagic\n * reverseproxy: Optimize base case for least_conn and random_choose policies (#5487)\n * reverseproxy: Fix active health check header canonicalization, refactor (#5446)\n * reverseproxy: Add `fallback` for some policies, instead of always random (#5488)\n * logging: Actually honor the SoftStart parameter\n * logging: Soft start for net writer (close #5520)\n * fastcgi: Fix `capture_stderr` (#5515)\n * acmeserver: Configurable `resolvers`, fix smallstep deprecations (#5500)\n * go.mod: Update some dependencies\n * logging: Add traceID field to access logs when tracing is active (#5507)\n * caddyhttp: Impl `ResponseWriter.Unwrap()`, prep for Go 1.20\u0027s `ResponseController` (#5509)\n * reverseproxy: Fix reinitialize upstream healthy metrics (#5498)\n * fix some comments (#5508)\n * templates: Add `fileStat` function (#5497)\n * caddyfile: Stricter parsing, error for brace on new line (#5505)\n * core: Return default logger if no modules loaded\n * celmatcher: Implement `pkix.Name` conversion to string (#5492)\n * chore: Adjustments to CI caching (#5495)\n * reverseproxy: Remove deprecated `lookup_srv` (#5396)\n * cmd: Support `\u0027` quotes in envfile parsing (#5437)\n * Update contributing guidelines (#5466)\n * caddyhttp: Serve http2 when listener wrapper doesn\u0027t return *tls.Conn (#4929)\n * reverseproxy: Add `query` and `client_ip_hash` lb policies (#5468)\n * cmd: Create pidfile before config load (close #5477)\n * fileserver: Add color-scheme meta tag (#5475)\n * proxyprotocol: Add PROXY protocol support to `reverse_proxy`, add HTTP listener wrapper (#5424)\n * reverseproxy: Add mention of which half a copyBuffer err comes from (#5472)\n * caddyhttp: Log request body bytes read (#5461)\n * log: Make sink logs encodable (#5441)\n * caddytls: Eval replacer on automation policy subjects (#5459)\n * headers: Support deleting all headers as first op (#5464)\n * replacer: Add HTTP time format (#5458)\n * reverseproxy: Header up/down support for CLI command (#5460)\n * caddyhttp: Determine real client IP if trusted proxies configured (#5104)\n * httpcaddyfile: Adjust path matcher sorting to solve for specificity (#5462)\n * caddytls: Zero out throttle window first (#5443)\n * ci: add `--yes` to cosign arguments (#5440)\n * reverseproxy: Reset Content-Length to prevent FastCGI from hanging (#5435)\n * caddytls: Allow on-demand w/o ask for internal-only\n * caddytls: Require \u0027ask\u0027 endpoint for on-demand TLS\n * fileserver: New file browse template (#5427)\n * go.mod: Upgrade dependencies\n * tracing: Support autoprop from OTEL_PROPAGATORS (#5147)\n * caddyhttp: Enable 0-RTT QUIC (#5425)\n * encode: flush status code when hijacked. (#5419)\n * fileserver: Remove trailing slash on fs filenames (#5417)\n * core: Eliminate unnecessary shutdown delay on Unix (#5413)\n * caddyhttp: Fix `vars_regexp` matcher with placeholders (#5408)\n * context: Rename func to `AppIfConfigured` (#5397)\n * reverseproxy: allow specifying ip version for dynamic `a` upstream (#5401)\n * caddyfile: Fix heredoc fuzz crasher, drop trailing newline (#5404)\n * caddyfile: Implement heredoc support (#5385)\n * cmd: Expand cobra support, add short flags (#5379)\n * ci: Update minimum Go version to 1.19\n * go.mod: Upgrade quic-go to v0.33.0 (Go 1.19 min)\n * reverseproxy: refactor HTTP transport layer (#5369)\n * caddytls: Relax the warning for on-demand (#5384)\n * cmd: Strict unmarshal for validate (#5383)\n * caddyfile: Implement variadics for import args placeholders (#5249)\n * cmd: make `caddy fmt` hints more clear (#5378)\n * cmd: Adjust documentation for commands (#5377)\n\n\n- Update to version 2.6.4:\n\n * reverseproxy: Don\u0027t buffer chunked requests (fix #5366) (#5367)\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-2024-211",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_0211-1.json"
},
{
"category": "self",
"summary": "URL for openSUSE-SU-2024:0211-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4POHOO6U2FW5XKZT7HPGZAJF7LQQW3W4/"
},
{
"category": "self",
"summary": "E-Mail link for openSUSE-SU-2024:0211-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4POHOO6U2FW5XKZT7HPGZAJF7LQQW3W4/"
},
{
"category": "self",
"summary": "SUSE Bug 1222468",
"url": "https://bugzilla.suse.com/1222468"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-45142 page",
"url": "https://www.suse.com/security/cve/CVE-2023-45142/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-22189 page",
"url": "https://www.suse.com/security/cve/CVE-2024-22189/"
}
],
"title": "Security update for caddy",
"tracking": {
"current_release_date": "2024-07-22T09:11:35Z",
"generator": {
"date": "2024-07-22T09:11:35Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2024:0211-1",
"initial_release_date": "2024-07-22T09:11:35Z",
"revision_history": [
{
"date": "2024-07-22T09:11:35Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "caddy-2.8.4-bp155.2.3.1.aarch64",
"product": {
"name": "caddy-2.8.4-bp155.2.3.1.aarch64",
"product_id": "caddy-2.8.4-bp155.2.3.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "caddy-2.8.4-bp155.2.3.1.i586",
"product": {
"name": "caddy-2.8.4-bp155.2.3.1.i586",
"product_id": "caddy-2.8.4-bp155.2.3.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "caddy-bash-completion-2.8.4-bp155.2.3.1.noarch",
"product": {
"name": "caddy-bash-completion-2.8.4-bp155.2.3.1.noarch",
"product_id": "caddy-bash-completion-2.8.4-bp155.2.3.1.noarch"
}
},
{
"category": "product_version",
"name": "caddy-fish-completion-2.8.4-bp155.2.3.1.noarch",
"product": {
"name": "caddy-fish-completion-2.8.4-bp155.2.3.1.noarch",
"product_id": "caddy-fish-completion-2.8.4-bp155.2.3.1.noarch"
}
},
{
"category": "product_version",
"name": "caddy-zsh-completion-2.8.4-bp155.2.3.1.noarch",
"product": {
"name": "caddy-zsh-completion-2.8.4-bp155.2.3.1.noarch",
"product_id": "caddy-zsh-completion-2.8.4-bp155.2.3.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "caddy-2.8.4-bp155.2.3.1.ppc64le",
"product": {
"name": "caddy-2.8.4-bp155.2.3.1.ppc64le",
"product_id": "caddy-2.8.4-bp155.2.3.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "caddy-2.8.4-bp155.2.3.1.s390x",
"product": {
"name": "caddy-2.8.4-bp155.2.3.1.s390x",
"product_id": "caddy-2.8.4-bp155.2.3.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "caddy-2.8.4-bp155.2.3.1.x86_64",
"product": {
"name": "caddy-2.8.4-bp155.2.3.1.x86_64",
"product_id": "caddy-2.8.4-bp155.2.3.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Package Hub 15 SP5",
"product": {
"name": "SUSE Package Hub 15 SP5",
"product_id": "SUSE Package Hub 15 SP5"
}
},
{
"category": "product_name",
"name": "openSUSE Leap 15.5",
"product": {
"name": "openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.5"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "caddy-2.8.4-bp155.2.3.1.aarch64 as component of SUSE Package Hub 15 SP5",
"product_id": "SUSE Package Hub 15 SP5:caddy-2.8.4-bp155.2.3.1.aarch64"
},
"product_reference": "caddy-2.8.4-bp155.2.3.1.aarch64",
"relates_to_product_reference": "SUSE Package Hub 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "caddy-2.8.4-bp155.2.3.1.i586 as component of SUSE Package Hub 15 SP5",
"product_id": "SUSE Package Hub 15 SP5:caddy-2.8.4-bp155.2.3.1.i586"
},
"product_reference": "caddy-2.8.4-bp155.2.3.1.i586",
"relates_to_product_reference": "SUSE Package Hub 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "caddy-2.8.4-bp155.2.3.1.ppc64le as component of SUSE Package Hub 15 SP5",
"product_id": "SUSE Package Hub 15 SP5:caddy-2.8.4-bp155.2.3.1.ppc64le"
},
"product_reference": "caddy-2.8.4-bp155.2.3.1.ppc64le",
"relates_to_product_reference": "SUSE Package Hub 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "caddy-2.8.4-bp155.2.3.1.s390x as component of SUSE Package Hub 15 SP5",
"product_id": "SUSE Package Hub 15 SP5:caddy-2.8.4-bp155.2.3.1.s390x"
},
"product_reference": "caddy-2.8.4-bp155.2.3.1.s390x",
"relates_to_product_reference": "SUSE Package Hub 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "caddy-2.8.4-bp155.2.3.1.x86_64 as component of SUSE Package Hub 15 SP5",
"product_id": "SUSE Package Hub 15 SP5:caddy-2.8.4-bp155.2.3.1.x86_64"
},
"product_reference": "caddy-2.8.4-bp155.2.3.1.x86_64",
"relates_to_product_reference": "SUSE Package Hub 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "caddy-bash-completion-2.8.4-bp155.2.3.1.noarch as component of SUSE Package Hub 15 SP5",
"product_id": "SUSE Package Hub 15 SP5:caddy-bash-completion-2.8.4-bp155.2.3.1.noarch"
},
"product_reference": "caddy-bash-completion-2.8.4-bp155.2.3.1.noarch",
"relates_to_product_reference": "SUSE Package Hub 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "caddy-fish-completion-2.8.4-bp155.2.3.1.noarch as component of SUSE Package Hub 15 SP5",
"product_id": "SUSE Package Hub 15 SP5:caddy-fish-completion-2.8.4-bp155.2.3.1.noarch"
},
"product_reference": "caddy-fish-completion-2.8.4-bp155.2.3.1.noarch",
"relates_to_product_reference": "SUSE Package Hub 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "caddy-zsh-completion-2.8.4-bp155.2.3.1.noarch as component of SUSE Package Hub 15 SP5",
"product_id": "SUSE Package Hub 15 SP5:caddy-zsh-completion-2.8.4-bp155.2.3.1.noarch"
},
"product_reference": "caddy-zsh-completion-2.8.4-bp155.2.3.1.noarch",
"relates_to_product_reference": "SUSE Package Hub 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "caddy-2.8.4-bp155.2.3.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:caddy-2.8.4-bp155.2.3.1.aarch64"
},
"product_reference": "caddy-2.8.4-bp155.2.3.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "caddy-2.8.4-bp155.2.3.1.i586 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:caddy-2.8.4-bp155.2.3.1.i586"
},
"product_reference": "caddy-2.8.4-bp155.2.3.1.i586",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "caddy-2.8.4-bp155.2.3.1.ppc64le as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:caddy-2.8.4-bp155.2.3.1.ppc64le"
},
"product_reference": "caddy-2.8.4-bp155.2.3.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "caddy-2.8.4-bp155.2.3.1.s390x as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:caddy-2.8.4-bp155.2.3.1.s390x"
},
"product_reference": "caddy-2.8.4-bp155.2.3.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "caddy-2.8.4-bp155.2.3.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:caddy-2.8.4-bp155.2.3.1.x86_64"
},
"product_reference": "caddy-2.8.4-bp155.2.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "caddy-bash-completion-2.8.4-bp155.2.3.1.noarch as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:caddy-bash-completion-2.8.4-bp155.2.3.1.noarch"
},
"product_reference": "caddy-bash-completion-2.8.4-bp155.2.3.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "caddy-fish-completion-2.8.4-bp155.2.3.1.noarch as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:caddy-fish-completion-2.8.4-bp155.2.3.1.noarch"
},
"product_reference": "caddy-fish-completion-2.8.4-bp155.2.3.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "caddy-zsh-completion-2.8.4-bp155.2.3.1.noarch as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:caddy-zsh-completion-2.8.4-bp155.2.3.1.noarch"
},
"product_reference": "caddy-zsh-completion-2.8.4-bp155.2.3.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.5"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-45142",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-45142"
}
],
"notes": [
{
"category": "general",
"text": "OpenTelemetry-Go Contrib is a collection of third-party packages for OpenTelemetry-Go. A handler wrapper out of the box adds labels `http.user_agent` and `http.method` that have unbound cardinality. It leads to the server\u0027s potential memory exhaustion when many malicious requests are sent to it. HTTP header User-Agent or HTTP method for requests can be easily set by an attacker to be random and long. The library internally uses `httpconv.ServerRequest` that records every value for HTTP `method` and `User-Agent`. In order to be affected, a program has to use the `otelhttp.NewHandler` wrapper and not filter any unknown HTTP methods or User agents on the level of CDN, LB, previous middleware, etc. Version 0.44.0 fixed this issue when the values collected for attribute `http.request.method` were changed to be restricted to a set of well-known values and other high cardinality attributes were removed. As a workaround to stop being affected, `otelhttp.WithFilter()` can be used, but it requires manual careful configuration to not log certain requests entirely. For convenience and safe usage of this library, it should by default mark with the label `unknown` non-standard HTTP methods and User agents to show that such requests were made but do not increase cardinality. In case someone wants to stay with the current behavior, library API should allow to enable it.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP5:caddy-2.8.4-bp155.2.3.1.aarch64",
