Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2023-49295 (GCVE-0-2023-49295)
Vulnerability from cvelistv5
- CWE-400 - Uncontrolled Resource Consumption
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T21:53:45.389Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/quic-go/quic-go/security/advisories/GHSA-ppxx-5m9h-6vxf", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/quic-go/quic-go/security/advisories/GHSA-ppxx-5m9h-6vxf" }, { "name": "https://github.com/quic-go/quic-go/commit/17fc98c2d81dbe685c19702dc694a9d606ac56dc", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/quic-go/quic-go/commit/17fc98c2d81dbe685c19702dc694a9d606ac56dc" }, { "name": "https://github.com/quic-go/quic-go/commit/21609ddfeff93668c7625a85eb09f1541fdad965", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/quic-go/quic-go/commit/21609ddfeff93668c7625a85eb09f1541fdad965" }, { "name": "https://github.com/quic-go/quic-go/commit/3a9c18bcd27a01c551ac9bf8bd2b4bded77c189a", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/quic-go/quic-go/commit/3a9c18bcd27a01c551ac9bf8bd2b4bded77c189a" }, { "name": "https://github.com/quic-go/quic-go/commit/554d543b50b917369fb1394cc5396d928166cf49", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/quic-go/quic-go/commit/554d543b50b917369fb1394cc5396d928166cf49" }, { "name": "https://github.com/quic-go/quic-go/commit/6cc3d58935426191296171a6c0d1ee965e10534e", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/quic-go/quic-go/commit/6cc3d58935426191296171a6c0d1ee965e10534e" }, { "name": "https://github.com/quic-go/quic-go/commit/9aaefe19fc3dc8c8917cc87e6128bb56d9e9e6cc", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/quic-go/quic-go/commit/9aaefe19fc3dc8c8917cc87e6128bb56d9e9e6cc" }, { "name": "https://github.com/quic-go/quic-go/commit/a0ffa757499913f7be69aa78f573a6aee3430ae4", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/quic-go/quic-go/commit/a0ffa757499913f7be69aa78f573a6aee3430ae4" }, { "name": "https://github.com/quic-go/quic-go/commit/d7aa627ebde91cf799ada2a07443faa9b1e5abb8", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/quic-go/quic-go/commit/d7aa627ebde91cf799ada2a07443faa9b1e5abb8" }, { "tags": [ "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/G5RSHDTVMYAIGYVVFGKTMFHAZJMA3EVV/" }, { "tags": [ "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZE7IOKXX5AATU2WR3V76X5Y3A44QAATG/" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-49295", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-01-11T15:35:07.010763Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-06-17T20:59:15.978Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "quic-go", "vendor": "quic-go", "versions": [ { "status": "affected", "version": "= 0.40.0" }, { "status": "affected", "version": "\u003e= 0.39.0, \u003c 0.39.4" }, { "status": "affected", "version": "\u003e= 0.38.0, \u003c 0.38.2" }, { "status": "affected", "version": "\u003c 0.37.7" } ] } ], "descriptions": [ { "lang": "en", "value": "quic-go is an implementation of the QUIC protocol (RFC 9000, RFC 9001, RFC 9002) in Go. An attacker can cause its peer to run out of memory sending a large number of PATH_CHALLENGE frames. The receiver is supposed to respond to each PATH_CHALLENGE frame with a PATH_RESPONSE frame. The attacker can prevent the receiver from sending out (the vast majority of) these PATH_RESPONSE frames by collapsing the peers congestion window (by selectively acknowledging received packets) and by manipulating the peer\u0027s RTT estimate. This vulnerability has been patched in versions 0.37.7, 0.38.2 and 0.39.4." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-400", "description": "CWE-400: Uncontrolled Resource Consumption", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-02-21T02:06:00.030Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/quic-go/quic-go/security/advisories/GHSA-ppxx-5m9h-6vxf", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/quic-go/quic-go/security/advisories/GHSA-ppxx-5m9h-6vxf" }, { "name": "https://github.com/quic-go/quic-go/commit/17fc98c2d81dbe685c19702dc694a9d606ac56dc", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/quic-go/quic-go/commit/17fc98c2d81dbe685c19702dc694a9d606ac56dc" }, { "name": "https://github.com/quic-go/quic-go/commit/21609ddfeff93668c7625a85eb09f1541fdad965", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/quic-go/quic-go/commit/21609ddfeff93668c7625a85eb09f1541fdad965" }, { "name": "https://github.com/quic-go/quic-go/commit/3a9c18bcd27a01c551ac9bf8bd2b4bded77c189a", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/quic-go/quic-go/commit/3a9c18bcd27a01c551ac9bf8bd2b4bded77c189a" }, { "name": "https://github.com/quic-go/quic-go/commit/554d543b50b917369fb1394cc5396d928166cf49", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/quic-go/quic-go/commit/554d543b50b917369fb1394cc5396d928166cf49" }, { "name": "https://github.com/quic-go/quic-go/commit/6cc3d58935426191296171a6c0d1ee965e10534e", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/quic-go/quic-go/commit/6cc3d58935426191296171a6c0d1ee965e10534e" }, { "name": "https://github.com/quic-go/quic-go/commit/9aaefe19fc3dc8c8917cc87e6128bb56d9e9e6cc", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/quic-go/quic-go/commit/9aaefe19fc3dc8c8917cc87e6128bb56d9e9e6cc" }, { "name": "https://github.com/quic-go/quic-go/commit/a0ffa757499913f7be69aa78f573a6aee3430ae4", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/quic-go/quic-go/commit/a0ffa757499913f7be69aa78f573a6aee3430ae4" }, { "name": "https://github.com/quic-go/quic-go/commit/d7aa627ebde91cf799ada2a07443faa9b1e5abb8", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/quic-go/quic-go/commit/d7aa627ebde91cf799ada2a07443faa9b1e5abb8" }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/G5RSHDTVMYAIGYVVFGKTMFHAZJMA3EVV/" }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZE7IOKXX5AATU2WR3V76X5Y3A44QAATG/" } ], "source": { "advisory": "GHSA-ppxx-5m9h-6vxf", "discovery": "UNKNOWN" }, "title": "quic-go\u0027s path validation mechanism can cause denial of service" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-49295", "datePublished": "2024-01-10T21:40:58.881Z", "dateReserved": "2023-11-24T16:45:24.314Z", "dateUpdated": "2025-06-17T20:59:15.978Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2023-49295\",\"sourceIdentifier\":\"security-advisories@github.com\",\"published\":\"2024-01-10T22:15:50.610\",\"lastModified\":\"2024-11-21T08:33:12.607\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"quic-go is an implementation of the QUIC protocol (RFC 9000, RFC 9001, RFC 9002) in Go. An attacker can cause its peer to run out of memory sending a large number of PATH_CHALLENGE frames. The receiver is supposed to respond to each PATH_CHALLENGE frame with a PATH_RESPONSE frame. The attacker can prevent the receiver from sending out (the vast majority of) these PATH_RESPONSE frames by collapsing the peers congestion window (by selectively acknowledging received packets) and by manipulating the peer\u0027s RTT estimate. This vulnerability has been patched in versions 0.37.7, 0.38.2 and 0.39.4.\"},{\"lang\":\"es\",\"value\":\"quic-go es una implementaci\u00f3n del protocolo QUIC (RFC 9000, RFC 9001, RFC 9002) en Go. Un atacante puede hacer que su par se quede sin memoria enviando una gran cantidad de tramas PATH_CHALLENGE. Se supone que el receptor debe responder a cada trama PATH_CHALLENGE con una trama PATH_RESPONSE. El atacante puede evitar que el receptor env\u00ede (la gran mayor\u00eda de) estas tramas PATH_RESPONSE colapsando la ventana de congesti\u00f3n del par (al reconocer selectivamente los paquetes recibidos) y manipulando la estimaci\u00f3n de RTT del par. Esta vulnerabilidad ha sido parcheada en las versiones 0.37.7, 0.38.2 y 0.39.4.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H\",\"baseScore\":6.4,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.6,\"impactScore\":4.7},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":6.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.8,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-400\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:quic-go_project:quic-go:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"0.37.7\",\"matchCriteriaId\":\"F0754377-65C6-4A24-8041-85F73B5630C9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:quic-go_project:quic-go:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"0.38.0\",\"versionEndExcluding\":\"0.38.2\",\"matchCriteriaId\":\"A687FF1B-43B1-4A23-895E-F328C03FA36F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:quic-go_project:quic-go:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"0.39.0\",\"versionEndExcluding\":\"0.39.4\",\"matchCriteriaId\":\"BF599C83-08F6-49B5-965E-927A2004F578\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:quic-go_project:quic-go:0.40.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BFFA39B2-37BF-4F09-99CD-3665ABC16177\"}]}]}],\"references\":[{\"url\":\"https://github.com/quic-go/quic-go/commit/17fc98c2d81dbe685c19702dc694a9d606ac56dc\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Patch\"]},{\"url\":\"https://github.com/quic-go/quic-go/commit/21609ddfeff93668c7625a85eb09f1541fdad965\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Patch\"]},{\"url\":\"https://github.com/quic-go/quic-go/commit/3a9c18bcd27a01c551ac9bf8bd2b4bded77c189a\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Patch\"]},{\"url\":\"https://github.com/quic-go/quic-go/commit/554d543b50b917369fb1394cc5396d928166cf49\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Patch\"]},{\"url\":\"https://github.com/quic-go/quic-go/commit/6cc3d58935426191296171a6c0d1ee965e10534e\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Patch\"]},{\"url\":\"https://github.com/quic-go/quic-go/commit/9aaefe19fc3dc8c8917cc87e6128bb56d9e9e6cc\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Patch\"]},{\"url\":\"https://github.com/quic-go/quic-go/commit/a0ffa757499913f7be69aa78f573a6aee3430ae4\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Patch\"]},{\"url\":\"https://github.com/quic-go/quic-go/commit/d7aa627ebde91cf799ada2a07443faa9b1e5abb8\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Patch\"]},{\"url\":\"https://github.com/quic-go/quic-go/security/advisories/GHSA-ppxx-5m9h-6vxf\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/G5RSHDTVMYAIGYVVFGKTMFHAZJMA3EVV/\",\"source\":\"security-advisories@github.com\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZE7IOKXX5AATU2WR3V76X5Y3A44QAATG/\",\"source\":\"security-advisories@github.com\"},{\"url\":\"https://github.com/quic-go/quic-go/commit/17fc98c2d81dbe685c19702dc694a9d606ac56dc\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://github.com/quic-go/quic-go/commit/21609ddfeff93668c7625a85eb09f1541fdad965\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://github.com/quic-go/quic-go/commit/3a9c18bcd27a01c551ac9bf8bd2b4bded77c189a\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://github.com/quic-go/quic-go/commit/554d543b50b917369fb1394cc5396d928166cf49\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://github.com/quic-go/quic-go/commit/6cc3d58935426191296171a6c0d1ee965e10534e\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://github.com/quic-go/quic-go/commit/9aaefe19fc3dc8c8917cc87e6128bb56d9e9e6cc\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://github.com/quic-go/quic-go/commit/a0ffa757499913f7be69aa78f573a6aee3430ae4\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://github.com/quic-go/quic-go/commit/d7aa627ebde91cf799ada2a07443faa9b1e5abb8\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://github.com/quic-go/quic-go/security/advisories/GHSA-ppxx-5m9h-6vxf\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/G5RSHDTVMYAIGYVVFGKTMFHAZJMA3EVV/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZE7IOKXX5AATU2WR3V76X5Y3A44QAATG/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}", "vulnrichment": { "containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://github.com/quic-go/quic-go/security/advisories/GHSA-ppxx-5m9h-6vxf\", \"name\": \"https://github.com/quic-go/quic-go/security/advisories/GHSA-ppxx-5m9h-6vxf\", \"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"]}, {\"url\": \"https://github.com/quic-go/quic-go/commit/17fc98c2d81dbe685c19702dc694a9d606ac56dc\", \"name\": \"https://github.com/quic-go/quic-go/commit/17fc98c2d81dbe685c19702dc694a9d606ac56dc\", \"tags\": [\"x_refsource_MISC\", \"x_transferred\"]}, {\"url\": \"https://github.com/quic-go/quic-go/commit/21609ddfeff93668c7625a85eb09f1541fdad965\", \"name\": \"https://github.com/quic-go/quic-go/commit/21609ddfeff93668c7625a85eb09f1541fdad965\", \"tags\": [\"x_refsource_MISC\", \"x_transferred\"]}, {\"url\": \"https://github.com/quic-go/quic-go/commit/3a9c18bcd27a01c551ac9bf8bd2b4bded77c189a\", \"name\": \"https://github.com/quic-go/quic-go/commit/3a9c18bcd27a01c551ac9bf8bd2b4bded77c189a\", \"tags\": [\"x_refsource_MISC\", \"x_transferred\"]}, {\"url\": \"https://github.com/quic-go/quic-go/commit/554d543b50b917369fb1394cc5396d928166cf49\", \"name\": \"https://github.com/quic-go/quic-go/commit/554d543b50b917369fb1394cc5396d928166cf49\", \"tags\": [\"x_refsource_MISC\", \"x_transferred\"]}, {\"url\": \"https://github.com/quic-go/quic-go/commit/6cc3d58935426191296171a6c0d1ee965e10534e\", \"name\": \"https://github.com/quic-go/quic-go/commit/6cc3d58935426191296171a6c0d1ee965e10534e\", \"tags\": [\"x_refsource_MISC\", \"x_transferred\"]}, {\"url\": \"https://github.com/quic-go/quic-go/commit/9aaefe19fc3dc8c8917cc87e6128bb56d9e9e6cc\", \"name\": \"https://github.com/quic-go/quic-go/commit/9aaefe19fc3dc8c8917cc87e6128bb56d9e9e6cc\", \"tags\": [\"x_refsource_MISC\", \"x_transferred\"]}, {\"url\": \"https://github.com/quic-go/quic-go/commit/a0ffa757499913f7be69aa78f573a6aee3430ae4\", \"name\": \"https://github.com/quic-go/quic-go/commit/a0ffa757499913f7be69aa78f573a6aee3430ae4\", \"tags\": [\"x_refsource_MISC\", \"x_transferred\"]}, {\"url\": \"https://github.com/quic-go/quic-go/commit/d7aa627ebde91cf799ada2a07443faa9b1e5abb8\", \"name\": \"https://github.com/quic-go/quic-go/commit/d7aa627ebde91cf799ada2a07443faa9b1e5abb8\", \"tags\": [\"x_refsource_MISC\", \"x_transferred\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/G5RSHDTVMYAIGYVVFGKTMFHAZJMA3EVV/\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZE7IOKXX5AATU2WR3V76X5Y3A44QAATG/\", \"tags\": [\"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-02T21:53:45.389Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2023-49295\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-01-11T15:35:07.010763Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-06-17T20:50:31.921Z\"}}], \"cna\": {\"title\": \"quic-go\u0027s