"SUSE Package Hub 15 SP5:caddy-2.8.4-bp155.2.3.1.i586",
"SUSE Package Hub 15 SP5:caddy-2.8.4-bp155.2.3.1.ppc64le",
"SUSE Package Hub 15 SP5:caddy-2.8.4-bp155.2.3.1.s390x",
"SUSE Package Hub 15 SP5:caddy-2.8.4-bp155.2.3.1.x86_64",
"SUSE Package Hub 15 SP5:caddy-bash-completion-2.8.4-bp155.2.3.1.noarch",
"SUSE Package Hub 15 SP5:caddy-fish-completion-2.8.4-bp155.2.3.1.noarch",
"SUSE Package Hub 15 SP5:caddy-zsh-completion-2.8.4-bp155.2.3.1.noarch",
"openSUSE Leap 15.5:caddy-2.8.4-bp155.2.3.1.aarch64",
"openSUSE Leap 15.5:caddy-2.8.4-bp155.2.3.1.i586",
"openSUSE Leap 15.5:caddy-2.8.4-bp155.2.3.1.ppc64le",
"openSUSE Leap 15.5:caddy-2.8.4-bp155.2.3.1.s390x",
"openSUSE Leap 15.5:caddy-2.8.4-bp155.2.3.1.x86_64",
"openSUSE Leap 15.5:caddy-bash-completion-2.8.4-bp155.2.3.1.noarch",
"openSUSE Leap 15.5:caddy-fish-completion-2.8.4-bp155.2.3.1.noarch",
"openSUSE Leap 15.5:caddy-zsh-completion-2.8.4-bp155.2.3.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-45142",
"url": "https://www.suse.com/security/cve/CVE-2023-45142"
},
{
"category": "external",
"summary": "SUSE Bug 1228553 for CVE-2023-45142",
"url": "https://bugzilla.suse.com/1228553"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP5:caddy-2.8.4-bp155.2.3.1.aarch64",
"SUSE Package Hub 15 SP5:caddy-2.8.4-bp155.2.3.1.i586",
"SUSE Package Hub 15 SP5:caddy-2.8.4-bp155.2.3.1.ppc64le",
"SUSE Package Hub 15 SP5:caddy-2.8.4-bp155.2.3.1.s390x",
"SUSE Package Hub 15 SP5:caddy-2.8.4-bp155.2.3.1.x86_64",
"SUSE Package Hub 15 SP5:caddy-bash-completion-2.8.4-bp155.2.3.1.noarch",
"SUSE Package Hub 15 SP5:caddy-fish-completion-2.8.4-bp155.2.3.1.noarch",
"SUSE Package Hub 15 SP5:caddy-zsh-completion-2.8.4-bp155.2.3.1.noarch",
"openSUSE Leap 15.5:caddy-2.8.4-bp155.2.3.1.aarch64",
"openSUSE Leap 15.5:caddy-2.8.4-bp155.2.3.1.i586",
"openSUSE Leap 15.5:caddy-2.8.4-bp155.2.3.1.ppc64le",
"openSUSE Leap 15.5:caddy-2.8.4-bp155.2.3.1.s390x",
"openSUSE Leap 15.5:caddy-2.8.4-bp155.2.3.1.x86_64",
"openSUSE Leap 15.5:caddy-bash-completion-2.8.4-bp155.2.3.1.noarch",
"openSUSE Leap 15.5:caddy-fish-completion-2.8.4-bp155.2.3.1.noarch",
"openSUSE Leap 15.5:caddy-zsh-completion-2.8.4-bp155.2.3.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP5:caddy-2.8.4-bp155.2.3.1.aarch64",
"SUSE Package Hub 15 SP5:caddy-2.8.4-bp155.2.3.1.i586",
"SUSE Package Hub 15 SP5:caddy-2.8.4-bp155.2.3.1.ppc64le",
"SUSE Package Hub 15 SP5:caddy-2.8.4-bp155.2.3.1.s390x",
"SUSE Package Hub 15 SP5:caddy-2.8.4-bp155.2.3.1.x86_64",
"SUSE Package Hub 15 SP5:caddy-bash-completion-2.8.4-bp155.2.3.1.noarch",
"SUSE Package Hub 15 SP5:caddy-fish-completion-2.8.4-bp155.2.3.1.noarch",
"SUSE Package Hub 15 SP5:caddy-zsh-completion-2.8.4-bp155.2.3.1.noarch",
"openSUSE Leap 15.5:caddy-2.8.4-bp155.2.3.1.aarch64",
"openSUSE Leap 15.5:caddy-2.8.4-bp155.2.3.1.i586",
"openSUSE Leap 15.5:caddy-2.8.4-bp155.2.3.1.ppc64le",
"openSUSE Leap 15.5:caddy-2.8.4-bp155.2.3.1.s390x",
"openSUSE Leap 15.5:caddy-2.8.4-bp155.2.3.1.x86_64",
"openSUSE Leap 15.5:caddy-bash-completion-2.8.4-bp155.2.3.1.noarch",
"openSUSE Leap 15.5:caddy-fish-completion-2.8.4-bp155.2.3.1.noarch",
"openSUSE Leap 15.5:caddy-zsh-completion-2.8.4-bp155.2.3.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-22T09:11:35Z",
"details": "important"
}
],
"title": "CVE-2023-45142"
},
{
"cve": "CVE-2024-22189",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-22189"
}
],
"notes": [
{
"category": "general",
"text": "quic-go is an implementation of the QUIC protocol in Go. Prior to version 0.42.0, an attacker can cause its peer to run out of memory sending a large number of `NEW_CONNECTION_ID` frames that retire old connection IDs. The receiver is supposed to respond to each retirement frame with a `RETIRE_CONNECTION_ID` frame. The attacker can prevent the receiver from sending out (the vast majority of) these `RETIRE_CONNECTION_ID` frames by collapsing the peers congestion window (by selectively acknowledging received packets) and by manipulating the peer\u0027s RTT estimate. Version 0.42.0 contains a patch for the issue. No known workarounds are available.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP5:caddy-2.8.4-bp155.2.3.1.aarch64",
"SUSE Package Hub 15 SP5:caddy-2.8.4-bp155.2.3.1.i586",
"SUSE Package Hub 15 SP5:caddy-2.8.4-bp155.2.3.1.ppc64le",
"SUSE Package Hub 15 SP5:caddy-2.8.4-bp155.2.3.1.s390x",
"SUSE Package Hub 15 SP5:caddy-2.8.4-bp155.2.3.1.x86_64",
"SUSE Package Hub 15 SP5:caddy-bash-completion-2.8.4-bp155.2.3.1.noarch",
"SUSE Package Hub 15 SP5:caddy-fish-completion-2.8.4-bp155.2.3.1.noarch",
"SUSE Package Hub 15 SP5:caddy-zsh-completion-2.8.4-bp155.2.3.1.noarch",
"openSUSE Leap 15.5:caddy-2.8.4-bp155.2.3.1.aarch64",
"openSUSE Leap 15.5:caddy-2.8.4-bp155.2.3.1.i586",
"openSUSE Leap 15.5:caddy-2.8.4-bp155.2.3.1.ppc64le",
"openSUSE Leap 15.5:caddy-2.8.4-bp155.2.3.1.s390x",
"openSUSE Leap 15.5:caddy-2.8.4-bp155.2.3.1.x86_64",
"openSUSE Leap 15.5:caddy-bash-completion-2.8.4-bp155.2.3.1.noarch",
"openSUSE Leap 15.5:caddy-fish-completion-2.8.4-bp155.2.3.1.noarch",
"openSUSE Leap 15.5:caddy-zsh-completion-2.8.4-bp155.2.3.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-22189",
"url": "https://www.suse.com/security/cve/CVE-2024-22189"
},
{
"category": "external",
"summary": "SUSE Bug 1222461 for CVE-2024-22189",
"url": "https://bugzilla.suse.com/1222461"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP5:caddy-2.8.4-bp155.2.3.1.aarch64",
"SUSE Package Hub 15 SP5:caddy-2.8.4-bp155.2.3.1.i586",
"SUSE Package Hub 15 SP5:caddy-2.8.4-bp155.2.3.1.ppc64le",
"SUSE Package Hub 15 SP5:caddy-2.8.4-bp155.2.3.1.s390x",
"SUSE Package Hub 15 SP5:caddy-2.8.4-bp155.2.3.1.x86_64",
"SUSE Package Hub 15 SP5:caddy-bash-completion-2.8.4-bp155.2.3.1.noarch",
"SUSE Package Hub 15 SP5:caddy-fish-completion-2.8.4-bp155.2.3.1.noarch",
"SUSE Package Hub 15 SP5:caddy-zsh-completion-2.8.4-bp155.2.3.1.noarch",
"openSUSE Leap 15.5:caddy-2.8.4-bp155.2.3.1.aarch64",
"openSUSE Leap 15.5:caddy-2.8.4-bp155.2.3.1.i586",
"openSUSE Leap 15.5:caddy-2.8.4-bp155.2.3.1.ppc64le",
"openSUSE Leap 15.5:caddy-2.8.4-bp155.2.3.1.s390x",
"openSUSE Leap 15.5:caddy-2.8.4-bp155.2.3.1.x86_64",
"openSUSE Leap 15.5:caddy-bash-completion-2.8.4-bp155.2.3.1.noarch",
"openSUSE Leap 15.5:caddy-fish-completion-2.8.4-bp155.2.3.1.noarch",
"openSUSE Leap 15.5:caddy-zsh-completion-2.8.4-bp155.2.3.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP5:caddy-2.8.4-bp155.2.3.1.aarch64",
"SUSE Package Hub 15 SP5:caddy-2.8.4-bp155.2.3.1.i586",
"SUSE Package Hub 15 SP5:caddy-2.8.4-bp155.2.3.1.ppc64le",
"SUSE Package Hub 15 SP5:caddy-2.8.4-bp155.2.3.1.s390x",
"SUSE Package Hub 15 SP5:caddy-2.8.4-bp155.2.3.1.x86_64",
"SUSE Package Hub 15 SP5:caddy-bash-completion-2.8.4-bp155.2.3.1.noarch",
"SUSE Package Hub 15 SP5:caddy-fish-completion-2.8.4-bp155.2.3.1.noarch",
"SUSE Package Hub 15 SP5:caddy-zsh-completion-2.8.4-bp155.2.3.1.noarch",
"openSUSE Leap 15.5:caddy-2.8.4-bp155.2.3.1.aarch64",
"openSUSE Leap 15.5:caddy-2.8.4-bp155.2.3.1.i586",
"openSUSE Leap 15.5:caddy-2.8.4-bp155.2.3.1.ppc64le",
"openSUSE Leap 15.5:caddy-2.8.4-bp155.2.3.1.s390x",
"openSUSE Leap 15.5:caddy-2.8.4-bp155.2.3.1.x86_64",
"openSUSE Leap 15.5:caddy-bash-completion-2.8.4-bp155.2.3.1.noarch",
"openSUSE Leap 15.5:caddy-fish-completion-2.8.4-bp155.2.3.1.noarch",
"openSUSE Leap 15.5:caddy-zsh-completion-2.8.4-bp155.2.3.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-22T09:11:35Z",
"details": "important"
}
],
"title": "CVE-2024-22189"
}
]
}
OPENSUSE-SU-2024:0220-1
Vulnerability from csaf_opensuse - Published: 2024-07-26 10:03 - Updated: 2024-07-26 10:03| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15 SP6:caddy-2.8.4-bp156.3.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP6:caddy-2.8.4-bp156.3.3.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP6:caddy-2.8.4-bp156.3.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP6:caddy-2.8.4-bp156.3.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP6:caddy-2.8.4-bp156.3.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP6:caddy-bash-completion-2.8.4-bp156.3.3.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP6:caddy-fish-completion-2.8.4-bp156.3.3.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP6:caddy-zsh-completion-2.8.4-bp156.3.3.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:caddy-2.8.4-bp156.3.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:caddy-2.8.4-bp156.3.3.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:caddy-2.8.4-bp156.3.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:caddy-2.8.4-bp156.3.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:caddy-2.8.4-bp156.3.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:caddy-bash-completion-2.8.4-bp156.3.3.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:caddy-fish-completion-2.8.4-bp156.3.3.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:caddy-zsh-completion-2.8.4-bp156.3.3.1.noarch | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15 SP6:caddy-2.8.4-bp156.3.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP6:caddy-2.8.4-bp156.3.3.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP6:caddy-2.8.4-bp156.3.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP6:caddy-2.8.4-bp156.3.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP6:caddy-2.8.4-bp156.3.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP6:caddy-bash-completion-2.8.4-bp156.3.3.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP6:caddy-fish-completion-2.8.4-bp156.3.3.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP6:caddy-zsh-completion-2.8.4-bp156.3.3.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:caddy-2.8.4-bp156.3.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:caddy-2.8.4-bp156.3.3.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:caddy-2.8.4-bp156.3.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:caddy-2.8.4-bp156.3.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:caddy-2.8.4-bp156.3.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:caddy-bash-completion-2.8.4-bp156.3.3.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:caddy-fish-completion-2.8.4-bp156.3.3.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:caddy-zsh-completion-2.8.4-bp156.3.3.1.noarch | — |
Vendor Fix
|