path validation mechanism can cause denial of service\", \"source\": {\"advisory\": \"GHSA-ppxx-5m9h-6vxf\", \"discovery\": \"UNKNOWN\"}, \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 6.4, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H\", \"integrityImpact\": \"LOW\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"HIGH\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"LOW\", \"confidentialityImpact\": \"LOW\"}}], \"affected\": [{\"vendor\": \"quic-go\", \"product\": \"quic-go\", \"versions\": [{\"status\": \"affected\", \"version\": \"= 0.40.0\"}, {\"status\": \"affected\", \"version\": \"\u003e= 0.39.0, \u003c 0.39.4\"}, {\"status\": \"affected\", \"version\": \"\u003e= 0.38.0, \u003c 0.38.2\"}, {\"status\": \"affected\", \"version\": \"\u003c 0.37.7\"}]}], \"references\": [{\"url\": \"https://github.com/quic-go/quic-go/security/advisories/GHSA-ppxx-5m9h-6vxf\", \"name\": \"https://github.com/quic-go/quic-go/security/advisories/GHSA-ppxx-5m9h-6vxf\", \"tags\": [\"x_refsource_CONFIRM\"]}, {\"url\": \"https://github.com/quic-go/quic-go/commit/17fc98c2d81dbe685c19702dc694a9d606ac56dc\", \"name\": \"https://github.com/quic-go/quic-go/commit/17fc98c2d81dbe685c19702dc694a9d606ac56dc\", \"tags\": [\"x_refsource_MISC\"]}, {\"url\": \"https://github.com/quic-go/quic-go/commit/21609ddfeff93668c7625a85eb09f1541fdad965\", \"name\": \"https://github.com/quic-go/quic-go/commit/21609ddfeff93668c7625a85eb09f1541fdad965\", \"tags\": [\"x_refsource_MISC\"]}, {\"url\": \"https://github.com/quic-go/quic-go/commit/3a9c18bcd27a01c551ac9bf8bd2b4bded77c189a\", \"name\": \"https://github.com/quic-go/quic-go/commit/3a9c18bcd27a01c551ac9bf8bd2b4bded77c189a\", \"tags\": [\"x_refsource_MISC\"]}, {\"url\": \"https://github.com/quic-go/quic-go/commit/554d543b50b917369fb1394cc5396d928166cf49\", \"name\": \"https://github.com/quic-go/quic-go/commit/554d543b50b917369fb1394cc5396d928166cf49\", \"tags\": [\"x_refsource_MISC\"]}, {\"url\": \"https://github.com/quic-go/quic-go/commit/6cc3d58935426191296171a6c0d1ee965e10534e\", \"name\": \"https://github.com/quic-go/quic-go/commit/6cc3d58935426191296171a6c0d1ee965e10534e\", \"tags\": [\"x_refsource_MISC\"]}, {\"url\": \"https://github.com/quic-go/quic-go/commit/9aaefe19fc3dc8c8917cc87e6128bb56d9e9e6cc\", \"name\": \"https://github.com/quic-go/quic-go/commit/9aaefe19fc3dc8c8917cc87e6128bb56d9e9e6cc\", \"tags\": [\"x_refsource_MISC\"]}, {\"url\": \"https://github.com/quic-go/quic-go/commit/a0ffa757499913f7be69aa78f573a6aee3430ae4\", \"name\": \"https://github.com/quic-go/quic-go/commit/a0ffa757499913f7be69aa78f573a6aee3430ae4\", \"tags\": [\"x_refsource_MISC\"]}, {\"url\": \"https://github.com/quic-go/quic-go/commit/d7aa627ebde91cf799ada2a07443faa9b1e5abb8\", \"name\": \"https://github.com/quic-go/quic-go/commit/d7aa627ebde91cf799ada2a07443faa9b1e5abb8\", \"tags\": [\"x_refsource_MISC\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/G5RSHDTVMYAIGYVVFGKTMFHAZJMA3EVV/\"}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZE7IOKXX5AATU2WR3V76X5Y3A44QAATG/\"}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"quic-go is an implementation of the QUIC protocol (RFC 9000, RFC 9001, RFC 9002) in Go. An attacker can cause its peer to run out of memory sending a large number of PATH_CHALLENGE frames. The receiver is supposed to respond to each PATH_CHALLENGE frame with a PATH_RESPONSE frame. The attacker can prevent the receiver from sending out (the vast majority of) these PATH_RESPONSE frames by collapsing the peers congestion window (by selectively acknowledging received packets) and by manipulating the peer\u0027s RTT estimate. This vulnerability has been patched in versions 0.37.7, 0.38.2 and 0.39.4.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-400\", \"description\": \"CWE-400: Uncontrolled Resource Consumption\"}]}], \"providerMetadata\": {\"orgId\": \"a0819718-46f1-4df5-94e2-005712e83aaa\", \"shortName\": \"GitHub_M\", \"dateUpdated\": \"2024-02-21T02:06:00.030Z\"}}}", "cveMetadata": "{\"cveId\": \"CVE-2023-49295\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-06-17T20:59:15.978Z\", \"dateReserved\": \"2023-11-24T16:45:24.314Z\", \"assignerOrgId\": \"a0819718-46f1-4df5-94e2-005712e83aaa\", \"datePublished\": \"2024-01-10T21:40:58.881Z\", \"assignerShortName\": \"GitHub_M\"}", "dataType": "CVE_RECORD", "dataVersion": "5.1" } } }
WID-SEC-W-2024-0407
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "mittel" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Red Hat Ansible Automation Platform ist eine End-to-End-Automatisierungsplattform f\u00fcr die Systemkonfiguration, die Softwarebereitstellung und die Orchestrierung erweiterter Workflows.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, authentisierter Angreifer kann eine Schwachstelle in Red Hat Ansible Automation Platform ausnutzen, um einen Denial of Service Angriff durchzuf\u00fchren.", "title": "Angriff" }, { "category": "general", "text": "- Linux", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2024-0407 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-0407.json" }, { "category": "self", "summary": "WID-SEC-2024-0407 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-0407" }, { "category": "external", "summary": "Red Hat Security Advisory vom 2024-02-18", "url": "https://access.redhat.com/errata/RHSA-2024:0855" }, { "category": "external", "summary": "Fedora Security Advisory FEDORA-2024-62FC2AA0AA vom 2024-03-23", "url": "https://bodhi.fedoraproject.org/updates/FEDORA-2024-62fc2aa0aa" }, { "category": "external", "summary": "Fedora Security Advisory FEDORA-2024-BD8FE42929 vom 2024-07-06", "url": "https://bodhi.fedoraproject.org/updates/FEDORA-2024-bd8fe42929" } ], "source_lang": "en-US", "title": "Red Hat Ansible Automation Platform: Schwachstelle erm\u00f6glicht Denial of Service", "tracking": { "current_release_date": "2024-07-07T22:00:00.000+00:00", "generator": { "date": "2024-08-15T18:05:21.292+00:00", "engine": { "name": "BSI-WID", "version": "1.3.5" } }, "id": "WID-SEC-W-2024-0407", "initial_release_date": "2024-02-18T23:00:00.000+00:00", "revision_history": [ { "date": "2024-02-18T23:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2024-03-24T23:00:00.000+00:00", "number": "2", "summary": "Neue Updates von Fedora aufgenommen" }, { "date": "2024-07-07T22:00:00.000+00:00", "number": "3", "summary": "Neue Updates von Fedora aufgenommen" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Fedora Linux", "product": { "name": "Fedora Linux", "product_id": "74185", "product_identification_helper": { "cpe": "cpe:/o:fedoraproject:fedora:-" } } } ], "category": "vendor", "name": "Fedora" }, { "branches": [ { "category": "product_name", "name": "Red Hat Ansible Automation Platform", "product": { "name": "Red Hat Ansible Automation Platform", "product_id": "T032874", "product_identification_helper": { "cpe": "cpe:/a:redhat:ansible_automation_platform:-" } } } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-49295", "notes": [ { "category": "description", "text": "Es besteht eine Schwachstelle in Red Hat Ansible Automation Platform. Dieser Fehler besteht im Quic-Go-Plugin der Rezeptorkomponente aufgrund eines Fehlers im Speichermanagement und erm\u00f6glicht den Server dazu zu bringen, eine unbegrenzte Warteschlange von PATH_RESPONSE-Frames anzusammeln. In Folge dessen wird der Speicher ersch\u00f6pft. Ein entfernter, authentifizierter Angreifer kann diese Schwachstelle ausnutzen, um einen Denial-of-Service-Zustand zu verursachen." } ], "product_status": { "known_affected": [ "T032874", "74185" ] }, "release_date": "2024-02-18T23:00:00.000+00:00", "title": "CVE-2023-49295" } ] }
wid-sec-w-2024-0407
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "mittel" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Red Hat Ansible Automation Platform ist eine End-to-End-Automatisierungsplattform f\u00fcr die Systemkonfiguration, die Softwarebereitstellung und die Orchestrierung erweiterter Workflows.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, authentisierter Angreifer kann eine Schwachstelle in Red Hat Ansible Automation Platform ausnutzen, um einen Denial of Service Angriff durchzuf\u00fchren.", "title": "Angriff" }, { "category": "general", "text": "- Linux", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2024-0407 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-0407.json" }, { "category": "self", "summary": "WID-SEC-2024-0407 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-0407" }, { "category": "external", "summary": "Red Hat Security Advisory vom 2024-02-18", "url": "https://access.redhat.com/errata/RHSA-2024:0855" }, { "category": "external", "summary": "Fedora Security Advisory FEDORA-2024-62FC2AA0AA vom 2024-03-23", "url": "https://bodhi.fedoraproject.org/updates/FEDORA-2024-62fc2aa0aa" }, { "category": "external", "summary": "Fedora Security Advisory FEDORA-2024-BD8FE42929 vom 2024-07-06", "url": "https://bodhi.fedoraproject.org/updates/FEDORA-2024-bd8fe42929" } ], "source_lang": "en-US", "title": "Red Hat Ansible Automation Platform: Schwachstelle erm\u00f6glicht Denial of Service", "tracking": { "current_release_date": "2024-07-07T22:00:00.000+00:00", "generator": { "date": "2024-08-15T18:05:21.292+00:00", "engine": { "name": "BSI-WID", "version": "1.3.5" } }, "id": "WID-SEC-W-2024-0407", "initial_release_date": "2024-02-18T23:00:00.000+00:00", "revision_history": [ { "date": "2024-02-18T23:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2024-03-24T23:00:00.000+00:00", "number": "2", "summary": "Neue Updates von Fedora aufgenommen" }, { "date": "2024-07-07T22:00:00.000+00:00", "number": "3", "summary": "Neue Updates von Fedora aufgenommen" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Fedora Linux", "product": { "name": "Fedora Linux", "product_id": "74185", "product_identification_helper": { "cpe": "cpe:/o:fedoraproject:fedora:-" } } } ], "category": "vendor", "name": "Fedora" }, { "branches": [ { "category": "product_name", "name": "Red Hat Ansible Automation Platform", "product": { "name": "Red Hat Ansible Automation Platform", "product_id": "T032874", "product_identification_helper": { "cpe": "cpe:/a:redhat:ansible_automation_platform:-" } } } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-49295", "notes": [ { "category": "description", "text": "Es besteht eine Schwachstelle in Red Hat Ansible Automation Platform. Dieser Fehler besteht im Quic-Go-Plugin der Rezeptorkomponente aufgrund eines Fehlers im Speichermanagement und erm\u00f6glicht den Server dazu zu bringen, eine unbegrenzte Warteschlange von PATH_RESPONSE-Frames anzusammeln. In Folge dessen wird der Speicher ersch\u00f6pft. Ein entfernter, authentifizierter Angreifer kann diese Schwachstelle ausnutzen, um einen Denial-of-Service-Zustand zu verursachen." } ], "product_status": { "known_affected": [ "T032874", "74185" ] }, "release_date": "2024-02-18T23:00:00.000+00:00", "title": "CVE-2023-49295" } ] }
gsd-2023-49295
Vulnerability from gsd
{ "GSD": { "alias": "CVE-2023-49295", "id": "GSD-2023-49295" }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2023-49295" ], "details": "quic-go is an implementation of the QUIC protocol (RFC 9000, RFC 9001, RFC 9002) in Go. An attacker can cause its peer to run out of memory sending a large number of PATH_CHALLENGE frames. The receiver is supposed to respond to each PATH_CHALLENGE frame with a PATH_RESPONSE frame. The attacker can prevent the receiver from sending out (the vast majority of) these PATH_RESPONSE frames by collapsing the peers congestion window (by selectively acknowledging received packets) and by manipulating the peer\u0027s RTT estimate. This vulnerability has been patched in versions 0.37.7, 0.38.2 and 0.39.4.", "id": "GSD-2023-49295", "modified": "2023-12-13T01:20:35.054107Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2023-49295", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "quic-go", "version": { "version_data": [ { "version_affected": "=", "version_value": "= 0.40.0" }, { "version_affected": "=", "version_value": "\u003e= 0.39.0, \u003c 0.39.4" }, { "version_affected": "=", "version_value": "\u003e= 0.38.0, \u003c 0.38.2" }, { "version_affected": "=", "version_value": "\u003c 0.37.7" } ] } } ] }, "vendor_name": "quic-go" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "quic-go is an implementation of the QUIC protocol (RFC 9000, RFC 9001, RFC 9002) in Go. An attacker can cause its peer to run out of memory sending a large number of PATH_CHALLENGE frames. The receiver is supposed to respond to each PATH_CHALLENGE frame with a PATH_RESPONSE frame. The attacker can prevent the receiver from sending out (the vast majority of) these PATH_RESPONSE frames by collapsing the peers congestion window (by selectively acknowledging received packets) and by manipulating the peer\u0027s RTT estimate. This vulnerability has been patched in versions 0.37.7, 0.38.2 and 0.39.4." } ] }, "impact": { "cvss": [ { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H", "version": "3.1" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "cweId": "CWE-400", "lang": "eng", "value": "CWE-400: Uncontrolled Resource Consumption" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/quic-go/quic-go/security/advisories/GHSA-ppxx-5m9h-6vxf", "refsource": "MISC", "url": "https://github.com/quic-go/quic-go/security/advisories/GHSA-ppxx-5m9h-6vxf" }, { "name": "https://github.com/quic-go/quic-go/commit/17fc98c2d81dbe685c19702dc694a9d606ac56dc", "refsource": "MISC", "url": "https://github.com/quic-go/quic-go/commit/17fc98c2d81dbe685c19702dc694a9d606ac56dc" }, { "name": "https://github.com/quic-go/quic-go/commit/21609ddfeff93668c7625a85eb09f1541fdad965", "refsource": "MISC", "url": "https://github.com/quic-go/quic-go/commit/21609ddfeff93668c7625a85eb09f1541fdad965" }, { "name": "https://github.com/quic-go/quic-go/commit/3a9c18bcd27a01c551ac9bf8bd2b4bded77c189a", "refsource": "MISC", "url": "https://github.com/quic-go/quic-go/commit/3a9c18bcd27a01c551ac9bf8bd2b4bded77c189a" }, { "name": "https://github.com/quic-go/quic-go/commit/554d543b50b917369fb1394cc5396d928166cf49", "refsource": "MISC", "url": "https://github.com/quic-go/quic-go/commit/554d543b50b917369fb1394cc5396d928166cf49" }, { "name": "https://github.com/quic-go/quic-go/commit/6cc3d58935426191296171a6c0d1ee965e10534e", "refsource": "MISC", "url": "https://github.com/quic-go/quic-go/commit/6cc3d58935426191296171a6c0d1ee965e10534e" }, { "name": "https://github.com/quic-go/quic-go/commit/9aaefe19fc3dc8c8917cc87e6128bb56d9e9e6cc", "refsource": "MISC", "url": "https://github.com/quic-go/quic-go/commit/9aaefe19fc3dc8c8917cc87e6128bb56d9e9e6cc" }, { "name": "https://github.com/quic-go/quic-go/commit/a0ffa757499913f7be69aa78f573a6aee3430ae4", "refsource": "MISC", "url": "https://github.com/quic-go/quic-go/commit/a0ffa757499913f7be69aa78f573a6aee3430ae4" }, { "name": "https://github.com/quic-go/quic-go/commit/d7aa627ebde91cf799ada2a07443faa9b1e5abb8", "refsource": "MISC", "url": "https://github.com/quic-go/quic-go/commit/d7aa627ebde91cf799ada2a07443faa9b1e5abb8" }, { "name": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/G5RSHDTVMYAIGYVVFGKTMFHAZJMA3EVV/", "refsource": "MISC", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/G5RSHDTVMYAIGYVVFGKTMFHAZJMA3EVV/" }, { "name": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZE7IOKXX5AATU2WR3V76X5Y3A44QAATG/", "refsource": "MISC", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZE7IOKXX5AATU2WR3V76X5Y3A44QAATG/" } ] }, "source": { "advisory": "GHSA-ppxx-5m9h-6vxf", "discovery": "UNKNOWN" } }, "nvd.nist.gov": { "cve": { "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:quic-go_project:quic-go:*:*:*:*:*:*:*:*", "matchCriteriaId": "F0754377-65C6-4A24-8041-85F73B5630C9", "versionEndExcluding": "0.37.7", "vulnerable": true }, { "criteria": "cpe:2.3:a:quic-go_project:quic-go:*:*:*:*:*:*:*:*", "matchCriteriaId": "A687FF1B-43B1-4A23-895E-F328C03FA36F", "versionEndExcluding": "0.38.2", "versionStartIncluding": "0.38.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:quic-go_project:quic-go:*:*:*:*:*:*:*:*", "matchCriteriaId": "BF599C83-08F6-49B5-965E-927A2004F578", "versionEndExcluding": "0.39.4", "versionStartIncluding": "0.39.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:quic-go_project:quic-go:0.40.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFA39B2-37BF-4F09-99CD-3665ABC16177", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "descriptions": [ { "lang": "en", "value": "quic-go is an implementation of the QUIC protocol (RFC 9000, RFC 9001, RFC 9002) in Go. An attacker can cause its peer to run out of memory sending a large number of PATH_CHALLENGE frames. The receiver is supposed to respond to each PATH_CHALLENGE frame with a PATH_RESPONSE frame. The attacker can prevent the receiver from sending out (the vast majority of) these PATH_RESPONSE frames by collapsing the peers congestion window (by selectively acknowledging received packets) and by manipulating the peer\u0027s RTT estimate. This vulnerability has been patched in versions 0.37.7, 0.38.2 and 0.39.4." }, { "lang": "es", "value": "quic-go es una implementaci\u00f3n del protocolo QUIC (RFC 9000, RFC 9001, RFC 9002) en Go. Un atacante puede hacer que su par se quede sin memoria enviando una gran cantidad de tramas PATH_CHALLENGE. Se supone que el receptor debe responder a cada trama PATH_CHALLENGE con una trama PATH_RESPONSE. El atacante puede evitar que el receptor env\u00ede (la gran mayor\u00eda de) estas tramas PATH_RESPONSE colapsando la ventana de congesti\u00f3n del par (al reconocer selectivamente los paquetes recibidos) y manipulando la estimaci\u00f3n de RTT del par. Esta vulnerabilidad ha sido parcheada en las versiones 0.37.7, 0.38.2 y 0.39.4." } ], "id": "CVE-2023-49295", "lastModified": "2024-02-21T03:15:08.410", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H", "version": "3.1" }, "exploitabilityScore": 1.6, "impactScore": 4.7, "source": "security-advisories@github.com", "type": "Secondary" } ] }, "published": "2024-01-10T22:15:50.610", "references": [ { "source": "security-advisories@github.com", "tags": [ "Patch" ], "url": "https://github.com/quic-go/quic-go/commit/17fc98c2d81dbe685c19702dc694a9d606ac56dc" }, { "source": "security-advisories@github.com", "tags": [ "Patch" ], "url": "https://github.com/quic-go/quic-go/commit/21609ddfeff93668c7625a85eb09f1541fdad965" }, { "source": "security-advisories@github.com", "tags": [ "Patch" ], "url": "https://github.com/quic-go/quic-go/commit/3a9c18bcd27a01c551ac9bf8bd2b4bded77c189a" }, { "source": "security-advisories@github.com", "tags": [ "Patch" ], "url": "https://github.com/quic-go/quic-go/commit/554d543b50b917369fb1394cc5396d928166cf49" }, { "source": "security-advisories@github.com", "tags": [ "Patch" ], "url": "https://github.com/quic-go/quic-go/commit/6cc3d58935426191296171a6c0d1ee965e10534e" }, { "source": "security-advisories@github.com", "tags": [ "Patch" ], "url": "https://github.com/quic-go/quic-go/commit/9aaefe19fc3dc8c8917cc87e6128bb56d9e9e6cc" }, { "source": "security-advisories@github.com", "tags": [ "Patch" ], "url": "https://github.com/quic-go/quic-go/commit/a0ffa757499913f7be69aa78f573a6aee3430ae4" }, { "source": "security-advisories@github.com", "tags": [ "Patch" ], "url": "https://github.com/quic-go/quic-go/commit/d7aa627ebde91cf799ada2a07443faa9b1e5abb8" }, { "source": "security-advisories@github.com", "tags": [ "Vendor Advisory" ], "url": "https://github.com/quic-go/quic-go/security/advisories/GHSA-ppxx-5m9h-6vxf" }, { "source": "security-advisories@github.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/G5RSHDTVMYAIGYVVFGKTMFHAZJMA3EVV/" }, { "source": "security-advisories@github.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZE7IOKXX5AATU2WR3V76X5Y3A44QAATG/" } ], "sourceIdentifier": "security-advisories@github.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-400" } ], "source": "security-advisories@github.com", "type": "Primary" } ] } } } }
rhsa-2024:0855
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update is now available for Red Hat Ansible Automation Platform 2.4\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat Ansible Automation Platform provides an enterprise framework for building, deploying and managing IT automation at scale. IT Managers can provide top-down guidelines on how automation is applied to individual teams, while automation developers retain the freedom to write tasks that leverage existing knowledge without the overhead. Ansible Automation Platform makes it possible for users across an organization to share, vet, and manage automation content by means of a simple, powerful, and agentless language.\n\nSecurity Fix(es):\n\n* receptor: quic-go: memory exhaustion attack against QUIC\u0027s path validation mechanism (CVE-2023-49295)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional changes:\n* receptor has been updated to 1.4.4", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2024:0855", "url": "https://access.redhat.com/errata/RHSA-2024:0855" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "2257815", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257815" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_0855.json" } ], "title": "Red Hat Security Advisory: Red Hat Ansible Automation Platform 2.4 Product Security and Bug Fix Update", "tracking": { "current_release_date": "2025-09-10T15:12:14+00:00", "generator": { "date": "2025-09-10T15:12:14+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.7" } }, "id": "RHSA-2024:0855", "initial_release_date": "2024-02-19T01:16:12+00:00", "revision_history": [ { "date": "2024-02-19T01:16:12+00:00", "number": "1", "summary": "Initial version" }, { "date": "2024-02-19T01:16:12+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-09-10T15:12:14+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Ansible Automation Platform 2.4 for RHEL 9", "product": { "name": "Red Hat Ansible Automation Platform 2.4 for RHEL 9", "product_id": "9Base-Ansible-Automation-Platform-2.4", "product_identification_helper": { "cpe": "cpe:/a:redhat:ansible_automation_platform:2.4::el9" } } }, { "category": "product_name", "name": "Red Hat Ansible Automation Platform 2.4 for RHEL 9", "product": { "name": "Red Hat Ansible Automation Platform 2.4 for RHEL 9", "product_id": "9Base-Ansible-Automation-Platform-2.4-Inside-1.2", "product_identification_helper": { "cpe": "cpe:/a:redhat:ansible_automation_platform_inside:2.4::el9" } } }, { "category": "product_name", "name": "Red Hat Ansible Automation Platform 2.4 for RHEL 9", "product": { "name": "Red Hat Ansible Automation Platform 2.4 for RHEL 9", "product_id": "9Base-Ansible-Automation-Platform-2.4-Developer-1.1", "product_identification_helper": { "cpe": "cpe:/a:redhat:ansible_automation_platform_developer:2.4::el9" } } }, { "category": "product_name", "name": "Red Hat Ansible Automation Platform 2.4 for RHEL 8", "product": { "name": "Red Hat Ansible Automation Platform 2.4 for RHEL 8", "product_id": "8Base-Ansible-Automation-Platform-2.4", "product_identification_helper": { "cpe": "cpe:/a:redhat:ansible_automation_platform:2.4::el8" } } }, { "category": "product_name", "name": "Red Hat Ansible Automation Platform 2.4 for RHEL 8", "product": { "name": "Red Hat Ansible Automation Platform 2.4 for RHEL 8", "product_id": "8Base-Ansible-Automation-Platform-2.4-Inside-1.2", "product_identification_helper": { "cpe": "cpe:/a:redhat:ansible_automation_platform_inside:2.4::el8" } } }, { "category": "product_name", "name": "Red Hat Ansible Automation Platform 2.4 for RHEL 8", "product": { "name": "Red Hat Ansible Automation Platform 2.4 for RHEL 8", "product_id": "8Base-Ansible-Automation-Platform-2.4-Developer-1.1", "product_identification_helper": { "cpe": "cpe:/a:redhat:ansible_automation_platform_developer:2.4::el8" } } } ], "category": "product_family", "name": "Red Hat Ansible Automation Platform" }, { "branches": [ { "category": "product_version", "name": "receptor-0:1.4.4-1.el9ap.src", "product": { "name": "receptor-0:1.4.4-1.el9ap.src", "product_id": "receptor-0:1.4.4-1.el9ap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/receptor@1.4.4-1.el9ap?arch=src" } } }, { "category": "product_version", "name": "receptor-0:1.4.4-1.el8ap.src", "product": { "name": "receptor-0:1.4.4-1.el8ap.src", "product_id": "receptor-0:1.4.4-1.el8ap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/receptor@1.4.4-1.el8ap?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "receptorctl-0:1.4.4-1.el9ap.noarch", "product": { "name": "receptorctl-0:1.4.4-1.el9ap.noarch", "product_id": "receptorctl-0:1.4.4-1.el9ap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/receptorctl@1.4.4-1.el9ap?arch=noarch" } } }, { "category": "product_version", "name": "receptorctl-0:1.4.4-1.el8ap.noarch", "product": { "name": "receptorctl-0:1.4.4-1.el8ap.noarch", "product_id": "receptorctl-0:1.4.4-1.el8ap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/receptorctl@1.4.4-1.el8ap?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "receptor-0:1.4.4-1.el9ap.x86_64", "product": { "name": "receptor-0:1.4.4-1.el9ap.x86_64", "product_id": "receptor-0:1.4.4-1.el9ap.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/receptor@1.4.4-1.el9ap?arch=x86_64" } } }, { "category": "product_version", "name": "receptor-0:1.4.4-1.el8ap.x86_64", "product": { "name": "receptor-0:1.4.4-1.el8ap.x86_64", "product_id": "receptor-0:1.4.4-1.el8ap.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/receptor@1.4.4-1.el8ap?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "receptor-0:1.4.4-1.el9ap.ppc64le", "product": { "name": "receptor-0:1.4.4-1.el9ap.ppc64le", "product_id": "receptor-0:1.4.4-1.el9ap.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/receptor@1.4.4-1.el9ap?arch=ppc64le" } } }, { "category": "product_version", "name": "receptor-0:1.4.4-1.el8ap.ppc64le", "product": { "name": "receptor-0:1.4.4-1.el8ap.ppc64le", "product_id": "receptor-0:1.4.4-1.el8ap.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/receptor@1.4.4-1.el8ap?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "receptor-0:1.4.4-1.el9ap.s390x", "product": { "name": "receptor-0:1.4.4-1.el9ap.s390x", "product_id": "receptor-0:1.4.4-1.el9ap.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/receptor@1.4.4-1.el9ap?arch=s390x" } } }, { "category": "product_version", "name": "receptor-0:1.4.4-1.el8ap.s390x", "product": { "name": "receptor-0:1.4.4-1.el8ap.s390x", "product_id": "receptor-0:1.4.4-1.el8ap.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/receptor@1.4.4-1.el8ap?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "receptor-0:1.4.4-1.el9ap.aarch64", "product": { "name": "receptor-0:1.4.4-1.el9ap.aarch64", "product_id": "receptor-0:1.4.4-1.el9ap.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/receptor@1.4.4-1.el9ap?arch=aarch64" } } }, { "category": "product_version", "name": "receptor-0:1.4.4-1.el8ap.aarch64", "product": { "name": "receptor-0:1.4.4-1.el8ap.aarch64", "product_id": "receptor-0:1.4.4-1.el8ap.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/receptor@1.4.4-1.el8ap?