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for caddy",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for caddy fixes the following issues:\n\n- Update to version 2.8.4:\n\n * cmd: fix regression in auto-detect of Caddyfile (#6362)\n * Tag v2.8.3 was mistakenly made on the v2.8.2 commit and is skipped\n\n- Update to version 2.8.2:\n\n * cmd: fix auto-detetction of .caddyfile extension (#6356)\n * caddyhttp: properly sanitize requests for root path (#6360)\n * caddytls: Implement certmagic.RenewalInfoGetter\n * build(deps): bump golangci/golangci-lint-action from 5 to 6 (#6361)\n\n- Update to version 2.8.1:\n\n * caddyhttp: Fix merging consecutive `client_ip` or `remote_ip` matchers (#6350)\n * core: MkdirAll appDataDir in InstanceID with 0o700 (#6340)\n\n- Update to version 2.8.0:\n\n * acmeserver: Add `sign_with_root` for Caddyfile (#6345)\n * caddyfile: Reject global request matchers earlier (#6339)\n * core: Fix bug in AppIfConfigured (fix #6336)\n * fix a typo (#6333)\n * autohttps: Move log WARN to INFO, reduce confusion (#6185)\n * reverseproxy: Support HTTP/3 transport to backend (#6312)\n * context: AppIfConfigured returns error; consider not-yet-provisioned modules (#6292)\n * Fix lint error about deprecated method in smallstep/certificates/authority\n * go.mod: Upgrade dependencies\n * caddytls: fix permission requirement with AutomationPolicy (#6328)\n * caddytls: remove ClientHelloSNICtxKey (#6326)\n * caddyhttp: Trace individual middleware handlers (#6313)\n * templates: Add `pathEscape` template function and use it in file browser (#6278)\n * caddytls: set server name in context (#6324)\n * chore: downgrade minimum Go version in go.mod (#6318)\n * caddytest: normalize the JSON config (#6316)\n * caddyhttp: New experimental handler for intercepting responses (#6232)\n * httpcaddyfile: Set challenge ports when http_port or https_port are used\n * logging: Add support for additional logger filters other than hostname (#6082)\n * caddyhttp: Log 4xx as INFO; 5xx as ERROR (close #6106)\n * Second half of 6dce493\n * caddyhttp: Alter log message when request is unhandled (close #5182)\n * chore: Bump Go version in CI (#6310)\n * go.mod: go 1.22.3\n * Fix typos (#6311)\n * reverseproxy: Pointer to struct when loading modules; remove LazyCertPool (#6307)\n * tracing: add trace_id var (`http.vars.trace_id` placeholder) (#6308)\n * go.mod: CertMagic v0.21.0\n * reverseproxy: Implement health_follow_redirects (#6302)\n * caddypki: Allow use of root CA without a key. Fixes #6290 (#6298)\n * go.mod: Upgrade to quic-go v0.43.1\n * reverseproxy: HTTP transport: fix PROXY protocol initialization (#6301)\n * caddytls: Ability to drop connections (close #6294)\n * build(deps): bump golangci/golangci-lint-action from 4 to 5 (#6289)\n * httpcaddyfile: Fix expression matcher shortcut in snippets (#6288)\n * caddytls: Evict internal certs from cache based on issuer (#6266)\n * chore: add warn logs when using deprecated fields (#6276)\n * caddyhttp: Fix linter warning about deprecation\n * go.mod: Upgrade to quic-go v0.43.0\n * fileserver: Set \u0027Vary: Accept-Encoding\u0027 header (see #5849)\n * events: Add debug log\n * reverseproxy: handle buffered data during hijack (#6274)\n * ci: remove `android` and `plan9` from cross-build workflow (#6268)\n * run `golangci-lint run --fix --fast` (#6270)\n * caddytls: Option to configure certificate lifetime (#6253)\n * replacer: Implement `file.*` global replacements (#5463)\n * caddyhttp: Address some Go 1.20 features (#6252)\n * Quell linter (false positive)\n * reverse_proxy: Add grace_period for SRV upstreams to Caddyfile (#6264)\n * doc: add `verifier` in `ClientAuthentication` caddyfile marshaler doc (#6263)\n * caddytls: Add Caddyfile support for on-demand permission module (close #6260)\n * reverseproxy: Remove long-deprecated buffering properties\n * reverseproxy: Reuse buffered request body even if partially drained\n * reverseproxy: Accept EOF when buffering\n * logging: Fix default access logger (#6251)\n * fileserver: Improve Vary handling (#5849)\n * cmd: Only validate config is proper JSON if config slice has data (#6250)\n * staticresp: Use the evaluated response body for sniffing JSON content-type (#6249)\n * encode: Slight fix for the previous commit\n * encode: Improve Etag handling (fix #5849)\n * httpcaddyfile: Skip automate loader if disable_certs is specified (fix #6148)\n * caddyfile: Populate regexp matcher names by default (#6145)\n * caddyhttp: record num. bytes read when response writer is hijacked (#6173)\n * caddyhttp: Support multiple logger names per host (#6088)\n * chore: fix some typos in comments (#6243)\n * encode: Configurable compression level for zstd (#6140)\n * caddytls: Remove shim code supporting deprecated lego-dns (#6231)\n * connection policy: add `local_ip` matcher (#6074)\n * reverseproxy: Wait for both ends of websocket to close (#6175)\n * caddytls: Upgrade ACMEz to v2; support ZeroSSL API; various fixes (#6229)\n * caddytls: Still provision permission module if ask is specified\n * fileserver: read etags from precomputed files (#6222)\n * fileserver: Escape # and ? in img src (fix #6237)\n * reverseproxy: Implement modular CA provider for TLS transport (#6065)\n * caddyhttp: Apply auto HTTPS redir to all interfaces (fix #6226)\n * cmd: Fix panic related to config filename (fix #5919)\n * cmd: Assume Caddyfile based on filename prefix and suffix (#5919)\n * admin: Make `Etag` a header, not a trailer (#6208)\n * caddyhttp: remove duplicate strings.Count in path matcher (fixes #6233) (#6234)\n * caddyconfig: Use empty struct instead of bool in map (close #6224) (#6227)\n * gitignore: Add rule for caddyfile.go (#6225)\n * chore: Fix broken links in README.md (#6223)\n * chore: Upgrade some dependencies (#6221)\n * caddyhttp: Add plaintext response to `file_server browse` (#6093)\n * admin: Use xxhash for etag (#6207)\n * modules: fix some typo in conments (#6206)\n * caddyhttp: Replace sensitive headers with REDACTED (close #5669)\n * caddyhttp: close quic connections when server closes (#6202)\n * reverseproxy: Use xxhash instead of fnv32 for LB (#6203)\n * caddyhttp: add http.request.local{,.host,.port} placeholder (#6182)\n * chore: upgrade deps (#6198)\n * chore: remove repetitive word (#6193)\n * Added a null check to avoid segfault on rewrite query ops (#6191)\n * rewrite: `uri query` replace operation (#6165)\n * logging: support `ms` duration format and add docs (#6187)\n * replacer: use RWMutex to protect static provider (#6184)\n * caddyhttp: Allow `header` replacement with empty string (#6163)\n * vars: Make nil values act as empty string instead of `\u0027\u003cnil\u003e\u0027` (#6174)\n * chore: Update quic-go to v0.42.0 (#6176)\n * caddyhttp: Accept XFF header values with ports, when parsing client IP (#6183)\n * reverseproxy: configurable active health_passes and health_fails (#6154)\n * reverseproxy: Configurable forward proxy URL (#6114)\n * caddyhttp: upgrade to cel v0.20.0 (#6161)\n * chore: Bump Chroma to v2.13.0, includes new Caddyfile lexer (#6169)\n * caddyhttp: suppress flushing if the response is being buffered (#6150)\n * chore: encode: use FlushError instead of Flush (#6168)\n * encode: write status immediately when status code is informational (#6164)\n * httpcaddyfile: Keep deprecated `skip_log` in directive order (#6153)\n * httpcaddyfile: Add `RegisterDirectiveOrder` function for plugin authors (#5865)\n * rewrite: Implement `uri query` operations (#6120)\n * fix struct names (#6151)\n * fileserver: Preserve query during canonicalization redirect (#6109)\n * logging: Implement `log_append` handler (#6066)\n * httpcaddyfile: Allow nameless regexp placeholder shorthand (#6113)\n * logging: Implement `append` encoder, allow flatter filters config (#6069)\n * ci: fix the integration test `TestLeafCertLoaders` (#6149)\n * vars: Allow overriding `http.auth.user.id` in replacer as a special case (#6108)\n * caddytls: clientauth: leaf verifier: make trusted leaf certs source pluggable (#6050)\n * cmd: Adjust config load logs/errors (#6032)\n * reverseproxy: SRV dynamic upstream failover (#5832)\n * ci: bump golangci/golangci-lint-action from 3 to 4 (#6141)\n * core: OnExit hooks (#6128)\n * cmd: fix the output of the `Usage` section (#6138)\n * caddytls: verifier: caddyfile: re-add Caddyfile support (#6127)\n * acmeserver: add policy field to define allow/deny rules (#5796)\n * reverseproxy: cookie should be Secure and SameSite=None when TLS (#6115)\n * caddytest: Rename adapt tests to `*.caddyfiletest` extension (#6119)\n * tests: uses testing.TB interface for helper to be able to use test server in benchmarks. (#6103)\n * caddyfile: Assert having a space after heredoc marker to simply check (#6117)\n * chore: Update Chroma to get the new Caddyfile lexer (#6118)\n * reverseproxy: use context.WithoutCancel (#6116)\n * caddyfile: Reject directives in the place of site addresses (#6104)\n * caddyhttp: Register post-shutdown callbacks (#5948)\n * caddyhttp: Only attempt to enable full duplex for HTTP/1.x (#6102)\n * caddyauth: Drop support for `scrypt` (#6091)\n * Revert \u0027caddyfile: Reject long heredoc markers (#6098)\u0027 (#6100)\n * caddyauth: Rename `basicauth` to `basic_auth` (#6092)\n * logging: Inline Caddyfile syntax for `ip_mask` filter (#6094)\n * caddyfile: Reject long heredoc markers (#6098)\n * chore: Rename CI jobs, run on M1 mac (#6089)\n * update comment\n * improved list\n * fix: add back text/*\n * fix: add more media types to the compressed by default list\n * acmeserver: support specifying the allowed challenge types (#5794)\n * matchers: Drop `forwarded` option from `remote_ip` matcher (#6085)\n * caddyhttp: Test cases for `%2F` and `%252F` (#6084)\n * bump to golang 1.22 (#6083)\n * fileserver: Browse can show symlink target if enabled (#5973)\n * core: Support NO_COLOR env var to disable log coloring (#6078)\n * build(deps): bump peter-evans/repository-dispatch from 2 to 3 (#6080)\n * Update comment in setcap helper script\n * caddytls: Make on-demand \u0027ask\u0027 permission modular (#6055)\n * core: Add `ctx.Slogger()` which returns an `slog` logger (#5945)\n * chore: Update quic-go to v0.41.0, bump Go minimum to 1.21 (#6043)\n * chore: enabling a few more linters (#5961)\n * caddyfile: Correctly close the heredoc when the closing marker appears immediately (#6062)\n * caddyfile: Switch to slices.Equal for better performance (#6061)\n * tls: modularize trusted CA providers (#5784)\n * logging: Automatic `wrap` default for `filter` encoder (#5980)\n * caddyhttp: Fix panic when request missing ClientIPVarKey (#6040)\n * caddyfile: Normalize \u0026 flatten all unmarshalers (#6037)\n * cmd: reverseproxy: log: use caddy logger (#6042)\n * matchers: `query` now ANDs multiple keys (#6054)\n * caddyfile: Add heredoc support to `fmt` command (#6056)\n * refactor: move automaxprocs init in caddycmd.Main()\n * caddyfile: Allow heredoc blank lines (#6051)\n * httpcaddyfile: Add optional status code argument to `handle_errors` directive (#5965)\n * httpcaddyfile: Rewrite `root` and `rewrite` parsing to allow omitting matcher (#5844)\n * fileserver: Implement caddyfile.Unmarshaler interface (#5850)\n * reverseproxy: Add `tls_curves` option to HTTP transport (#5851)\n * caddyhttp: Security enhancements for client IP parsing (#5805)\n * replacer: Fix escaped closing braces (#5995)\n * filesystem: Globally declared filesystems, `fs` directive (#5833)\n * ci/cd: use the build tag `nobadger` to exclude badgerdb (#6031)\n * httpcaddyfile: Fix redir \u003cto\u003e html (#6001)\n * httpcaddyfile: Support client auth verifiers (#6022)\n * tls: add reuse_private_keys (#6025)\n * reverseproxy: Only change Content-Length when full request is buffered (#5830)\n * Switch Solaris-derivatives away from listen_unix (#6021)\n * build(deps): bump actions/upload-artifact from 3 to 4 (#6013)\n * build(deps): bump actions/setup-go from 4 to 5 (#6012)\n * chore: check against errors of `io/fs` instead of `os` (#6011)\n * caddyhttp: support unix sockets in `caddy respond` command (#6010)\n * fileserver: Add total file size to directory listing (#6003)\n * httpcaddyfile: Fix cert file decoding to load multiple PEM in one file (#5997)\n * build(deps): bump golang.org/x/crypto from 0.16.0 to 0.17.0 (#5994)\n * cmd: use automaxprocs for better perf in containers (#5711)\n * logging: Add `zap.Option` support (#5944)\n * httpcaddyfile: Sort skip_hosts for deterministic JSON (#5990)\n * metrics: Record request metrics on HTTP errors (#5979)\n * go.mod: Updated quic-go to v0.40.1 (#5983)\n * fileserver: Enable compression for command by default (#5855)\n * fileserver: New --precompressed flag (#5880)\n * caddyhttp: Add `uuid` to access logs when used (#5859)\n * proxyprotocol: use github.com/pires/go-proxyproto (#5915)\n * cmd: Preserve LastModified date when exporting storage (#5968)\n * core: Always make AppDataDir for InstanceID (#5976)\n * chore: cross-build for AIX (#5971)\n * caddytls: Sync distributed storage cleaning (#5940)\n * caddytls: Context to DecisionFunc (#5923)\n * tls: accept placeholders in string values of certificate loaders (#5963)\n * templates: Offically make templates extensible (#5939)\n * http2 uses new round-robin scheduler (#5946)\n * panic when reading from backend failed to propagate stream error (#5952)\n * chore: Bump otel to v1.21.0. (#5949)\n * httpredirectlistener: Only set read limit for when request is HTTP (#5917)\n * fileserver: Add .m4v for browse template icon\n * Revert \u0027caddyhttp: Use sync.Pool to reduce lengthReader allocations (#5848)\u0027 (#5924)\n * go.mod: update quic-go version to v0.40.0 (#5922)\n * update quic-go to v0.39.3 (#5918)\n * chore: Fix usage pool comment (#5916)\n * test: acmeserver: add smoke test for the ACME server directory (#5914)\n * Upgrade acmeserver to github.com/go-chi/chi/v5 (#5913)\n * caddyhttp: Adjust `scheme` placeholder docs (#5910)\n * go.mod: Upgrade quic-go to v0.39.1\n * go.mod: CVE-2023-45142 Update opentelemetry (#5908)\n * templates: Delete headers on `httpError` to reset to clean slate (#5905)\n * httpcaddyfile: Remove port from logger names (#5881)\n * core: Apply SO_REUSEPORT to UDP sockets (#5725)\n * caddyhttp: Use sync.Pool to reduce lengthReader allocations (#5848)\n * cmd: Add newline character to version string in CLI output (#5895)\n * core: quic listener will manage the underlying socket by itself (#5749)\n * templates: Clarify `include` args docs, add `.ClientIP` (#5898)\n * httpcaddyfile: Fix TLS automation policy merging with get_certificate (#5896)\n * cmd: upgrade: resolve symlink of the executable (#5891)\n * caddyfile: Fix variadic placeholder false positive when token contains `:` (#5883)\n\n- CVEs:\n * CVE-2024-22189 (boo#1222468)\n * CVE-2023-45142\n\n- Update to version 2.7.6:\n\n * caddytls: Sync distributed storage cleaning (#5940)\n * caddytls: Context to DecisionFunc (#5923)\n * tls: accept placeholders in string values of certificate loaders (#5963)\n * templates: Offically make templates extensible (#5939)\n * http2 uses new round-robin scheduler (#5946)\n * panic when reading from backend failed to propagate stream error (#5952)\n * chore: Bump otel to v1.21.0. (#5949)\n * httpredirectlistener: Only set read limit for when request is HTTP (#5917)\n * fileserver: Add .m4v for browse template icon\n * Revert \u0027caddyhttp: Use sync.Pool to reduce lengthReader allocations (#5848)\u0027 (#5924)\n * go.mod: update quic-go version to v0.40.0 (#5922)\n * update quic-go to v0.39.3 (#5918)\n * chore: Fix usage pool comment (#5916)\n * test: acmeserver: add smoke test for the ACME server directory (#5914)\n * Upgrade acmeserver to github.com/go-chi/chi/v5 (#5913)\n * caddyhttp: Adjust `scheme` placeholder docs (#5910)\n * go.mod: Upgrade quic-go to v0.39.1\n * go.mod: CVE-2023-45142 Update opentelemetry (#5908)\n * templates: Delete headers on `httpError` to reset to clean slate (#5905)\n * httpcaddyfile: Remove port from logger names (#5881)\n * core: Apply SO_REUSEPORT to UDP sockets (#5725)\n * caddyhttp: Use sync.Pool to reduce lengthReader allocations (#5848)\n * cmd: Add newline character to version string in CLI output (#5895)\n * core: quic listener will manage the underlying socket by itself (#5749)\n * templates: Clarify `include` args docs, add `.ClientIP` (#5898)\n * httpcaddyfile: Fix TLS automation policy merging with get_certificate (#5896)\n * cmd: upgrade: resolve symlink of the executable (#5891)\n * caddyfile: Fix variadic placeholder false positive when token contains `:` (#5883)\n\n- Update to version 2.7.5:\n\n * admin: Respond with 4xx on non-existing config path (#5870)\n * ci: Force the Go version for govulncheck (#5879)\n * fileserver: Set canonical URL on browse template (#5867)\n * tls: Add X25519Kyber768Draft00 PQ \u0027curve\u0027 behind build tag (#5852)\n * reverseproxy: Add more debug logs (#5793)\n * reverseproxy: Fix `least_conn` policy regression (#5862)\n * reverseproxy: Add logging for dynamic A upstreams (#5857)\n * reverseproxy: Replace health header placeholders (#5861)\n * httpcaddyfile: Sort TLS SNI matcher for deterministic JSON output (#5860)\n * cmd: Fix exiting with custom status code, add `caddy -v` (#5874)\n * reverseproxy: fix parsing Caddyfile fails for unlimited request/response buffers (#5828)\n * reverseproxy: Fix retries on \u0027upstreams unavailable\u0027 error (#5841)\n * httpcaddyfile: Enable TLS for catch-all site if `tls` directive is specified (#5808)\n * encode: Add `application/wasm*` to the default content types (#5869)\n * fileserver: Add command shortcuts `-l` and `-a` (#5854)\n * go.mod: Upgrade dependencies incl. x/net/http\n * templates: Add dummy `RemoteAddr` to `httpInclude` request, proxy compatibility (#5845)\n * reverseproxy: Allow fallthrough for response handlers without routes (#5780)\n * fix: caddytest.AssertResponseCode error message (#5853)\n * build(deps): bump goreleaser/goreleaser-action from 4 to 5 (#5847)\n * build(deps): bump actions/checkout from 3 to 4 (#5846)\n * caddyhttp: Use LimitedReader for HTTPRedirectListener\n * fileserver: browse template SVG icons and UI tweaks (#5812)\n * reverseproxy: fix nil pointer dereference in AUpstreams.GetUpstreams (#5811)\n * httpcaddyfile: fix placeholder shorthands in named routes (#5791)\n * cmd: Prevent overwriting existing env vars with `--envfile` (#5803)\n * ci: Run govulncheck (#5790)\n * logging: query filter for array of strings (#5779)\n * logging: Clone array on log filters, prevent side-effects (#5786)\n * fileserver: Export BrowseTemplate\n * ci: ensure short-sha is exported correctly on all platforms (#5781)\n * caddyfile: Fix case where heredoc marker is empty after newline (#5769)\n * go.mod: Update quic-go to v0.38.0 (#5772)\n * chore: Appease gosec linter (#5777)\n * replacer: change timezone to UTC for \u0027time.now.http\u0027 placeholders (#5774)\n * caddyfile: Adjust error formatting (#5765)\n * update quic-go to v0.37.6 (#5767)\n * httpcaddyfile: Stricter errors for site and upstream address schemes (#5757)\n * caddyfile: Loosen heredoc parsing (#5761)\n * fileserver: docs: clarify the ability to produce JSON array with `browse` (#5751)\n * fix package typo (#5764)\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-2024-220",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_0220-1.json"
},
{
"category": "self",
"summary": "URL for openSUSE-SU-2024:0220-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QNDMJCVODSMOIFD655EHBVQRLNUDXLQK/"
},
{
"category": "self",
"summary": "E-Mail link for openSUSE-SU-2024:0220-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QNDMJCVODSMOIFD655EHBVQRLNUDXLQK/"
},
{
"category": "self",
"summary": "SUSE Bug 1222468",
"url": "https://bugzilla.suse.com/1222468"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-45142 page",
"url": "https://www.suse.com/security/cve/CVE-2023-45142/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-22189 page",
"url": "https://www.suse.com/security/cve/CVE-2024-22189/"
}
],
"title": "Security update for caddy",
"tracking": {
"current_release_date": "2024-07-26T10:03:44Z",
"generator": {
"date": "2024-07-26T10:03:44Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2024:0220-1",
"initial_release_date": "2024-07-26T10:03:44Z",
"revision_history": [
{
"date": "2024-07-26T10:03:44Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "caddy-2.8.4-bp156.3.3.1.aarch64",
"product": {
"name": "caddy-2.8.4-bp156.3.3.1.aarch64",
"product_id": "caddy-2.8.4-bp156.3.3.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "caddy-2.8.4-bp156.3.3.1.i586",
"product": {
"name": "caddy-2.8.4-bp156.3.3.1.i586",
"product_id": "caddy-2.8.4-bp156.3.3.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "caddy-bash-completion-2.8.4-bp156.3.3.1.noarch",
"product": {
"name": "caddy-bash-completion-2.8.4-bp156.3.3.1.noarch",
"product_id": "caddy-bash-completion-2.8.4-bp156.3.3.1.noarch"
}
},
{
"category": "product_version",
"name": "caddy-fish-completion-2.8.4-bp156.3.3.1.noarch",
"product": {
"name": "caddy-fish-completion-2.8.4-bp156.3.3.1.noarch",
"product_id": "caddy-fish-completion-2.8.4-bp156.3.3.1.noarch"
}
},
{
"category": "product_version",
"name": "caddy-zsh-completion-2.8.4-bp156.3.3.1.noarch",
"product": {
"name": "caddy-zsh-completion-2.8.4-bp156.3.3.1.noarch",
"product_id": "caddy-zsh-completion-2.8.4-bp156.3.3.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "caddy-2.8.4-bp156.3.3.1.ppc64le",
"product": {
"name": "caddy-2.8.4-bp156.3.3.1.ppc64le",
"product_id": "caddy-2.8.4-bp156.3.3.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "caddy-2.8.4-bp156.3.3.1.s390x",
"product": {
"name": "caddy-2.8.4-bp156.3.3.1.s390x",
"product_id": "caddy-2.8.4-bp156.3.3.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "caddy-2.8.4-bp156.3.3.1.x86_64",
"product": {
"name": "caddy-2.8.4-bp156.3.3.1.x86_64",
"product_id": "caddy-2.8.4-bp156.3.3.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Package Hub 15 SP6",
"product": {
"name": "SUSE Package Hub 15 SP6",
"product_id": "SUSE Package Hub 15 SP6"
}
},
{
"category": "product_name",
"name": "openSUSE Leap 15.6",
"product": {
"name": "openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.6"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "caddy-2.8.4-bp156.3.3.1.aarch64 as component of SUSE Package Hub 15 SP6",
"product_id": "SUSE Package Hub 15 SP6:caddy-2.8.4-bp156.3.3.1.aarch64"
},
"product_reference": "caddy-2.8.4-bp156.3.3.1.aarch64",
"relates_to_product_reference": "SUSE Package Hub 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "caddy-2.8.4-bp156.3.3.1.i586 as component of SUSE Package Hub 15 SP6",
"product_id": "SUSE Package Hub 15 SP6:caddy-2.8.4-bp156.3.3.1.i586"
},
"product_reference": "caddy-2.8.4-bp156.3.3.1.i586",
"relates_to_product_reference": "SUSE Package Hub 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "caddy-2.8.4-bp156.3.3.1.ppc64le as component of SUSE Package Hub 15 SP6",
"product_id": "SUSE Package Hub 15 SP6:caddy-2.8.4-bp156.3.3.1.ppc64le"
},
"product_reference": "caddy-2.8.4-bp156.3.3.1.ppc64le",
"relates_to_product_reference": "SUSE Package Hub 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "caddy-2.8.4-bp156.3.3.1.s390x as component of SUSE Package Hub 15 SP6",
"product_id": "SUSE Package Hub 15 SP6:caddy-2.8.4-bp156.3.3.1.s390x"
},
"product_reference": "caddy-2.8.4-bp156.3.3.1.s390x",
"relates_to_product_reference": "SUSE Package Hub 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "caddy-2.8.4-bp156.3.3.1.x86_64 as component of SUSE Package Hub 15 SP6",
"product_id": "SUSE Package Hub 15 SP6:caddy-2.8.4-bp156.3.3.1.x86_64"
},
"product_reference": "caddy-2.8.4-bp156.3.3.1.x86_64",
"relates_to_product_reference": "SUSE Package Hub 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "caddy-bash-completion-2.8.4-bp156.3.3.1.noarch as component of SUSE Package Hub 15 SP6",
"product_id": "SUSE Package Hub 15 SP6:caddy-bash-completion-2.8.4-bp156.3.3.1.noarch"
},
"product_reference": "caddy-bash-completion-2.8.4-bp156.3.3.1.noarch",
"relates_to_product_reference": "SUSE Package Hub 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "caddy-fish-completion-2.8.4-bp156.3.3.1.noarch as component of SUSE Package Hub 15 SP6",
"product_id": "SUSE Package Hub 15 SP6:caddy-fish-completion-2.8.4-bp156.3.3.1.noarch"
},
"product_reference": "caddy-fish-completion-2.8.4-bp156.3.3.1.noarch",
"relates_to_product_reference": "SUSE Package Hub 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "caddy-zsh-completion-2.8.4-bp156.3.3.1.noarch as component of SUSE Package Hub 15 SP6",
"product_id": "SUSE Package Hub 15 SP6:caddy-zsh-completion-2.8.4-bp156.3.3.1.noarch"
},
"product_reference": "caddy-zsh-completion-2.8.4-bp156.3.3.1.noarch",
"relates_to_product_reference": "SUSE Package Hub 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "caddy-2.8.4-bp156.3.3.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:caddy-2.8.4-bp156.3.3.1.aarch64"
},
"product_reference": "caddy-2.8.4-bp156.3.3.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "caddy-2.8.4-bp156.3.3.1.i586 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:caddy-2.8.4-bp156.3.3.1.i586"
},
"product_reference": "caddy-2.8.4-bp156.3.3.1.i586",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "caddy-2.8.4-bp156.3.3.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:caddy-2.8.4-bp156.3.3.1.ppc64le"
},
"product_reference": "caddy-2.8.4-bp156.3.3.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "caddy-2.8.4-bp156.3.3.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:caddy-2.8.4-bp156.3.3.1.s390x"
},