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "receptor-0:1.4.4-1.el8ap.aarch64 as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8", "product_id": "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.4-1.el8ap.aarch64" }, "product_reference": "receptor-0:1.4.4-1.el8ap.aarch64", "relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4-Developer-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "receptor-0:1.4.4-1.el8ap.ppc64le as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8", "product_id": "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.4-1.el8ap.ppc64le" }, "product_reference": "receptor-0:1.4.4-1.el8ap.ppc64le", "relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4-Developer-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "receptor-0:1.4.4-1.el8ap.s390x as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8", "product_id": "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.4-1.el8ap.s390x" }, "product_reference": "receptor-0:1.4.4-1.el8ap.s390x", "relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4-Developer-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "receptor-0:1.4.4-1.el8ap.src as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8", "product_id": "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.4-1.el8ap.src" }, "product_reference": "receptor-0:1.4.4-1.el8ap.src", "relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4-Developer-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "receptor-0:1.4.4-1.el8ap.x86_64 as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8", "product_id": "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.4-1.el8ap.x86_64" }, "product_reference": "receptor-0:1.4.4-1.el8ap.x86_64", "relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4-Developer-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "receptorctl-0:1.4.4-1.el8ap.noarch as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8", "product_id": "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptorctl-0:1.4.4-1.el8ap.noarch" }, "product_reference": "receptorctl-0:1.4.4-1.el8ap.noarch", "relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4-Developer-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "receptor-0:1.4.4-1.el8ap.aarch64 as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8", "product_id": "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.4-1.el8ap.aarch64" }, "product_reference": "receptor-0:1.4.4-1.el8ap.aarch64", "relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4-Inside-1.2" }, { "category": "default_component_of", "full_product_name": { "name": "receptor-0:1.4.4-1.el8ap.ppc64le as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8", "product_id": "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.4-1.el8ap.ppc64le" }, "product_reference": "receptor-0:1.4.4-1.el8ap.ppc64le", "relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4-Inside-1.2" }, { "category": "default_component_of", "full_product_name": { "name": "receptor-0:1.4.4-1.el8ap.s390x as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8", "product_id": "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.4-1.el8ap.s390x" }, "product_reference": "receptor-0:1.4.4-1.el8ap.s390x", "relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4-Inside-1.2" }, { "category": "default_component_of", "full_product_name": { "name": "receptor-0:1.4.4-1.el8ap.src as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8", "product_id": "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.4-1.el8ap.src" }, "product_reference": "receptor-0:1.4.4-1.el8ap.src", "relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4-Inside-1.2" }, { "category": "default_component_of", "full_product_name": { "name": "receptor-0:1.4.4-1.el8ap.x86_64 as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8", "product_id": "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.4-1.el8ap.x86_64" }, "product_reference": "receptor-0:1.4.4-1.el8ap.x86_64", "relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4-Inside-1.2" }, { "category": "default_component_of", "full_product_name": { "name": "receptorctl-0:1.4.4-1.el8ap.noarch as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8", "product_id": "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptorctl-0:1.4.4-1.el8ap.noarch" }, "product_reference": "receptorctl-0:1.4.4-1.el8ap.noarch", "relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4-Inside-1.2" }, { "category": "default_component_of", "full_product_name": { "name": "receptor-0:1.4.4-1.el8ap.aarch64 as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8", "product_id": "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.4-1.el8ap.aarch64" }, "product_reference": "receptor-0:1.4.4-1.el8ap.aarch64", "relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "receptor-0:1.4.4-1.el8ap.ppc64le as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8", "product_id": "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.4-1.el8ap.ppc64le" }, "product_reference": "receptor-0:1.4.4-1.el8ap.ppc64le", "relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "receptor-0:1.4.4-1.el8ap.s390x as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8", "product_id": "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.4-1.el8ap.s390x" }, "product_reference": "receptor-0:1.4.4-1.el8ap.s390x", "relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "receptor-0:1.4.4-1.el8ap.src as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8", "product_id": "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.4-1.el8ap.src" }, "product_reference": "receptor-0:1.4.4-1.el8ap.src", "relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "receptor-0:1.4.4-1.el8ap.x86_64 as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8", "product_id": "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.4-1.el8ap.x86_64" }, "product_reference": "receptor-0:1.4.4-1.el8ap.x86_64", "relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "receptorctl-0:1.4.4-1.el8ap.noarch as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8", "product_id": "8Base-Ansible-Automation-Platform-2.4:receptorctl-0:1.4.4-1.el8ap.noarch" }, "product_reference": "receptorctl-0:1.4.4-1.el8ap.noarch", "relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "receptor-0:1.4.4-1.el9ap.aarch64 as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9", "product_id": "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.4-1.el9ap.aarch64" }, "product_reference": "receptor-0:1.4.4-1.el9ap.aarch64", "relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4-Developer-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "receptor-0:1.4.4-1.el9ap.ppc64le as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9", "product_id": "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.4-1.el9ap.ppc64le" }, "product_reference": "receptor-0:1.4.4-1.el9ap.ppc64le", "relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4-Developer-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "receptor-0:1.4.4-1.el9ap.s390x as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9", "product_id": "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.4-1.el9ap.s390x" }, "product_reference": "receptor-0:1.4.4-1.el9ap.s390x", "relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4-Developer-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "receptor-0:1.4.4-1.el9ap.src as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9", "product_id": "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.4-1.el9ap.src" }, "product_reference": "receptor-0:1.4.4-1.el9ap.src", "relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4-Developer-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "receptor-0:1.4.4-1.el9ap.x86_64 as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9", "product_id": "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.4-1.el9ap.x86_64" }, "product_reference": "receptor-0:1.4.4-1.el9ap.x86_64", "relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4-Developer-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "receptorctl-0:1.4.4-1.el9ap.noarch as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9", "product_id": "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptorctl-0:1.4.4-1.el9ap.noarch" }, "product_reference": "receptorctl-0:1.4.4-1.el9ap.noarch", "relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4-Developer-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "receptor-0:1.4.4-1.el9ap.aarch64 as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9", "product_id": "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.4-1.el9ap.aarch64" }, "product_reference": "receptor-0:1.4.4-1.el9ap.aarch64", "relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4-Inside-1.2" }, { "category": "default_component_of", "full_product_name": { "name": "receptor-0:1.4.4-1.el9ap.ppc64le as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9", "product_id": "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.4-1.el9ap.ppc64le" }, "product_reference": "receptor-0:1.4.4-1.el9ap.ppc64le", "relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4-Inside-1.2" }, { "category": "default_component_of", "full_product_name": { "name": "receptor-0:1.4.4-1.el9ap.s390x as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9", "product_id": "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.4-1.el9ap.s390x" }, "product_reference": "receptor-0:1.4.4-1.el9ap.s390x", "relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4-Inside-1.2" }, { "category": "default_component_of", "full_product_name": { "name": "receptor-0:1.4.4-1.el9ap.src as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9", "product_id": "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.4-1.el9ap.src" }, "product_reference": "receptor-0:1.4.4-1.el9ap.src", "relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4-Inside-1.2" }, { "category": "default_component_of", "full_product_name": { "name": "receptor-0:1.4.4-1.el9ap.x86_64 as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9", "product_id": "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.4-1.el9ap.x86_64" }, "product_reference": "receptor-0:1.4.4-1.el9ap.x86_64", "relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4-Inside-1.2" }, { "category": "default_component_of", "full_product_name": { "name": "receptorctl-0:1.4.4-1.el9ap.noarch as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9", "product_id": "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptorctl-0:1.4.4-1.el9ap.noarch" }, "product_reference": "receptorctl-0:1.4.4-1.el9ap.noarch", "relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4-Inside-1.2" }, { "category": "default_component_of", "full_product_name": { "name": "receptor-0:1.4.4-1.el9ap.aarch64 as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9", "product_id": "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.4-1.el9ap.aarch64" }, "product_reference": "receptor-0:1.4.4-1.el9ap.aarch64", "relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "receptor-0:1.4.4-1.el9ap.ppc64le as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9", "product_id": "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.4-1.el9ap.ppc64le" }, "product_reference": "receptor-0:1.4.4-1.el9ap.ppc64le", "relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "receptor-0:1.4.4-1.el9ap.s390x as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9", "product_id": "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.4-1.el9ap.s390x" }, "product_reference": "receptor-0:1.4.4-1.el9ap.s390x", "relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "receptor-0:1.4.4-1.el9ap.src as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9", "product_id": "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.4-1.el9ap.src" }, "product_reference": "receptor-0:1.4.4-1.el9ap.src", "relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "receptor-0:1.4.4-1.el9ap.x86_64 as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9", "product_id": "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.4-1.el9ap.x86_64" }, "product_reference": "receptor-0:1.4.4-1.el9ap.x86_64", "relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "receptorctl-0:1.4.4-1.el9ap.noarch as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9", "product_id": "9Base-Ansible-Automation-Platform-2.4:receptorctl-0:1.4.4-1.el9ap.noarch" }, "product_reference": "receptorctl-0:1.4.4-1.el9ap.noarch", "relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-49295", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2024-01-11T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptorctl-0:1.4.4-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptorctl-0:1.4.4-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:receptorctl-0:1.4.4-1.el8ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptorctl-0:1.4.4-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptorctl-0:1.4.4-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:receptorctl-0:1.4.4-1.el9ap.noarch" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2257815" } ], "notes": [ { "category": "description", "text": "A memory exhaustion vulnerability was found in Quic-GO, where a malicious client exploits the path validation mechanism to induce the server into accumulating an unbounded queue of PATH_RESPONSE frames, depleting its memory. The attacker controls the victim\u0027s packet send rate by overwhelming the server with numerous packets containing PATH_CHALLENGE frames. Through selective acknowledgments of received packets and manipulation of peer\u0027s Round-Trip Time (RTT) estimates, the attacker induces congestion control mechanisms to reduce the server\u0027s send rate significantly. Consequently, the victim server is compelled to store an increasing number of queued PATH_RESPONSE frames, resulting in memory exhaustion.", "title": "Vulnerability description" }, { "category": "summary", "text": "quic-go: memory exhaustion attack against QUIC\u0027s path validation mechanism", "title": "Vulnerability summary" }, { "category": "other", "text": "Within regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-400: Uncontrolled Resource Consumption vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nRed Hat restricts access to all platform information by default, granting access only after successful hard token-based multi-factor authentication (MFA) and enforcing least privilege to ensure only authorized roles can execute or modify code. The environment employs malicious code protections, including IDS/IPS and antimalware tools to detect threats and monitor resource usage, helping prevent uncontrolled consumption that could lead to system failure. Additional safeguards, such as web application firewalls and load-balancing strategies, protect against resource exhaustion and performance degradation. Event logs are centrally collected, correlated, and analyzed to support monitoring, alerting, and retention, aiding in the detection of abnormal behavior and potential denial-of-service (DoS) conditions. Static code analysis and peer reviews enforce strong input validation and error handling, reducing the likelihood of input-based DoS attacks.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.4-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.4-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.4-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.4-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.4-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.4-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.4-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.4-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.4-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.4-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.4-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.4-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.4-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.4-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.4-1.el8ap.x86_64", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.4-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.4-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.4-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.4-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.4-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.4-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.4-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.4-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.4-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.4-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.4-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.4-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.4-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.4-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.4-1.el9ap.x86_64" ], "known_not_affected": [ "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptorctl-0:1.4.4-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptorctl-0:1.4.4-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:receptorctl-0:1.4.4-1.el8ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptorctl-0:1.4.4-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptorctl-0:1.4.4-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:receptorctl-0:1.4.4-1.el9ap.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-49295" }, { "category": "external", "summary": "RHBZ#2257815", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257815" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-49295", "url": "https://www.cve.org/CVERecord?id=CVE-2023-49295" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-49295", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-49295" }, { "category": "external", "summary": "https://github.com/quic-go/quic-go/security/advisories/GHSA-ppxx-5m9h-6vxf", "url": "https://github.com/quic-go/quic-go/security/advisories/GHSA-ppxx-5m9h-6vxf" }, { "category": "external", "summary": "https://seemann.io/posts/2023-12-18-exploiting-quics-path-validation/", "url": "https://seemann.io/posts/2023-12-18-exploiting-quics-path-validation/" } ], "release_date": "2024-01-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-02-19T01:16:12+00:00", "details": "Red Hat Ansible Automation Platform", "product_ids": [ "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.4-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.4-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.4-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.4-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.4-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.4-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.4-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.4-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.4-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.4-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.4-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.4-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.4-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.4-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.4-1.el8ap.x86_64", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.4-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.4-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.4-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.4-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.4-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.4-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.4-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.4-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.4-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.4-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.4-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.4-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.4-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.4-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.4-1.el9ap.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:0855" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.4-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.4-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.4-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.4-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.4-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptorctl-0:1.4.4-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.4-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.4-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.4-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.4-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.4-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptorctl-0:1.4.4-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.4-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.4-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.4-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.4-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.4-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:receptorctl-0:1.4.4-1.el8ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.4-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.4-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.4-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.4-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.4-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptorctl-0:1.4.4-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.4-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.4-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.4-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.4-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.4-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptorctl-0:1.4.4-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.4-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.4-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.4-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.4-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.4-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:receptorctl-0:1.4.4-1.el9ap.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "quic-go: memory exhaustion attack against QUIC\u0027s path validation mechanism" } ] }
RHSA-2024:0855
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update is now available for Red Hat Ansible Automation Platform 2.4\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat Ansible Automation Platform provides an enterprise framework for building, deploying and managing IT automation at scale. IT Managers can provide top-down guidelines on how automation is applied to individual teams, while automation developers retain the freedom to write tasks that leverage existing knowledge without the overhead. Ansible Automation Platform makes it possible for users across an organization to share, vet, and manage automation content by means of a simple, powerful, and agentless language.\n\nSecurity Fix(es):\n\n* receptor: quic-go: memory exhaustion attack against QUIC\u0027s path validation mechanism (CVE-2023-49295)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional changes:\n* receptor has been updated to 1.4.4", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2024:0855", "url": "https://access.redhat.com/errata/RHSA-2024:0855" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "2257815", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257815" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_0855.json" } ], "title": "Red Hat Security Advisory: Red Hat Ansible Automation Platform 2.4 Product Security and Bug Fix Update", "tracking": { "current_release_date": "2025-09-10T15:12:14+00:00", "generator": { "date": "2025-09-10T15:12:14+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.7" } }, "id": "RHSA-2024:0855", "initial_release_date": "2024-02-19T01:16:12+00:00", "revision_history": [ { "date": "2024-02-19T01:16:12+00:00", "number": "1", "summary": "Initial version" }, { "date": "2024-02-19T01:16:12+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-09-10T15:12:14+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Ansible Automation Platform 2.4 for RHEL 9", "product": { "name": "Red Hat Ansible Automation Platform 2.4 for RHEL 9", "product_id": "9Base-Ansible-Automation-Platform-2.4", "product_identification_helper": { "cpe": "cpe:/a:redhat:ansible_automation_platform:2.4::el9" } } }, { "category": "product_name", "name": "Red Hat Ansible Automation Platform 2.4 for RHEL 9", "product": { "name": "Red Hat Ansible Automation Platform 2.4 for RHEL 9", "product_id": "9Base-Ansible-Automation-Platform-2.4-Inside-1.2", "product_identification_helper": { "cpe": "cpe:/a:redhat:ansible_automation_platform_inside:2.4::el9" } } }, { "category": "product_name", "name": "Red Hat Ansible Automation Platform 2.4 for RHEL 9", "product": { "name": "Red Hat Ansible Automation Platform 2.4 for RHEL 9", "product_id": "9Base-Ansible-Automation-Platform-2.4-Developer-1.1", "product_identification_helper": { "cpe": "cpe:/a:redhat:ansible_automation_platform_developer:2.4::el9" } } }, { "category": "product_name", "name": "Red Hat Ansible Automation Platform 2.4 for RHEL 8", "product": { "name": "Red Hat Ansible Automation Platform 2.4 for RHEL 8", "product_id": "8Base-Ansible-Automation-Platform-2.4", "product_identification_helper": { "cpe": "cpe:/a:redhat:ansible_automation_platform:2.4::el8" } } }, { "category": "product_name", "name": "Red Hat Ansible Automation Platform 2.4 for RHEL 8", "product": { "name": "Red Hat Ansible Automation Platform 2.4 for RHEL 8", "product_id": "8Base-Ansible-Automation-Platform-2.4-Inside-1.2", "product_identification_helper": { "cpe": "cpe:/a:redhat:ansible_automation_platform_inside:2.4::el8" } } }, { "category": "product_name", "name": "Red Hat Ansible Automation Platform 2.4 for RHEL 8", "product": { "name": "Red Hat Ansible Automation Platform 2.4 for RHEL 8", "product_id": "8Base-Ansible-Automation-Platform-2.4-Developer-1.1", "product_identification_helper": { "cpe": "cpe:/a:redhat:ansible_automation_platform_developer:2.4::el8" } } } ], "category": "product_family", "name": "Red Hat Ansible Automation Platform" }, { "branches": [ { "category": "product_version", "name": "receptor-0:1.4.4-1.el9ap.src", "product": { "name": "receptor-0:1.4.4-1.el9ap.src", "product_id": "receptor-0:1.4.4-1.el9ap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/receptor@1.4.4-1.el9ap?arch=src" } } }, { "category": "product_version", "name": "receptor-0:1.4.4-1.el8ap.src", "product": { "name": "receptor-0:1.4.4-1.el8ap.src", "product_id": "receptor-0:1.4.4-1.el8ap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/receptor@1.4.4-1.el8ap?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "receptorctl-0:1.4.4-1.el9ap.noarch", "product": { "name": "receptorctl-0:1.4.4-1.el9ap.noarch", "product_id": "receptorctl-0:1.4.4-1.el9ap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/receptorctl@1.4.4-1.el9ap?arch=noarch" } } }, { "category": "product_version", "name": "receptorctl-0:1.4.4-1.el8ap.noarch", "product": { "name": "receptorctl-0:1.4.4-1.el8ap.noarch", "product_id": "receptorctl-0:1.4.4-1.el8ap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/receptorctl@1.4.4-1.el8ap?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "receptor-0:1.4.4-1.el9ap.x86_64", "product": { "name": "receptor-0:1.4.4-1.el9ap.x86_64", "product_id": "receptor-0:1.4.4-1.el9ap.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/receptor@1.4.4-1.el9ap?arch=x86_64" } } }, { "category": "product_version", "name": "receptor-0:1.4.4-1.el8ap.x86_64", "product": { "name": "receptor-0:1.4.4-1.el8ap.x86_64", "product_id": "receptor-0:1.4.4-1.el8ap.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/receptor@1.4.4-1.el8ap?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "receptor-0:1.4.4-1.el9ap.ppc64le", "product": { "name": "receptor-0:1.4.4-1.el9ap.ppc64le", "product_id": "receptor-0:1.4.4-1.el9ap.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/receptor@1.4.4-1.el9ap?arch=ppc64le" } } }, { "category": "product_version", "name": "receptor-0:1.4.4-1.el8ap.ppc64le", "product": { "name": "receptor-0:1.4.4-1.el8ap.ppc64le", "product_id": "receptor-0:1.4.4-1.el8ap.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/receptor@1.4.4-1.el8ap?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "receptor-0:1.4.4-1.el9ap.s390x", "product": { "name": "receptor-0:1.4.4-1.el9ap.s390x", "product_id": "receptor-0:1.4.4-1.el9ap.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/receptor@1.4.4-1.el9ap?arch=s390x" } } }, { "category": "product_version", "name": "receptor-0:1.4.4-1.el8ap.s390x", "product": { "name": "receptor-0:1.4.4-1.el8ap.s390x", "product_id": "receptor-0:1.4.4-1.el8ap.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/receptor@1.4.4-1.el8ap?