"product_reference": "caddy-2.8.4-bp156.3.3.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "caddy-2.8.4-bp156.3.3.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:caddy-2.8.4-bp156.3.3.1.x86_64"
},
"product_reference": "caddy-2.8.4-bp156.3.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "caddy-bash-completion-2.8.4-bp156.3.3.1.noarch as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:caddy-bash-completion-2.8.4-bp156.3.3.1.noarch"
},
"product_reference": "caddy-bash-completion-2.8.4-bp156.3.3.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "caddy-fish-completion-2.8.4-bp156.3.3.1.noarch as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:caddy-fish-completion-2.8.4-bp156.3.3.1.noarch"
},
"product_reference": "caddy-fish-completion-2.8.4-bp156.3.3.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "caddy-zsh-completion-2.8.4-bp156.3.3.1.noarch as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:caddy-zsh-completion-2.8.4-bp156.3.3.1.noarch"
},
"product_reference": "caddy-zsh-completion-2.8.4-bp156.3.3.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.6"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-45142",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-45142"
}
],
"notes": [
{
"category": "general",
"text": "OpenTelemetry-Go Contrib is a collection of third-party packages for OpenTelemetry-Go. A handler wrapper out of the box adds labels `http.user_agent` and `http.method` that have unbound cardinality. It leads to the server\u0027s potential memory exhaustion when many malicious requests are sent to it. HTTP header User-Agent or HTTP method for requests can be easily set by an attacker to be random and long. The library internally uses `httpconv.ServerRequest` that records every value for HTTP `method` and `User-Agent`. In order to be affected, a program has to use the `otelhttp.NewHandler` wrapper and not filter any unknown HTTP methods or User agents on the level of CDN, LB, previous middleware, etc. Version 0.44.0 fixed this issue when the values collected for attribute `http.request.method` were changed to be restricted to a set of well-known values and other high cardinality attributes were removed. As a workaround to stop being affected, `otelhttp.WithFilter()` can be used, but it requires manual careful configuration to not log certain requests entirely. For convenience and safe usage of this library, it should by default mark with the label `unknown` non-standard HTTP methods and User agents to show that such requests were made but do not increase cardinality. In case someone wants to stay with the current behavior, library API should allow to enable it.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP6:caddy-2.8.4-bp156.3.3.1.aarch64",
"SUSE Package Hub 15 SP6:caddy-2.8.4-bp156.3.3.1.i586",
"SUSE Package Hub 15 SP6:caddy-2.8.4-bp156.3.3.1.ppc64le",
"SUSE Package Hub 15 SP6:caddy-2.8.4-bp156.3.3.1.s390x",
"SUSE Package Hub 15 SP6:caddy-2.8.4-bp156.3.3.1.x86_64",
"SUSE Package Hub 15 SP6:caddy-bash-completion-2.8.4-bp156.3.3.1.noarch",
"SUSE Package Hub 15 SP6:caddy-fish-completion-2.8.4-bp156.3.3.1.noarch",
"SUSE Package Hub 15 SP6:caddy-zsh-completion-2.8.4-bp156.3.3.1.noarch",
"openSUSE Leap 15.6:caddy-2.8.4-bp156.3.3.1.aarch64",
"openSUSE Leap 15.6:caddy-2.8.4-bp156.3.3.1.i586",
"openSUSE Leap 15.6:caddy-2.8.4-bp156.3.3.1.ppc64le",
"openSUSE Leap 15.6:caddy-2.8.4-bp156.3.3.1.s390x",
"openSUSE Leap 15.6:caddy-2.8.4-bp156.3.3.1.x86_64",
"openSUSE Leap 15.6:caddy-bash-completion-2.8.4-bp156.3.3.1.noarch",
"openSUSE Leap 15.6:caddy-fish-completion-2.8.4-bp156.3.3.1.noarch",
"openSUSE Leap 15.6:caddy-zsh-completion-2.8.4-bp156.3.3.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-45142",
"url": "https://www.suse.com/security/cve/CVE-2023-45142"
},
{
"category": "external",
"summary": "SUSE Bug 1228553 for CVE-2023-45142",
"url": "https://bugzilla.suse.com/1228553"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP6:caddy-2.8.4-bp156.3.3.1.aarch64",
"SUSE Package Hub 15 SP6:caddy-2.8.4-bp156.3.3.1.i586",
"SUSE Package Hub 15 SP6:caddy-2.8.4-bp156.3.3.1.ppc64le",
"SUSE Package Hub 15 SP6:caddy-2.8.4-bp156.3.3.1.s390x",
"SUSE Package Hub 15 SP6:caddy-2.8.4-bp156.3.3.1.x86_64",
"SUSE Package Hub 15 SP6:caddy-bash-completion-2.8.4-bp156.3.3.1.noarch",
"SUSE Package Hub 15 SP6:caddy-fish-completion-2.8.4-bp156.3.3.1.noarch",
"SUSE Package Hub 15 SP6:caddy-zsh-completion-2.8.4-bp156.3.3.1.noarch",
"openSUSE Leap 15.6:caddy-2.8.4-bp156.3.3.1.aarch64",
"openSUSE Leap 15.6:caddy-2.8.4-bp156.3.3.1.i586",
"openSUSE Leap 15.6:caddy-2.8.4-bp156.3.3.1.ppc64le",
"openSUSE Leap 15.6:caddy-2.8.4-bp156.3.3.1.s390x",
"openSUSE Leap 15.6:caddy-2.8.4-bp156.3.3.1.x86_64",
"openSUSE Leap 15.6:caddy-bash-completion-2.8.4-bp156.3.3.1.noarch",
"openSUSE Leap 15.6:caddy-fish-completion-2.8.4-bp156.3.3.1.noarch",
"openSUSE Leap 15.6:caddy-zsh-completion-2.8.4-bp156.3.3.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP6:caddy-2.8.4-bp156.3.3.1.aarch64",
"SUSE Package Hub 15 SP6:caddy-2.8.4-bp156.3.3.1.i586",
"SUSE Package Hub 15 SP6:caddy-2.8.4-bp156.3.3.1.ppc64le",
"SUSE Package Hub 15 SP6:caddy-2.8.4-bp156.3.3.1.s390x",
"SUSE Package Hub 15 SP6:caddy-2.8.4-bp156.3.3.1.x86_64",
"SUSE Package Hub 15 SP6:caddy-bash-completion-2.8.4-bp156.3.3.1.noarch",
"SUSE Package Hub 15 SP6:caddy-fish-completion-2.8.4-bp156.3.3.1.noarch",
"SUSE Package Hub 15 SP6:caddy-zsh-completion-2.8.4-bp156.3.3.1.noarch",
"openSUSE Leap 15.6:caddy-2.8.4-bp156.3.3.1.aarch64",
"openSUSE Leap 15.6:caddy-2.8.4-bp156.3.3.1.i586",
"openSUSE Leap 15.6:caddy-2.8.4-bp156.3.3.1.ppc64le",
"openSUSE Leap 15.6:caddy-2.8.4-bp156.3.3.1.s390x",
"openSUSE Leap 15.6:caddy-2.8.4-bp156.3.3.1.x86_64",
"openSUSE Leap 15.6:caddy-bash-completion-2.8.4-bp156.3.3.1.noarch",
"openSUSE Leap 15.6:caddy-fish-completion-2.8.4-bp156.3.3.1.noarch",
"openSUSE Leap 15.6:caddy-zsh-completion-2.8.4-bp156.3.3.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-26T10:03:44Z",
"details": "important"
}
],
"title": "CVE-2023-45142"
},
{
"cve": "CVE-2024-22189",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-22189"
}
],
"notes": [
{
"category": "general",
"text": "quic-go is an implementation of the QUIC protocol in Go. Prior to version 0.42.0, an attacker can cause its peer to run out of memory sending a large number of `NEW_CONNECTION_ID` frames that retire old connection IDs. The receiver is supposed to respond to each retirement frame with a `RETIRE_CONNECTION_ID` frame. The attacker can prevent the receiver from sending out (the vast majority of) these `RETIRE_CONNECTION_ID` frames by collapsing the peers congestion window (by selectively acknowledging received packets) and by manipulating the peer\u0027s RTT estimate. Version 0.42.0 contains a patch for the issue. No known workarounds are available.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP6:caddy-2.8.4-bp156.3.3.1.aarch64",
"SUSE Package Hub 15 SP6:caddy-2.8.4-bp156.3.3.1.i586",
"SUSE Package Hub 15 SP6:caddy-2.8.4-bp156.3.3.1.ppc64le",
"SUSE Package Hub 15 SP6:caddy-2.8.4-bp156.3.3.1.s390x",
"SUSE Package Hub 15 SP6:caddy-2.8.4-bp156.3.3.1.x86_64",
"SUSE Package Hub 15 SP6:caddy-bash-completion-2.8.4-bp156.3.3.1.noarch",
"SUSE Package Hub 15 SP6:caddy-fish-completion-2.8.4-bp156.3.3.1.noarch",
"SUSE Package Hub 15 SP6:caddy-zsh-completion-2.8.4-bp156.3.3.1.noarch",
"openSUSE Leap 15.6:caddy-2.8.4-bp156.3.3.1.aarch64",
"openSUSE Leap 15.6:caddy-2.8.4-bp156.3.3.1.i586",
"openSUSE Leap 15.6:caddy-2.8.4-bp156.3.3.1.ppc64le",
"openSUSE Leap 15.6:caddy-2.8.4-bp156.3.3.1.s390x",
"openSUSE Leap 15.6:caddy-2.8.4-bp156.3.3.1.x86_64",
"openSUSE Leap 15.6:caddy-bash-completion-2.8.4-bp156.3.3.1.noarch",
"openSUSE Leap 15.6:caddy-fish-completion-2.8.4-bp156.3.3.1.noarch",
"openSUSE Leap 15.6:caddy-zsh-completion-2.8.4-bp156.3.3.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-22189",
"url": "https://www.suse.com/security/cve/CVE-2024-22189"
},
{
"category": "external",
"summary": "SUSE Bug 1222461 for CVE-2024-22189",
"url": "https://bugzilla.suse.com/1222461"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP6:caddy-2.8.4-bp156.3.3.1.aarch64",
"SUSE Package Hub 15 SP6:caddy-2.8.4-bp156.3.3.1.i586",
"SUSE Package Hub 15 SP6:caddy-2.8.4-bp156.3.3.1.ppc64le",
"SUSE Package Hub 15 SP6:caddy-2.8.4-bp156.3.3.1.s390x",
"SUSE Package Hub 15 SP6:caddy-2.8.4-bp156.3.3.1.x86_64",
"SUSE Package Hub 15 SP6:caddy-bash-completion-2.8.4-bp156.3.3.1.noarch",
"SUSE Package Hub 15 SP6:caddy-fish-completion-2.8.4-bp156.3.3.1.noarch",
"SUSE Package Hub 15 SP6:caddy-zsh-completion-2.8.4-bp156.3.3.1.noarch",
"openSUSE Leap 15.6:caddy-2.8.4-bp156.3.3.1.aarch64",
"openSUSE Leap 15.6:caddy-2.8.4-bp156.3.3.1.i586",
"openSUSE Leap 15.6:caddy-2.8.4-bp156.3.3.1.ppc64le",
"openSUSE Leap 15.6:caddy-2.8.4-bp156.3.3.1.s390x",
"openSUSE Leap 15.6:caddy-2.8.4-bp156.3.3.1.x86_64",
"openSUSE Leap 15.6:caddy-bash-completion-2.8.4-bp156.3.3.1.noarch",
"openSUSE Leap 15.6:caddy-fish-completion-2.8.4-bp156.3.3.1.noarch",
"openSUSE Leap 15.6:caddy-zsh-completion-2.8.4-bp156.3.3.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP6:caddy-2.8.4-bp156.3.3.1.aarch64",
"SUSE Package Hub 15 SP6:caddy-2.8.4-bp156.3.3.1.i586",
"SUSE Package Hub 15 SP6:caddy-2.8.4-bp156.3.3.1.ppc64le",
"SUSE Package Hub 15 SP6:caddy-2.8.4-bp156.3.3.1.s390x",
"SUSE Package Hub 15 SP6:caddy-2.8.4-bp156.3.3.1.x86_64",
"SUSE Package Hub 15 SP6:caddy-bash-completion-2.8.4-bp156.3.3.1.noarch",
"SUSE Package Hub 15 SP6:caddy-fish-completion-2.8.4-bp156.3.3.1.noarch",
"SUSE Package Hub 15 SP6:caddy-zsh-completion-2.8.4-bp156.3.3.1.noarch",
"openSUSE Leap 15.6:caddy-2.8.4-bp156.3.3.1.aarch64",
"openSUSE Leap 15.6:caddy-2.8.4-bp156.3.3.1.i586",
"openSUSE Leap 15.6:caddy-2.8.4-bp156.3.3.1.ppc64le",
"openSUSE Leap 15.6:caddy-2.8.4-bp156.3.3.1.s390x",
"openSUSE Leap 15.6:caddy-2.8.4-bp156.3.3.1.x86_64",
"openSUSE Leap 15.6:caddy-bash-completion-2.8.4-bp156.3.3.1.noarch",
"openSUSE Leap 15.6:caddy-fish-completion-2.8.4-bp156.3.3.1.noarch",
"openSUSE Leap 15.6:caddy-zsh-completion-2.8.4-bp156.3.3.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-26T10:03:44Z",
"details": "important"
}
],
"title": "CVE-2024-22189"
}
]
}
OPENSUSE-SU-2024:0319-1
Vulnerability from csaf_opensuse - Published: 2024-09-27 14:01 - Updated: 2024-09-27 14:01| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15 SP6:coredns-1.11.3-bp156.4.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP6:coredns-1.11.3-bp156.4.3.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP6:coredns-1.11.3-bp156.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP6:coredns-extras-1.11.3-bp156.4.3.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:coredns-1.11.3-bp156.4.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:coredns-1.11.3-bp156.4.3.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:coredns-1.11.3-bp156.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:coredns-extras-1.11.3-bp156.4.3.1.noarch | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15 SP6:coredns-1.11.3-bp156.4.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP6:coredns-1.11.3-bp156.4.3.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP6:coredns-1.11.3-bp156.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP6:coredns-extras-1.11.3-bp156.4.3.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:coredns-1.11.3-bp156.4.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:coredns-1.11.3-bp156.4.3.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:coredns-1.11.3-bp156.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:coredns-extras-1.11.3-bp156.4.3.1.noarch | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15 SP6:coredns-1.11.3-bp156.4.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP6:coredns-1.11.3-bp156.4.3.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP6:coredns-1.11.3-bp156.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP6:coredns-extras-1.11.3-bp156.4.3.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:coredns-1.11.3-bp156.4.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:coredns-1.11.3-bp156.4.3.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:coredns-1.11.3-bp156.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:coredns-extras-1.11.3-bp156.4.3.1.noarch | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15 SP6:coredns-1.11.3-bp156.4.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP6:coredns-1.11.3-bp156.4.3.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP6:coredns-1.11.3-bp156.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP6:coredns-extras-1.11.3-bp156.4.3.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:coredns-1.11.3-bp156.4.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:coredns-1.11.3-bp156.4.3.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:coredns-1.11.3-bp156.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:coredns-extras-1.11.3-bp156.4.3.1.noarch | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15 SP6:coredns-1.11.3-bp156.4.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP6:coredns-1.11.3-bp156.4.3.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP6:coredns-1.11.3-bp156.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP6:coredns-extras-1.11.3-bp156.4.3.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:coredns-1.11.3-bp156.4.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:coredns-1.11.3-bp156.4.3.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:coredns-1.11.3-bp156.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:coredns-extras-1.11.3-bp156.4.3.1.noarch | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15 SP6:coredns-1.11.3-bp156.4.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP6:coredns-1.11.3-bp156.4.3.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP6:coredns-1.11.3-bp156.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP6:coredns-extras-1.11.3-bp156.4.3.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:coredns-1.11.3-bp156.4.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:coredns-1.11.3-bp156.4.3.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:coredns-1.11.3-bp156.4.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:coredns-extras-1.11.3-bp156.4.3.1.noarch | — |
Vendor Fix
|
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for coredns",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for coredns fixes the following issues:\n\nUpdate to version 1.11.3:\n\n * optimize the performance for high qps (#6767)\n * bump deps\n * Fix zone parser error handling (#6680)\n * Add alternate option to forward plugin (#6681)\n * fix: plugin/file: return error when parsing the file fails (#6699)\n * [fix:documentation] Clarify autopath README (#6750)\n * Fix outdated test (#6747)\n * Bump go version from 1.21.8 to 1.21.11 (#6755)\n * Generate zplugin.go correctly with third-party plugins (#6692)\n * dnstap: uses pointer receiver for small response writer (#6644)\n * chore: fix function name in comment (#6608)\n * [plugin/forward] Strip local zone from IPV6 nameservers (#6635)\n- fixes CVE-2023-30464\n- fixes CVE-2023-28452\n\nUpdate to upstream head (git commit #5a52707):\n\n * bump deps to address security issue CVE-2024-22189\n * Return RcodeServerFailure when DNS64 has no next plugin (#6590)\n * add plusserver to adopters (#6565)\n * Change the log flags to be a variable that can be set prior to calling Run (#6546)\n * Enable Prometheus native histograms (#6524)\n * forward: respect context (#6483)\n * add client labels to k8s plugin metadata (#6475)\n * fix broken link in webpage (#6488)\n * Repo controlled Go version (#6526)\n * removed the mutex locks with atomic bool (#6525)\n\nUpdate to version 1.11.2:\n\n * rewrite: fix multi request concurrency issue in cname rewrite (#6407)\n * plugin/tls: respect the path specified by root plugin (#6138)\n * plugin/auto: warn when auto is unable to read elements of the directory tree (#6333)\n * fix: make the codeowners link relative (#6397)\n * plugin/etcd: the etcd client adds the DialKeepAliveTime parameter (#6351)\n * plugin/cache: key cache on Checking Disabled (CD) bit (#6354)\n * Use the correct root domain name in the proxy plugin\u0027s TestHealthX tests (#6395)\n * Add PITS Global Data Recovery Services as an adopter (#6304)\n * Handle UDP responses that overflow with TC bit with test case (#6277)\n * plugin/rewrite: add rcode as a rewrite option (#6204)\n\n- CVE-2024-0874: coredns: CD bit response is cached and served later\n\n- Update to version 1.11.1:\n\n * Revert \u201cplugin/forward: Continue waiting after receiving malformed responses\n * plugin/dnstap: add support for \u201cextra\u201d field in payload\n * plugin/cache: fix keepttl parsing\n\n- Update to version 1.11.0:\n\n * Adds support for accepting DNS connections over QUIC (doq).\n * Adds CNAME target rewrites to the rewrite plugin.\n * Plus many bug fixes, and some security improvements.\n * This release introduces the following backward incompatible changes:\n + In the kubernetes plugin, we have dropped support for watching Endpoint and Endpointslice v1beta, \n since all supported K8s versions now use Endpointslice.\n + The bufsize plugin changed its default size limit value to 1232\n + Some changes to forward plugin metrics.\n\n- Update to version 1.10.1:\n\n * Corrected architecture labels in multi-arch image manifest\n * A new plugin timeouts that allows configuration of server listener timeout durations\n * acl can drop queries as an action\n * template supports creating responses with extended DNS errors\n * New weighted policy in loadbalance\n * Option to serve original record TTLs from cache\n\n- Update to version 1.10.0:\n\n\t* core: add log listeners for k8s_event plugin (#5451)\n\t* core: log DoH HTTP server error logs in CoreDNS format (#5457)\n\t* core: warn when domain names are not in RFC1035 preferred syntax (#5414)\n\t* plugin/acl: add support for extended DNS errors (#5532)\n\t* plugin/bufsize: do not expand query UDP buffer size if already set to a smaller value (#5602)\n\t* plugin/cache: add cache disable option (#5540)\n\t* plugin/cache: add metadata for wildcard record responses (#5308)\n\t* plugin/cache: add option to adjust SERVFAIL response cache TTL (#5320)\n\t* plugin/cache: correct responses to Authenticated Data requests (#5191)\n\t* plugin/dnstap: add identity and version support for the dnstap plugin (#5555)\n\t* plugin/file: add metadata for wildcard record responses (#5308)\n\t* plugin/forward: enable multiple forward declarations (#5127)\n\t* plugin/forward: health_check needs to normalize a specified domain name (#5543)\n\t* plugin/forward: remove unused coredns_forward_sockets_open metric (#5431)\n\t* plugin/header: add support for query modification (#5556)\n\t* plugin/health: bypass proxy in self health check (#5401)\n\t* plugin/health: don\u0027t go lameduck when reloading (#5472)\n\t* plugin/k8s_external: add support for PTR requests (#5435)\n\t* plugin/k8s_external: resolve headless services (#5505)\n\t* plugin/kubernetes: make kubernetes client log in CoreDNS format (#5461)\n\t* plugin/ready: reset list of readiness plugins on startup (#5492)\n\t* plugin/rewrite: add PTR records to supported types (#5565)\n\t* plugin/rewrite: fix a crash in rewrite plugin when rule type is missing (#5459)\n\t* plugin/rewrite: fix out-of-index issue in rewrite plugin (#5462)\n\t* plugin/rewrite: support min and max TTL values (#5508)\n\t* plugin/trace : make zipkin HTTP reporter more configurable using Corefile (#5460)\n\t* plugin/trace: read trace context info from headers for DOH (#5439)\n\t* plugin/tsig: add new plugin TSIG for validating TSIG requests and signing responses (#4957)\n\t* core: update gopkg.in/yaml.v3 to fix CVE-2022-28948 \n\t* core: update golang.org/x/crypto to fix CVE-2022-27191 \n\t* plugin/acl: adding a check to parse out zone info \n\t* plugin/dnstap: support FQDN TCP endpoint \n\t* plugin/errors: add stacktrace option to log a stacktrace during panic recovery \n\t* plugin/template: return SERVFAIL for zone-match regex-no-match case \n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-2024-319",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_0319-1.json"
},
{
"category": "self",
"summary": "URL for openSUSE-SU-2024:0319-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2JLUFKCHWHJJ2MQ6XRREF7D4OOWB23V2/"
},
{
"category": "self",
"summary": "E-Mail link for openSUSE-SU-2024:0319-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2JLUFKCHWHJJ2MQ6XRREF7D4OOWB23V2/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-27191 page",
"url": "https://www.suse.com/security/cve/CVE-2022-27191/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-28948 page",
"url": "https://www.suse.com/security/cve/CVE-2022-28948/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-28452 page",
"url": "https://www.suse.com/security/cve/CVE-2023-28452/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-30464 page",
"url": "https://www.suse.com/security/cve/CVE-2023-30464/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-0874 page",
"url": "https://www.suse.com/security/cve/CVE-2024-0874/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-22189 page",
"url": "https://www.suse.com/security/cve/CVE-2024-22189/"
}
],
"title": "Security update for coredns",
"tracking": {
"current_release_date": "2024-09-27T14:01:32Z",
"generator": {
"date": "2024-09-27T14:01:32Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2024:0319-1",
"initial_release_date": "2024-09-27T14:01:32Z",
"revision_history": [
{
"date": "2024-09-27T14:01:32Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "coredns-1.11.3-bp156.4.3.1.aarch64",
"product": {
"name": "coredns-1.11.3-bp156.4.3.1.aarch64",
"product_id": "coredns-1.11.3-bp156.4.3.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "coredns-1.11.3-bp156.4.3.1.i586",
"product": {
"name": "coredns-1.11.3-bp156.4.3.1.i586",
"product_id": "coredns-1.11.3-bp156.4.3.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "coredns-extras-1.11.3-bp156.4.3.1.noarch",
"product": {
"name": "coredns-extras-1.11.3-bp156.4.3.1.noarch",
"product_id": "coredns-extras-1.11.3-bp156.4.3.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "coredns-1.11.3-bp156.4.3.1.x86_64",
"product": {
"name": "coredns-1.11.3-bp156.4.3.1.x86_64",
"product_id": "coredns-1.11.3-bp156.4.3.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Package Hub 15 SP6",
"product": {
"name": "SUSE Package Hub 15 SP6",
"product_id": "SUSE Package Hub 15 SP6"
}
},
{
"category": "product_name",
"name": "openSUSE Leap 15.6",
"product": {
"name": "openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.6"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "coredns-1.11.3-bp156.4.3.1.aarch64 as component of SUSE Package Hub 15 SP6",
"product_id": "SUSE Package Hub 15 SP6:coredns-1.11.3-bp156.4.3.1.aarch64"
},
"product_reference": "coredns-1.11.3-bp156.4.3.1.aarch64",
"relates_to_product_reference": "SUSE Package Hub 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "coredns-1.11.3-bp156.4.3.1.i586 as component of SUSE Package Hub 15 SP6",
"product_id": "SUSE Package Hub 15 SP6:coredns-1.11.3-bp156.4.3.1.i586"
},
"product_reference": "coredns-1.11.3-bp156.4.3.1.i586",
"relates_to_product_reference": "SUSE Package Hub 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "coredns-1.11.3-bp156.4.3.1.x86_64 as component of SUSE Package Hub 15 SP6",
"product_id": "SUSE Package Hub 15 SP6:coredns-1.11.3-bp156.4.3.1.x86_64"
},
"product_reference": "coredns-1.11.3-bp156.4.3.1.x86_64",
"relates_to_product_reference": "SUSE Package Hub 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "coredns-extras-1.11.3-bp156.4.3.1.noarch as component of SUSE Package Hub 15 SP6",
"product_id": "SUSE Package Hub 15 SP6:coredns-extras-1.11.3-bp156.4.3.1.noarch"
},
"product_reference": "coredns-extras-1.11.3-bp156.4.3.1.noarch",
"relates_to_product_reference": "SUSE Package Hub 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "coredns-1.11.3-bp156.4.3.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:coredns-1.11.3-bp156.4.3.1.aarch64"
},
"product_reference": "coredns-1.11.3-bp156.4.3.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "coredns-1.11.3-bp156.4.3.1.i586 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:coredns-1.11.3-bp156.4.3.1.i586"
},
"product_reference": "coredns-1.11.3-bp156.4.3.1.i586",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "coredns-1.11.3-bp156.4.3.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:coredns-1.11.3-bp156.4.3.1.x86_64"