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "receptor-0:1.4.4-1.el9ap.aarch64", "product": { "name": "receptor-0:1.4.4-1.el9ap.aarch64", "product_id": "receptor-0:1.4.4-1.el9ap.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/receptor@1.4.4-1.el9ap?arch=aarch64" } } }, { "category": "product_version", "name": "receptor-0:1.4.4-1.el8ap.aarch64", "product": { "name": "receptor-0:1.4.4-1.el8ap.aarch64", "product_id": "receptor-0:1.4.4-1.el8ap.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/receptor@1.4.4-1.el8ap?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "receptor-0:1.4.4-1.el8ap.aarch64 as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8", "product_id": "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.4-1.el8ap.aarch64" }, "product_reference": "receptor-0:1.4.4-1.el8ap.aarch64", "relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4-Developer-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "receptor-0:1.4.4-1.el8ap.ppc64le as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8", "product_id": "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.4-1.el8ap.ppc64le" }, "product_reference": "receptor-0:1.4.4-1.el8ap.ppc64le", "relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4-Developer-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "receptor-0:1.4.4-1.el8ap.s390x as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8", "product_id": "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.4-1.el8ap.s390x" }, "product_reference": "receptor-0:1.4.4-1.el8ap.s390x", "relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4-Developer-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "receptor-0:1.4.4-1.el8ap.src as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8", "product_id": "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.4-1.el8ap.src" }, "product_reference": "receptor-0:1.4.4-1.el8ap.src", "relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4-Developer-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "receptor-0:1.4.4-1.el8ap.x86_64 as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8", "product_id": "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.4-1.el8ap.x86_64" }, "product_reference": "receptor-0:1.4.4-1.el8ap.x86_64", "relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4-Developer-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "receptorctl-0:1.4.4-1.el8ap.noarch as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8", "product_id": "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptorctl-0:1.4.4-1.el8ap.noarch" }, "product_reference": "receptorctl-0:1.4.4-1.el8ap.noarch", "relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4-Developer-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "receptor-0:1.4.4-1.el8ap.aarch64 as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8", "product_id": "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.4-1.el8ap.aarch64" }, "product_reference": "receptor-0:1.4.4-1.el8ap.aarch64", "relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4-Inside-1.2" }, { "category": "default_component_of", "full_product_name": { "name": "receptor-0:1.4.4-1.el8ap.ppc64le as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8", "product_id": "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.4-1.el8ap.ppc64le" }, "product_reference": "receptor-0:1.4.4-1.el8ap.ppc64le", "relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4-Inside-1.2" }, { "category": "default_component_of", "full_product_name": { "name": "receptor-0:1.4.4-1.el8ap.s390x as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8", "product_id": "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.4-1.el8ap.s390x" }, "product_reference": "receptor-0:1.4.4-1.el8ap.s390x", "relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4-Inside-1.2" }, { "category": "default_component_of", "full_product_name": { "name": "receptor-0:1.4.4-1.el8ap.src as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8", "product_id": "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.4-1.el8ap.src" }, "product_reference": "receptor-0:1.4.4-1.el8ap.src", "relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4-Inside-1.2" }, { "category": "default_component_of", "full_product_name": { "name": "receptor-0:1.4.4-1.el8ap.x86_64 as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8", "product_id": "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.4-1.el8ap.x86_64" }, "product_reference": "receptor-0:1.4.4-1.el8ap.x86_64", "relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4-Inside-1.2" }, { "category": "default_component_of", "full_product_name": { "name": "receptorctl-0:1.4.4-1.el8ap.noarch as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8", "product_id": "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptorctl-0:1.4.4-1.el8ap.noarch" }, "product_reference": "receptorctl-0:1.4.4-1.el8ap.noarch", "relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4-Inside-1.2" }, { "category": "default_component_of", "full_product_name": { "name": "receptor-0:1.4.4-1.el8ap.aarch64 as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8", "product_id": "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.4-1.el8ap.aarch64" }, "product_reference": "receptor-0:1.4.4-1.el8ap.aarch64", "relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "receptor-0:1.4.4-1.el8ap.ppc64le as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8", "product_id": "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.4-1.el8ap.ppc64le" }, "product_reference": "receptor-0:1.4.4-1.el8ap.ppc64le", "relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "receptor-0:1.4.4-1.el8ap.s390x as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8", "product_id": "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.4-1.el8ap.s390x" }, "product_reference": "receptor-0:1.4.4-1.el8ap.s390x", "relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "receptor-0:1.4.4-1.el8ap.src as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8", "product_id": "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.4-1.el8ap.src" }, "product_reference": "receptor-0:1.4.4-1.el8ap.src", "relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "receptor-0:1.4.4-1.el8ap.x86_64 as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8", "product_id": "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.4-1.el8ap.x86_64" }, "product_reference": "receptor-0:1.4.4-1.el8ap.x86_64", "relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "receptorctl-0:1.4.4-1.el8ap.noarch as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8", "product_id": "8Base-Ansible-Automation-Platform-2.4:receptorctl-0:1.4.4-1.el8ap.noarch" }, "product_reference": "receptorctl-0:1.4.4-1.el8ap.noarch", "relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "receptor-0:1.4.4-1.el9ap.aarch64 as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9", "product_id": "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.4-1.el9ap.aarch64" }, "product_reference": "receptor-0:1.4.4-1.el9ap.aarch64", "relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4-Developer-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "receptor-0:1.4.4-1.el9ap.ppc64le as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9", "product_id": "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.4-1.el9ap.ppc64le" }, "product_reference": "receptor-0:1.4.4-1.el9ap.ppc64le", "relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4-Developer-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "receptor-0:1.4.4-1.el9ap.s390x as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9", "product_id": "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.4-1.el9ap.s390x" }, "product_reference": "receptor-0:1.4.4-1.el9ap.s390x", "relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4-Developer-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "receptor-0:1.4.4-1.el9ap.src as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9", "product_id": "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.4-1.el9ap.src" }, "product_reference": "receptor-0:1.4.4-1.el9ap.src", "relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4-Developer-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "receptor-0:1.4.4-1.el9ap.x86_64 as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9", "product_id": "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.4-1.el9ap.x86_64" }, "product_reference": "receptor-0:1.4.4-1.el9ap.x86_64", "relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4-Developer-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "receptorctl-0:1.4.4-1.el9ap.noarch as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9", "product_id": "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptorctl-0:1.4.4-1.el9ap.noarch" }, "product_reference": "receptorctl-0:1.4.4-1.el9ap.noarch", "relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4-Developer-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "receptor-0:1.4.4-1.el9ap.aarch64 as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9", "product_id": "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.4-1.el9ap.aarch64" }, "product_reference": "receptor-0:1.4.4-1.el9ap.aarch64", "relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4-Inside-1.2" }, { "category": "default_component_of", "full_product_name": { "name": "receptor-0:1.4.4-1.el9ap.ppc64le as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9", "product_id": "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.4-1.el9ap.ppc64le" }, "product_reference": "receptor-0:1.4.4-1.el9ap.ppc64le", "relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4-Inside-1.2" }, { "category": "default_component_of", "full_product_name": { "name": "receptor-0:1.4.4-1.el9ap.s390x as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9", "product_id": "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.4-1.el9ap.s390x" }, "product_reference": "receptor-0:1.4.4-1.el9ap.s390x", "relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4-Inside-1.2" }, { "category": "default_component_of", "full_product_name": { "name": "receptor-0:1.4.4-1.el9ap.src as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9", "product_id": "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.4-1.el9ap.src" }, "product_reference": "receptor-0:1.4.4-1.el9ap.src", "relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4-Inside-1.2" }, { "category": "default_component_of", "full_product_name": { "name": "receptor-0:1.4.4-1.el9ap.x86_64 as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9", "product_id": "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.4-1.el9ap.x86_64" }, "product_reference": "receptor-0:1.4.4-1.el9ap.x86_64", "relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4-Inside-1.2" }, { "category": "default_component_of", "full_product_name": { "name": "receptorctl-0:1.4.4-1.el9ap.noarch as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9", "product_id": "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptorctl-0:1.4.4-1.el9ap.noarch" }, "product_reference": "receptorctl-0:1.4.4-1.el9ap.noarch", "relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4-Inside-1.2" }, { "category": "default_component_of", "full_product_name": { "name": "receptor-0:1.4.4-1.el9ap.aarch64 as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9", "product_id": "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.4-1.el9ap.aarch64" }, "product_reference": "receptor-0:1.4.4-1.el9ap.aarch64", "relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "receptor-0:1.4.4-1.el9ap.ppc64le as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9", "product_id": "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.4-1.el9ap.ppc64le" }, "product_reference": "receptor-0:1.4.4-1.el9ap.ppc64le", "relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "receptor-0:1.4.4-1.el9ap.s390x as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9", "product_id": "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.4-1.el9ap.s390x" }, "product_reference": "receptor-0:1.4.4-1.el9ap.s390x", "relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "receptor-0:1.4.4-1.el9ap.src as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9", "product_id": "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.4-1.el9ap.src" }, "product_reference": "receptor-0:1.4.4-1.el9ap.src", "relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "receptor-0:1.4.4-1.el9ap.x86_64 as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9", "product_id": "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.4-1.el9ap.x86_64" }, "product_reference": "receptor-0:1.4.4-1.el9ap.x86_64", "relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "receptorctl-0:1.4.4-1.el9ap.noarch as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9", "product_id": "9Base-Ansible-Automation-Platform-2.4:receptorctl-0:1.4.4-1.el9ap.noarch" }, "product_reference": "receptorctl-0:1.4.4-1.el9ap.noarch", "relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-49295", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2024-01-11T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptorctl-0:1.4.4-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptorctl-0:1.4.4-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:receptorctl-0:1.4.4-1.el8ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptorctl-0:1.4.4-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptorctl-0:1.4.4-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:receptorctl-0:1.4.4-1.el9ap.noarch" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2257815" } ], "notes": [ { "category": "description", "text": "A memory exhaustion vulnerability was found in Quic-GO, where a malicious client exploits the path validation mechanism to induce the server into accumulating an unbounded queue of PATH_RESPONSE frames, depleting its memory. The attacker controls the victim\u0027s packet send rate by overwhelming the server with numerous packets containing PATH_CHALLENGE frames. Through selective acknowledgments of received packets and manipulation of peer\u0027s Round-Trip Time (RTT) estimates, the attacker induces congestion control mechanisms to reduce the server\u0027s send rate significantly. Consequently, the victim server is compelled to store an increasing number of queued PATH_RESPONSE frames, resulting in memory exhaustion.", "title": "Vulnerability description" }, { "category": "summary", "text": "quic-go: memory exhaustion attack against QUIC\u0027s path validation mechanism", "title": "Vulnerability summary" }, { "category": "other", "text": "Within regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-400: Uncontrolled Resource Consumption vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nRed Hat restricts access to all platform information by default, granting access only after successful hard token-based multi-factor authentication (MFA) and enforcing least privilege to ensure only authorized roles can execute or modify code. The environment employs malicious code protections, including IDS/IPS and antimalware tools to detect threats and monitor resource usage, helping prevent uncontrolled consumption that could lead to system failure. Additional safeguards, such as web application firewalls and load-balancing strategies, protect against resource exhaustion and performance degradation. Event logs are centrally collected, correlated, and analyzed to support monitoring, alerting, and retention, aiding in the detection of abnormal behavior and potential denial-of-service (DoS) conditions. Static code analysis and peer reviews enforce strong input validation and error handling, reducing the likelihood of input-based DoS attacks.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.4-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.4-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.4-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.4-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.4-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.4-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.4-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.4-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.4-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.4-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.4-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.4-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.4-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.4-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.4-1.el8ap.x86_64", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.4-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.4-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.4-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.4-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.4-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.4-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.4-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.4-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.4-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.4-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.4-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.4-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.4-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.4-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.4-1.el9ap.x86_64" ], "known_not_affected": [ "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptorctl-0:1.4.4-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptorctl-0:1.4.4-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:receptorctl-0:1.4.4-1.el8ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptorctl-0:1.4.4-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptorctl-0:1.4.4-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:receptorctl-0:1.4.4-1.el9ap.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-49295" }, { "category": "external", "summary": "RHBZ#2257815", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257815" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-49295", "url": "https://www.cve.org/CVERecord?id=CVE-2023-49295" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-49295", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-49295" }, { "category": "external", "summary": "https://github.com/quic-go/quic-go/security/advisories/GHSA-ppxx-5m9h-6vxf", "url": "https://github.com/quic-go/quic-go/security/advisories/GHSA-ppxx-5m9h-6vxf" }, { "category": "external", "summary": "https://seemann.io/posts/2023-12-18-exploiting-quics-path-validation/", "url": "https://seemann.io/posts/2023-12-18-exploiting-quics-path-validation/" } ], "release_date": "2024-01-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-02-19T01:16:12+00:00", "details": "Red Hat Ansible Automation Platform", "product_ids": [ "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.4-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.4-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.4-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.4-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.4-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.4-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.4-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.4-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.4-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.4-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.4-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.4-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.4-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.4-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.4-1.el8ap.x86_64", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.4-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.4-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.4-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.4-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.4-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.4-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.4-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.4-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.4-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.4-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.4-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.4-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.4-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.4-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.4-1.el9ap.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:0855" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.4-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.4-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.4-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.4-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.4-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptorctl-0:1.4.4-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.4-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.4-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.4-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.4-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.4-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptorctl-0:1.4.4-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.4-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.4-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.4-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.4-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.4-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:receptorctl-0:1.4.4-1.el8ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.4-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.4-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.4-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.4-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.4-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptorctl-0:1.4.4-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.4-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.4-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.4-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.4-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.4-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptorctl-0:1.4.4-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.4-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.4-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.4-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.4-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.4-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:receptorctl-0:1.4.4-1.el9ap.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "quic-go: memory exhaustion attack against QUIC\u0027s path validation mechanism" } ] }
rhsa-2024_0855
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update is now available for Red Hat Ansible Automation Platform 2.4\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat Ansible Automation Platform provides an enterprise framework for building, deploying and managing IT automation at scale. IT Managers can provide top-down guidelines on how automation is applied to individual teams, while automation developers retain the freedom to write tasks that leverage existing knowledge without the overhead. Ansible Automation Platform makes it possible for users across an organization to share, vet, and manage automation content by means of a simple, powerful, and agentless language.\n\nSecurity Fix(es):\n\n* receptor: quic-go: memory exhaustion attack against QUIC\u0027s path validation mechanism (CVE-2023-49295)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional changes:\n* receptor has been updated to 1.4.4", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2024:0855", "url": "https://access.redhat.com/errata/RHSA-2024:0855" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "2257815", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257815" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_0855.json" } ], "title": "Red Hat Security Advisory: Red Hat Ansible Automation Platform 2.4 Product Security and Bug Fix Update", "tracking": { "current_release_date": "2024-12-16T22:09:56+00:00", "generator": { "date": "2024-12-16T22:09:56+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.3" } }, "id": "RHSA-2024:0855", "initial_release_date": "2024-02-19T01:16:12+00:00", "revision_history": [ { "date": "2024-02-19T01:16:12+00:00", "number": "1", "summary": "Initial version" }, { "date": "2024-02-19T01:16:12+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-12-16T22:09:56+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Ansible Automation Platform 2.4 for RHEL 9", "product": { "name": "Red Hat Ansible Automation Platform 2.4 for RHEL 9", "product_id": "9Base-Ansible-Automation-Platform-2.4", "product_identification_helper": { "cpe": "cpe:/a:redhat:ansible_automation_platform:2.4::el9" } } }, { "category": "product_name", "name": "Red Hat Ansible Automation Platform 2.4 for RHEL 9", "product": { "name": "Red Hat Ansible Automation Platform 2.4 for RHEL 9", "product_id": "9Base-Ansible-Automation-Platform-2.4-Inside-1.2", "product_identification_helper": { "cpe": "cpe:/a:redhat:ansible_automation_platform_inside:2.4::el9" } } }, { "category": "product_name", "name": "Red Hat Ansible Automation Platform 2.4 for RHEL 9", "product": { "name": "Red Hat Ansible Automation Platform 2.4 for RHEL 9", "product_id": "9Base-Ansible-Automation-Platform-2.4-Developer-1.1", "product_identification_helper": { "cpe": "cpe:/a:redhat:ansible_automation_platform_developer:2.4::el9" } } }, { "category": "product_name", "name": "Red Hat Ansible Automation Platform 2.4 for RHEL 8", "product": { "name": "Red Hat Ansible Automation Platform 2.4 for RHEL 8", "product_id": "8Base-Ansible-Automation-Platform-2.4", "product_identification_helper": { "cpe": "cpe:/a:redhat:ansible_automation_platform:2.4::el8" } } }, { "category": "product_name", "name": "Red Hat Ansible Automation Platform 2.4 for RHEL 8", "product": { "name": "Red Hat Ansible Automation Platform 2.4 for RHEL 8", "product_id": "8Base-Ansible-Automation-Platform-2.4-Inside-1.2", "product_identification_helper": { "cpe": "cpe:/a:redhat:ansible_automation_platform_inside:2.4::el8" } } }, { "category": "product_name", "name": "Red Hat Ansible Automation Platform 2.4 for RHEL 8", "product": { "name": "Red Hat Ansible Automation Platform 2.4 for RHEL 8", "product_id": "8Base-Ansible-Automation-Platform-2.4-Developer-1.1", "product_identification_helper": { "cpe": "cpe:/a:redhat:ansible_automation_platform_developer:2.4::el8" } } } ], "category": "product_family", "name": "Red Hat Ansible Automation Platform" }, { "branches": [ { "category": "product_version", "name": "receptor-0:1.4.4-1.el9ap.src", "product": { "name": "receptor-0:1.4.4-1.el9ap.src", "product_id": "receptor-0:1.4.4-1.el9ap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/receptor@1.4.4-1.el9ap?arch=src" } } }, { "category": "product_version", "name": "receptor-0:1.4.4-1.el8ap.src", "product": { "name": "receptor-0:1.4.4-1.el8ap.src", "product_id": "receptor-0:1.4.4-1.el8ap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/receptor@1.4.4-1.el8ap?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "receptorctl-0:1.4.4-1.el9ap.noarch", "product": { "name": "receptorctl-0:1.4.4-1.el9ap.noarch", "product_id": "receptorctl-0:1.4.4-1.el9ap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/receptorctl@1.4.4-1.el9ap?arch=noarch" } } }, { "category": "product_version", "name": "receptorctl-0:1.4.4-1.el8ap.noarch", "product": { "name": "receptorctl-0:1.4.4-1.el8ap.noarch", "product_id": "receptorctl-0:1.4.4-1.el8ap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/receptorctl@1.4.4-1.el8ap?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "receptor-0:1.4.4-1.el9ap.x86_64", "product": { "name": "receptor-0:1.4.4-1.el9ap.x86_64", "product_id": "receptor-0:1.4.4-1.el9ap.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/receptor@1.4.4-1.el9ap?arch=x86_64" } } }, { "category": "product_version", "name": "receptor-0:1.4.4-1.el8ap.x86_64", "product": { "name": "receptor-0:1.4.4-1.el8ap.x86_64", "product_id": "receptor-0:1.4.4-1.el8ap.