},
"product_reference": "coredns-1.11.3-bp156.4.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "coredns-extras-1.11.3-bp156.4.3.1.noarch as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:coredns-extras-1.11.3-bp156.4.3.1.noarch"
},
"product_reference": "coredns-extras-1.11.3-bp156.4.3.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.6"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-27191",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-27191"
}
],
"notes": [
{
"category": "general",
"text": "The golang.org/x/crypto/ssh package before 0.0.0-20220314234659-1baeb1ce4c0b for Go allows an attacker to crash a server in certain circumstances involving AddHostKey.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP6:coredns-1.11.3-bp156.4.3.1.aarch64",
"SUSE Package Hub 15 SP6:coredns-1.11.3-bp156.4.3.1.i586",
"SUSE Package Hub 15 SP6:coredns-1.11.3-bp156.4.3.1.x86_64",
"SUSE Package Hub 15 SP6:coredns-extras-1.11.3-bp156.4.3.1.noarch",
"openSUSE Leap 15.6:coredns-1.11.3-bp156.4.3.1.aarch64",
"openSUSE Leap 15.6:coredns-1.11.3-bp156.4.3.1.i586",
"openSUSE Leap 15.6:coredns-1.11.3-bp156.4.3.1.x86_64",
"openSUSE Leap 15.6:coredns-extras-1.11.3-bp156.4.3.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-27191",
"url": "https://www.suse.com/security/cve/CVE-2022-27191"
},
{
"category": "external",
"summary": "SUSE Bug 1197284 for CVE-2022-27191",
"url": "https://bugzilla.suse.com/1197284"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP6:coredns-1.11.3-bp156.4.3.1.aarch64",
"SUSE Package Hub 15 SP6:coredns-1.11.3-bp156.4.3.1.i586",
"SUSE Package Hub 15 SP6:coredns-1.11.3-bp156.4.3.1.x86_64",
"SUSE Package Hub 15 SP6:coredns-extras-1.11.3-bp156.4.3.1.noarch",
"openSUSE Leap 15.6:coredns-1.11.3-bp156.4.3.1.aarch64",
"openSUSE Leap 15.6:coredns-1.11.3-bp156.4.3.1.i586",
"openSUSE Leap 15.6:coredns-1.11.3-bp156.4.3.1.x86_64",
"openSUSE Leap 15.6:coredns-extras-1.11.3-bp156.4.3.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP6:coredns-1.11.3-bp156.4.3.1.aarch64",
"SUSE Package Hub 15 SP6:coredns-1.11.3-bp156.4.3.1.i586",
"SUSE Package Hub 15 SP6:coredns-1.11.3-bp156.4.3.1.x86_64",
"SUSE Package Hub 15 SP6:coredns-extras-1.11.3-bp156.4.3.1.noarch",
"openSUSE Leap 15.6:coredns-1.11.3-bp156.4.3.1.aarch64",
"openSUSE Leap 15.6:coredns-1.11.3-bp156.4.3.1.i586",
"openSUSE Leap 15.6:coredns-1.11.3-bp156.4.3.1.x86_64",
"openSUSE Leap 15.6:coredns-extras-1.11.3-bp156.4.3.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-09-27T14:01:32Z",
"details": "important"
}
],
"title": "CVE-2022-27191"
},
{
"cve": "CVE-2022-28948",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-28948"
}
],
"notes": [
{
"category": "general",
"text": "An issue in the Unmarshal function in Go-Yaml v3 causes the program to crash when attempting to deserialize invalid input.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP6:coredns-1.11.3-bp156.4.3.1.aarch64",
"SUSE Package Hub 15 SP6:coredns-1.11.3-bp156.4.3.1.i586",
"SUSE Package Hub 15 SP6:coredns-1.11.3-bp156.4.3.1.x86_64",
"SUSE Package Hub 15 SP6:coredns-extras-1.11.3-bp156.4.3.1.noarch",
"openSUSE Leap 15.6:coredns-1.11.3-bp156.4.3.1.aarch64",
"openSUSE Leap 15.6:coredns-1.11.3-bp156.4.3.1.i586",
"openSUSE Leap 15.6:coredns-1.11.3-bp156.4.3.1.x86_64",
"openSUSE Leap 15.6:coredns-extras-1.11.3-bp156.4.3.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-28948",
"url": "https://www.suse.com/security/cve/CVE-2022-28948"
},
{
"category": "external",
"summary": "SUSE Bug 1199772 for CVE-2022-28948",
"url": "https://bugzilla.suse.com/1199772"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP6:coredns-1.11.3-bp156.4.3.1.aarch64",
"SUSE Package Hub 15 SP6:coredns-1.11.3-bp156.4.3.1.i586",
"SUSE Package Hub 15 SP6:coredns-1.11.3-bp156.4.3.1.x86_64",
"SUSE Package Hub 15 SP6:coredns-extras-1.11.3-bp156.4.3.1.noarch",
"openSUSE Leap 15.6:coredns-1.11.3-bp156.4.3.1.aarch64",
"openSUSE Leap 15.6:coredns-1.11.3-bp156.4.3.1.i586",
"openSUSE Leap 15.6:coredns-1.11.3-bp156.4.3.1.x86_64",
"openSUSE Leap 15.6:coredns-extras-1.11.3-bp156.4.3.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP6:coredns-1.11.3-bp156.4.3.1.aarch64",
"SUSE Package Hub 15 SP6:coredns-1.11.3-bp156.4.3.1.i586",
"SUSE Package Hub 15 SP6:coredns-1.11.3-bp156.4.3.1.x86_64",
"SUSE Package Hub 15 SP6:coredns-extras-1.11.3-bp156.4.3.1.noarch",
"openSUSE Leap 15.6:coredns-1.11.3-bp156.4.3.1.aarch64",
"openSUSE Leap 15.6:coredns-1.11.3-bp156.4.3.1.i586",
"openSUSE Leap 15.6:coredns-1.11.3-bp156.4.3.1.x86_64",
"openSUSE Leap 15.6:coredns-extras-1.11.3-bp156.4.3.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-09-27T14:01:32Z",
"details": "moderate"
}
],
"title": "CVE-2022-28948"
},
{
"cve": "CVE-2023-28452",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-28452"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in CoreDNS through 1.10.1. There is a vulnerability in DNS resolving software, which triggers a resolver to ignore valid responses, thus causing denial of service for normal resolution. In an exploit, the attacker could just forge a response targeting the source port of a vulnerable resolver without the need to guess the correct TXID.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP6:coredns-1.11.3-bp156.4.3.1.aarch64",
"SUSE Package Hub 15 SP6:coredns-1.11.3-bp156.4.3.1.i586",
"SUSE Package Hub 15 SP6:coredns-1.11.3-bp156.4.3.1.x86_64",
"SUSE Package Hub 15 SP6:coredns-extras-1.11.3-bp156.4.3.1.noarch",
"openSUSE Leap 15.6:coredns-1.11.3-bp156.4.3.1.aarch64",
"openSUSE Leap 15.6:coredns-1.11.3-bp156.4.3.1.i586",
"openSUSE Leap 15.6:coredns-1.11.3-bp156.4.3.1.x86_64",
"openSUSE Leap 15.6:coredns-extras-1.11.3-bp156.4.3.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-28452",
"url": "https://www.suse.com/security/cve/CVE-2023-28452"
},
{
"category": "external",
"summary": "SUSE Bug 1230760 for CVE-2023-28452",
"url": "https://bugzilla.suse.com/1230760"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP6:coredns-1.11.3-bp156.4.3.1.aarch64",
"SUSE Package Hub 15 SP6:coredns-1.11.3-bp156.4.3.1.i586",
"SUSE Package Hub 15 SP6:coredns-1.11.3-bp156.4.3.1.x86_64",
"SUSE Package Hub 15 SP6:coredns-extras-1.11.3-bp156.4.3.1.noarch",
"openSUSE Leap 15.6:coredns-1.11.3-bp156.4.3.1.aarch64",
"openSUSE Leap 15.6:coredns-1.11.3-bp156.4.3.1.i586",
"openSUSE Leap 15.6:coredns-1.11.3-bp156.4.3.1.x86_64",
"openSUSE Leap 15.6:coredns-extras-1.11.3-bp156.4.3.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP6:coredns-1.11.3-bp156.4.3.1.aarch64",
"SUSE Package Hub 15 SP6:coredns-1.11.3-bp156.4.3.1.i586",
"SUSE Package Hub 15 SP6:coredns-1.11.3-bp156.4.3.1.x86_64",
"SUSE Package Hub 15 SP6:coredns-extras-1.11.3-bp156.4.3.1.noarch",
"openSUSE Leap 15.6:coredns-1.11.3-bp156.4.3.1.aarch64",
"openSUSE Leap 15.6:coredns-1.11.3-bp156.4.3.1.i586",
"openSUSE Leap 15.6:coredns-1.11.3-bp156.4.3.1.x86_64",
"openSUSE Leap 15.6:coredns-extras-1.11.3-bp156.4.3.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-09-27T14:01:32Z",
"details": "important"
}
],
"title": "CVE-2023-28452"
},
{
"cve": "CVE-2023-30464",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-30464"
}
],
"notes": [
{
"category": "general",
"text": "CoreDNS through 1.10.1 enables attackers to achieve DNS cache poisoning and inject fake responses via a birthday attack.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP6:coredns-1.11.3-bp156.4.3.1.aarch64",
"SUSE Package Hub 15 SP6:coredns-1.11.3-bp156.4.3.1.i586",
"SUSE Package Hub 15 SP6:coredns-1.11.3-bp156.4.3.1.x86_64",
"SUSE Package Hub 15 SP6:coredns-extras-1.11.3-bp156.4.3.1.noarch",
"openSUSE Leap 15.6:coredns-1.11.3-bp156.4.3.1.aarch64",
"openSUSE Leap 15.6:coredns-1.11.3-bp156.4.3.1.i586",
"openSUSE Leap 15.6:coredns-1.11.3-bp156.4.3.1.x86_64",
"openSUSE Leap 15.6:coredns-extras-1.11.3-bp156.4.3.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-30464",
"url": "https://www.suse.com/security/cve/CVE-2023-30464"
},
{
"category": "external",
"summary": "SUSE Bug 1230757 for CVE-2023-30464",
"url": "https://bugzilla.suse.com/1230757"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP6:coredns-1.11.3-bp156.4.3.1.aarch64",
"SUSE Package Hub 15 SP6:coredns-1.11.3-bp156.4.3.1.i586",
"SUSE Package Hub 15 SP6:coredns-1.11.3-bp156.4.3.1.x86_64",
"SUSE Package Hub 15 SP6:coredns-extras-1.11.3-bp156.4.3.1.noarch",
"openSUSE Leap 15.6:coredns-1.11.3-bp156.4.3.1.aarch64",
"openSUSE Leap 15.6:coredns-1.11.3-bp156.4.3.1.i586",
"openSUSE Leap 15.6:coredns-1.11.3-bp156.4.3.1.x86_64",
"openSUSE Leap 15.6:coredns-extras-1.11.3-bp156.4.3.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-09-27T14:01:32Z",
"details": "important"
}
],
"title": "CVE-2023-30464"
},
{
"cve": "CVE-2024-0874",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-0874"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in coredns. This issue could lead to invalid cache entries returning due to incorrectly implemented caching.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP6:coredns-1.11.3-bp156.4.3.1.aarch64",
"SUSE Package Hub 15 SP6:coredns-1.11.3-bp156.4.3.1.i586",
"SUSE Package Hub 15 SP6:coredns-1.11.3-bp156.4.3.1.x86_64",
"SUSE Package Hub 15 SP6:coredns-extras-1.11.3-bp156.4.3.1.noarch",
"openSUSE Leap 15.6:coredns-1.11.3-bp156.4.3.1.aarch64",
"openSUSE Leap 15.6:coredns-1.11.3-bp156.4.3.1.i586",
"openSUSE Leap 15.6:coredns-1.11.3-bp156.4.3.1.x86_64",
"openSUSE Leap 15.6:coredns-extras-1.11.3-bp156.4.3.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-0874",
"url": "https://www.suse.com/security/cve/CVE-2024-0874"
},
{
"category": "external",
"summary": "SUSE Bug 1219167 for CVE-2024-0874",
"url": "https://bugzilla.suse.com/1219167"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP6:coredns-1.11.3-bp156.4.3.1.aarch64",
"SUSE Package Hub 15 SP6:coredns-1.11.3-bp156.4.3.1.i586",
"SUSE Package Hub 15 SP6:coredns-1.11.3-bp156.4.3.1.x86_64",
"SUSE Package Hub 15 SP6:coredns-extras-1.11.3-bp156.4.3.1.noarch",
"openSUSE Leap 15.6:coredns-1.11.3-bp156.4.3.1.aarch64",
"openSUSE Leap 15.6:coredns-1.11.3-bp156.4.3.1.i586",
"openSUSE Leap 15.6:coredns-1.11.3-bp156.4.3.1.x86_64",
"openSUSE Leap 15.6:coredns-extras-1.11.3-bp156.4.3.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-09-27T14:01:32Z",
"details": "moderate"
}
],
"title": "CVE-2024-0874"
},
{
"cve": "CVE-2024-22189",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-22189"
}
],
"notes": [
{
"category": "general",
"text": "quic-go is an implementation of the QUIC protocol in Go. Prior to version 0.42.0, an attacker can cause its peer to run out of memory sending a large number of `NEW_CONNECTION_ID` frames that retire old connection IDs. The receiver is supposed to respond to each retirement frame with a `RETIRE_CONNECTION_ID` frame. The attacker can prevent the receiver from sending out (the vast majority of) these `RETIRE_CONNECTION_ID` frames by collapsing the peers congestion window (by selectively acknowledging received packets) and by manipulating the peer\u0027s RTT estimate. Version 0.42.0 contains a patch for the issue. No known workarounds are available.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP6:coredns-1.11.3-bp156.4.3.1.aarch64",
"SUSE Package Hub 15 SP6:coredns-1.11.3-bp156.4.3.1.i586",
"SUSE Package Hub 15 SP6:coredns-1.11.3-bp156.4.3.1.x86_64",
"SUSE Package Hub 15 SP6:coredns-extras-1.11.3-bp156.4.3.1.noarch",
"openSUSE Leap 15.6:coredns-1.11.3-bp156.4.3.1.aarch64",
"openSUSE Leap 15.6:coredns-1.11.3-bp156.4.3.1.i586",
"openSUSE Leap 15.6:coredns-1.11.3-bp156.4.3.1.x86_64",
"openSUSE Leap 15.6:coredns-extras-1.11.3-bp156.4.3.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-22189",
"url": "https://www.suse.com/security/cve/CVE-2024-22189"
},
{
"category": "external",
"summary": "SUSE Bug 1222461 for CVE-2024-22189",
"url": "https://bugzilla.suse.com/1222461"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP6:coredns-1.11.3-bp156.4.3.1.aarch64",
"SUSE Package Hub 15 SP6:coredns-1.11.3-bp156.4.3.1.i586",
"SUSE Package Hub 15 SP6:coredns-1.11.3-bp156.4.3.1.x86_64",
"SUSE Package Hub 15 SP6:coredns-extras-1.11.3-bp156.4.3.1.noarch",
"openSUSE Leap 15.6:coredns-1.11.3-bp156.4.3.1.aarch64",
"openSUSE Leap 15.6:coredns-1.11.3-bp156.4.3.1.i586",
"openSUSE Leap 15.6:coredns-1.11.3-bp156.4.3.1.x86_64",
"openSUSE Leap 15.6:coredns-extras-1.11.3-bp156.4.3.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP6:coredns-1.11.3-bp156.4.3.1.aarch64",
"SUSE Package Hub 15 SP6:coredns-1.11.3-bp156.4.3.1.i586",
"SUSE Package Hub 15 SP6:coredns-1.11.3-bp156.4.3.1.x86_64",
"SUSE Package Hub 15 SP6:coredns-extras-1.11.3-bp156.4.3.1.noarch",
"openSUSE Leap 15.6:coredns-1.11.3-bp156.4.3.1.aarch64",
"openSUSE Leap 15.6:coredns-1.11.3-bp156.4.3.1.i586",
"openSUSE Leap 15.6:coredns-1.11.3-bp156.4.3.1.x86_64",
"openSUSE Leap 15.6:coredns-extras-1.11.3-bp156.4.3.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-09-27T14:01:32Z",
"details": "important"
}
],
"title": "CVE-2024-22189"
}
]
}
OPENSUSE-SU-2024:13845-1
Vulnerability from csaf_opensuse - Published: 2024-06-15 00:00 - Updated: 2024-06-15 00:00| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:kubo-0.27.0-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kubo-0.27.0-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kubo-0.27.0-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kubo-0.27.0-2.1.x86_64 | — |
Vendor Fix
|
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "kubo-0.27.0-2.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the kubo-0.27.0-2.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2024-13845",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_13845-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-22189 page",
"url": "https://www.suse.com/security/cve/CVE-2024-22189/"
}
],
"title": "kubo-0.27.0-2.1 on GA media",
"tracking": {
"current_release_date": "2024-06-15T00:00:00Z",
"generator": {
"date": "2024-06-15T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2024:13845-1",
"initial_release_date": "2024-06-15T00:00:00Z",
"revision_history": [
{
"date": "2024-06-15T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kubo-0.27.0-2.1.aarch64",
"product": {
"name": "kubo-0.27.0-2.1.aarch64",
"product_id": "kubo-0.27.0-2.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kubo-0.27.0-2.1.ppc64le",
"product": {
"name": "kubo-0.27.0-2.1.ppc64le",
"product_id": "kubo-0.27.0-2.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kubo-0.27.0-2.1.s390x",
"product": {
"name": "kubo-0.27.0-2.1.s390x",
"product_id": "kubo-0.27.0-2.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kubo-0.27.0-2.1.x86_64",
"product": {
"name": "kubo-0.27.0-2.1.x86_64",
"product_id": "kubo-0.27.0-2.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kubo-0.27.0-2.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kubo-0.27.0-2.1.aarch64"
},
"product_reference": "kubo-0.27.0-2.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubo-0.27.0-2.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kubo-0.27.0-2.1.ppc64le"
},
"product_reference": "kubo-0.27.0-2.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubo-0.27.0-2.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kubo-0.27.0-2.1.s390x"
},
"product_reference": "kubo-0.27.0-2.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubo-0.27.0-2.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kubo-0.27.0-2.1.x86_64"
},
"product_reference": "kubo-0.27.0-2.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-22189",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-22189"
}
],
"notes": [
{
"category": "general",
"text": "quic-go is an implementation of the QUIC protocol in Go. Prior to version 0.42.0, an attacker can cause its peer to run out of memory sending a large number of `NEW_CONNECTION_ID` frames that retire old connection IDs. The receiver is supposed to respond to each retirement frame with a `RETIRE_CONNECTION_ID` frame. The attacker can prevent the receiver from sending out (the vast majority of) these `RETIRE_CONNECTION_ID` frames by collapsing the peers congestion window (by selectively acknowledging received packets) and by manipulating the peer\u0027s RTT estimate. Version 0.42.0 contains a patch for the issue. No known workarounds are available.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kubo-0.27.0-2.1.aarch64",
"openSUSE Tumbleweed:kubo-0.27.0-2.1.ppc64le",
"openSUSE Tumbleweed:kubo-0.27.0-2.1.s390x",
"openSUSE Tumbleweed:kubo-0.27.0-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-22189",
"url": "https://www.suse.com/security/cve/CVE-2024-22189"
},
{
"category": "external",
"summary": "SUSE Bug 1222461 for CVE-2024-22189",
"url": "https://bugzilla.suse.com/1222461"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kubo-0.27.0-2.1.aarch64",
"openSUSE Tumbleweed:kubo-0.27.0-2.1.ppc64le",
"openSUSE Tumbleweed:kubo-0.27.0-2.1.s390x",
"openSUSE Tumbleweed:kubo-0.27.0-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kubo-0.27.0-2.1.aarch64",
"openSUSE Tumbleweed:kubo-0.27.0-2.1.ppc64le",
"openSUSE Tumbleweed:kubo-0.27.0-2.1.s390x",
"openSUSE Tumbleweed:kubo-0.27.0-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2024-22189"
}
]
}
OPENSUSE-SU-2024:13847-1
Vulnerability from csaf_opensuse - Published: 2024-06-15 00:00 - Updated: 2024-06-15 00:00| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:syncthing-1.27.6-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:syncthing-1.27.6-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:syncthing-1.27.6-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:syncthing-1.27.6-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:syncthing-relaysrv-1.27.6-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:syncthing-relaysrv-1.27.6-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:syncthing-relaysrv-1.27.6-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:syncthing-relaysrv-1.27.6-1.1.x86_64 | — |
Vendor Fix
|
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "syncthing-1.27.6-1.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the syncthing-1.27.6-1.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2024-13847",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_13847-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-22189 page",
"url": "https://www.suse.com/security/cve/CVE-2024-22189/"
}
],
"title": "syncthing-1.27.6-1.1 on GA media",
"tracking": {
"current_release_date": "2024-06-15T00:00:00Z",
"generator": {
"date": "2024-06-15T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2024:13847-1",
"initial_release_date": "2024-06-15T00:00:00Z",
"revision_history": [
{
"date": "2024-06-15T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "syncthing-1.27.6-1.1.aarch64",
"product": {
"name": "syncthing-1.27.6-1.1.aarch64",
"product_id": "syncthing-1.27.6-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "syncthing-relaysrv-1.27.6-1.1.aarch64",
"product": {
"name": "syncthing-relaysrv-1.27.6-1.1.aarch64",
"product_id": "syncthing-relaysrv-1.27.6-1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "syncthing-1.27.6-1.1.ppc64le",
"product": {
"name": "syncthing-1.27.6-1.1.ppc64le",
"product_id": "syncthing-1.27.6-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "syncthing-relaysrv-1.27.6-1.1.ppc64le",
"product": {
"name": "syncthing-relaysrv-1.27.6-1.1.ppc64le",
"product_id": "syncthing-relaysrv-1.27.6-1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "syncthing-1.27.6-1.1.s390x",
"product": {
"name": "syncthing-1.27.6-1.1.s390x",
"product_id": "syncthing-1.27.6-1.1.s390x"
}
},
{
"category": "product_version",
"name": "syncthing-relaysrv-1.27.6-1.1.s390x",
"product": {
"name": "syncthing-relaysrv-1.27.6-1.1.s390x",
"product_id": "syncthing-relaysrv-1.27.6-1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "syncthing-1.27.6-1.1.x86_64",
"product": {
"name": "syncthing-1.27.6-1.1.x86_64",
"product_id": "syncthing-1.27.6-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "syncthing-relaysrv-1.27.6-1.1.x86_64",
"product": {
"name": "syncthing-relaysrv-1.27.6-1.1.x86_64",
"product_id": "syncthing-relaysrv-1.27.6-1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "syncthing-1.27.6-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:syncthing-1.27.6-1.1.aarch64"
},
"product_reference": "syncthing-1.27.6-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "syncthing-1.27.6-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:syncthing-1.27.6-1.1.ppc64le"
},
"product_reference": "syncthing-1.27.6-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "syncthing-1.27.6-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:syncthing-1.27.6-1.1.s390x"
},
"product_reference": "syncthing-1.27.6-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "syncthing-1.27.6-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:syncthing-1.27.6-1.1.x86_64"
},
"product_reference": "syncthing-1.27.6-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "syncthing-relaysrv-1.27.6-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:syncthing-relaysrv-1.27.6-1.1.aarch64"
},
"product_reference": "syncthing-relaysrv-1.27.6-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "syncthing-relaysrv-1.27.6-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:syncthing-relaysrv-1.27.6-1.1.ppc64le"
},
"product_reference": "syncthing-relaysrv-1.27.6-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "syncthing-relaysrv-1.27.6-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:syncthing-relaysrv-1.27.6-1.1.s390x"
},
"product_reference": "syncthing-relaysrv-1.27.6-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "syncthing-relaysrv-1.27.6-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:syncthing-relaysrv-1.27.6-1.1.x86_64"
},
"product_reference": "syncthing-relaysrv-1.27.6-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-22189",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-22189"
}
],
"notes": [
{
"category": "general",
"text": "quic-go is an implementation of the QUIC protocol in Go. Prior to version 0.42.0, an attacker can cause its peer to run out of memory sending a large number of `NEW_CONNECTION_ID` frames that retire old connection IDs. The receiver is supposed to respond to each retirement frame with a `RETIRE_CONNECTION_ID` frame. The attacker can prevent the receiver from sending out (the vast majority of) these `RETIRE_CONNECTION_ID` frames by collapsing the peers congestion window (by selectively acknowledging received packets) and by manipulating the peer\u0027s RTT estimate. Version 0.42.0 contains a patch for the issue. No known workarounds are available.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:syncthing-1.27.6-1.1.aarch64",
"openSUSE Tumbleweed:syncthing-1.27.6-1.1.ppc64le",
"openSUSE Tumbleweed:syncthing-1.27.6-1.1.s390x",
"openSUSE Tumbleweed:syncthing-1.27.6-1.1.x86_64",
"openSUSE Tumbleweed:syncthing-relaysrv-1.27.6-1.1.aarch64",
"openSUSE Tumbleweed:syncthing-relaysrv-1.27.6-1.1.ppc64le",
"openSUSE Tumbleweed:syncthing-relaysrv-1.27.6-1.1.s390x",
"openSUSE Tumbleweed:syncthing-relaysrv-1.27.6-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-22189",
"url": "https://www.suse.com/security/cve/CVE-2024-22189"
},
{
"category": "external",
"summary": "SUSE Bug 1222461 for CVE-2024-22189",
"url": "https://bugzilla.suse.com/1222461"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:syncthing-1.27.6-1.1.aarch64",
"openSUSE Tumbleweed:syncthing-1.27.6-1.1.ppc64le",
"openSUSE Tumbleweed:syncthing-1.27.6-1.1.s390x",
"openSUSE Tumbleweed:syncthing-1.27.6-1.1.x86_64",
"openSUSE Tumbleweed:syncthing-relaysrv-1.27.6-1.1.aarch64",
"openSUSE Tumbleweed:syncthing-relaysrv-1.27.6-1.1.ppc64le",
"openSUSE Tumbleweed:syncthing-relaysrv-1.27.6-1.1.s390x",
"openSUSE Tumbleweed:syncthing-relaysrv-1.27.6-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:syncthing-1.27.6-1.1.aarch64",
"openSUSE Tumbleweed:syncthing-1.27.6-1.1.ppc64le",
"openSUSE Tumbleweed:syncthing-1.27.6-1.1.s390x",
"openSUSE Tumbleweed:syncthing-1.27.6-1.1.x86_64",
"openSUSE Tumbleweed:syncthing-relaysrv-1.27.6-1.1.aarch64",
"openSUSE Tumbleweed:syncthing-relaysrv-1.27.6-1.1.ppc64le",
"openSUSE Tumbleweed:syncthing-relaysrv-1.27.6-1.1.s390x",
"openSUSE Tumbleweed:syncthing-relaysrv-1.27.6-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2024-22189"
}
]
}
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.