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/receptor@1.4.4-1.el8ap?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "receptor-0:1.4.4-1.el9ap.ppc64le", "product": { "name": "receptor-0:1.4.4-1.el9ap.ppc64le", "product_id": "receptor-0:1.4.4-1.el9ap.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/receptor@1.4.4-1.el9ap?arch=ppc64le" } } }, { "category": "product_version", "name": "receptor-0:1.4.4-1.el8ap.ppc64le", "product": { "name": "receptor-0:1.4.4-1.el8ap.ppc64le", "product_id": "receptor-0:1.4.4-1.el8ap.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/receptor@1.4.4-1.el8ap?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "receptor-0:1.4.4-1.el9ap.s390x", "product": { "name": "receptor-0:1.4.4-1.el9ap.s390x", "product_id": "receptor-0:1.4.4-1.el9ap.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/receptor@1.4.4-1.el9ap?arch=s390x" } } }, { "category": "product_version", "name": "receptor-0:1.4.4-1.el8ap.s390x", "product": { "name": "receptor-0:1.4.4-1.el8ap.s390x", "product_id": "receptor-0:1.4.4-1.el8ap.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/receptor@1.4.4-1.el8ap?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "receptor-0:1.4.4-1.el9ap.aarch64", "product": { "name": "receptor-0:1.4.4-1.el9ap.aarch64", "product_id": "receptor-0:1.4.4-1.el9ap.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/receptor@1.4.4-1.el9ap?arch=aarch64" } } }, { "category": "product_version", "name": "receptor-0:1.4.4-1.el8ap.aarch64", "product": { "name": "receptor-0:1.4.4-1.el8ap.aarch64", "product_id": "receptor-0:1.4.4-1.el8ap.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/receptor@1.4.4-1.el8ap?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "receptor-0:1.4.4-1.el8ap.aarch64 as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8", "product_id": "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.4-1.el8ap.aarch64" }, "product_reference": "receptor-0:1.4.4-1.el8ap.aarch64", "relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4-Developer-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "receptor-0:1.4.4-1.el8ap.ppc64le as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8", "product_id": "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.4-1.el8ap.ppc64le" }, "product_reference": "receptor-0:1.4.4-1.el8ap.ppc64le", "relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4-Developer-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "receptor-0:1.4.4-1.el8ap.s390x as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8", "product_id": "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.4-1.el8ap.s390x" }, "product_reference": "receptor-0:1.4.4-1.el8ap.s390x", "relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4-Developer-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "receptor-0:1.4.4-1.el8ap.src as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8", "product_id": "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.4-1.el8ap.src" }, "product_reference": "receptor-0:1.4.4-1.el8ap.src", "relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4-Developer-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "receptor-0:1.4.4-1.el8ap.x86_64 as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8", "product_id": "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.4-1.el8ap.x86_64" }, "product_reference": "receptor-0:1.4.4-1.el8ap.x86_64", "relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4-Developer-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "receptorctl-0:1.4.4-1.el8ap.noarch as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8", "product_id": "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptorctl-0:1.4.4-1.el8ap.noarch" }, "product_reference": "receptorctl-0:1.4.4-1.el8ap.noarch", "relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4-Developer-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "receptor-0:1.4.4-1.el8ap.aarch64 as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8", "product_id": "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.4-1.el8ap.aarch64" }, "product_reference": "receptor-0:1.4.4-1.el8ap.aarch64", "relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4-Inside-1.2" }, { "category": "default_component_of", "full_product_name": { "name": "receptor-0:1.4.4-1.el8ap.ppc64le as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8", "product_id": "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.4-1.el8ap.ppc64le" }, "product_reference": "receptor-0:1.4.4-1.el8ap.ppc64le", "relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4-Inside-1.2" }, { "category": "default_component_of", "full_product_name": { "name": "receptor-0:1.4.4-1.el8ap.s390x as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8", "product_id": "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.4-1.el8ap.s390x" }, "product_reference": "receptor-0:1.4.4-1.el8ap.s390x", "relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4-Inside-1.2" }, { "category": "default_component_of", "full_product_name": { "name": "receptor-0:1.4.4-1.el8ap.src as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8", "product_id": "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.4-1.el8ap.src" }, "product_reference": "receptor-0:1.4.4-1.el8ap.src", "relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4-Inside-1.2" }, { "category": "default_component_of", "full_product_name": { "name": "receptor-0:1.4.4-1.el8ap.x86_64 as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8", "product_id": "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.4-1.el8ap.x86_64" }, "product_reference": "receptor-0:1.4.4-1.el8ap.x86_64", "relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4-Inside-1.2" }, { "category": "default_component_of", "full_product_name": { "name": "receptorctl-0:1.4.4-1.el8ap.noarch as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8", "product_id": "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptorctl-0:1.4.4-1.el8ap.noarch" }, "product_reference": "receptorctl-0:1.4.4-1.el8ap.noarch", "relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4-Inside-1.2" }, { "category": "default_component_of", "full_product_name": { "name": "receptor-0:1.4.4-1.el8ap.aarch64 as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8", "product_id": "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.4-1.el8ap.aarch64" }, "product_reference": "receptor-0:1.4.4-1.el8ap.aarch64", "relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "receptor-0:1.4.4-1.el8ap.ppc64le as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8", "product_id": "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.4-1.el8ap.ppc64le" }, "product_reference": "receptor-0:1.4.4-1.el8ap.ppc64le", "relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "receptor-0:1.4.4-1.el8ap.s390x as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8", "product_id": "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.4-1.el8ap.s390x" }, "product_reference": "receptor-0:1.4.4-1.el8ap.s390x", "relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "receptor-0:1.4.4-1.el8ap.src as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8", "product_id": "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.4-1.el8ap.src" }, "product_reference": "receptor-0:1.4.4-1.el8ap.src", "relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "receptor-0:1.4.4-1.el8ap.x86_64 as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8", "product_id": "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.4-1.el8ap.x86_64" }, "product_reference": "receptor-0:1.4.4-1.el8ap.x86_64", "relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "receptorctl-0:1.4.4-1.el8ap.noarch as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 8", "product_id": "8Base-Ansible-Automation-Platform-2.4:receptorctl-0:1.4.4-1.el8ap.noarch" }, "product_reference": "receptorctl-0:1.4.4-1.el8ap.noarch", "relates_to_product_reference": "8Base-Ansible-Automation-Platform-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "receptor-0:1.4.4-1.el9ap.aarch64 as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9", "product_id": "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.4-1.el9ap.aarch64" }, "product_reference": "receptor-0:1.4.4-1.el9ap.aarch64", "relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4-Developer-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "receptor-0:1.4.4-1.el9ap.ppc64le as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9", "product_id": "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.4-1.el9ap.ppc64le" }, "product_reference": "receptor-0:1.4.4-1.el9ap.ppc64le", "relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4-Developer-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "receptor-0:1.4.4-1.el9ap.s390x as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9", "product_id": "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.4-1.el9ap.s390x" }, "product_reference": "receptor-0:1.4.4-1.el9ap.s390x", "relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4-Developer-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "receptor-0:1.4.4-1.el9ap.src as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9", "product_id": "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.4-1.el9ap.src" }, "product_reference": "receptor-0:1.4.4-1.el9ap.src", "relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4-Developer-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "receptor-0:1.4.4-1.el9ap.x86_64 as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9", "product_id": "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.4-1.el9ap.x86_64" }, "product_reference": "receptor-0:1.4.4-1.el9ap.x86_64", "relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4-Developer-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "receptorctl-0:1.4.4-1.el9ap.noarch as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9", "product_id": "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptorctl-0:1.4.4-1.el9ap.noarch" }, "product_reference": "receptorctl-0:1.4.4-1.el9ap.noarch", "relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4-Developer-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "receptor-0:1.4.4-1.el9ap.aarch64 as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9", "product_id": "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.4-1.el9ap.aarch64" }, "product_reference": "receptor-0:1.4.4-1.el9ap.aarch64", "relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4-Inside-1.2" }, { "category": "default_component_of", "full_product_name": { "name": "receptor-0:1.4.4-1.el9ap.ppc64le as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9", "product_id": "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.4-1.el9ap.ppc64le" }, "product_reference": "receptor-0:1.4.4-1.el9ap.ppc64le", "relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4-Inside-1.2" }, { "category": "default_component_of", "full_product_name": { "name": "receptor-0:1.4.4-1.el9ap.s390x as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9", "product_id": "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.4-1.el9ap.s390x" }, "product_reference": "receptor-0:1.4.4-1.el9ap.s390x", "relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4-Inside-1.2" }, { "category": "default_component_of", "full_product_name": { "name": "receptor-0:1.4.4-1.el9ap.src as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9", "product_id": "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.4-1.el9ap.src" }, "product_reference": "receptor-0:1.4.4-1.el9ap.src", "relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4-Inside-1.2" }, { "category": "default_component_of", "full_product_name": { "name": "receptor-0:1.4.4-1.el9ap.x86_64 as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9", "product_id": "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.4-1.el9ap.x86_64" }, "product_reference": "receptor-0:1.4.4-1.el9ap.x86_64", "relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4-Inside-1.2" }, { "category": "default_component_of", "full_product_name": { "name": "receptorctl-0:1.4.4-1.el9ap.noarch as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9", "product_id": "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptorctl-0:1.4.4-1.el9ap.noarch" }, "product_reference": "receptorctl-0:1.4.4-1.el9ap.noarch", "relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4-Inside-1.2" }, { "category": "default_component_of", "full_product_name": { "name": "receptor-0:1.4.4-1.el9ap.aarch64 as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9", "product_id": "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.4-1.el9ap.aarch64" }, "product_reference": "receptor-0:1.4.4-1.el9ap.aarch64", "relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "receptor-0:1.4.4-1.el9ap.ppc64le as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9", "product_id": "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.4-1.el9ap.ppc64le" }, "product_reference": "receptor-0:1.4.4-1.el9ap.ppc64le", "relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "receptor-0:1.4.4-1.el9ap.s390x as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9", "product_id": "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.4-1.el9ap.s390x" }, "product_reference": "receptor-0:1.4.4-1.el9ap.s390x", "relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "receptor-0:1.4.4-1.el9ap.src as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9", "product_id": "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.4-1.el9ap.src" }, "product_reference": "receptor-0:1.4.4-1.el9ap.src", "relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "receptor-0:1.4.4-1.el9ap.x86_64 as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9", "product_id": "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.4-1.el9ap.x86_64" }, "product_reference": "receptor-0:1.4.4-1.el9ap.x86_64", "relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "receptorctl-0:1.4.4-1.el9ap.noarch as a component of Red Hat Ansible Automation Platform 2.4 for RHEL 9", "product_id": "9Base-Ansible-Automation-Platform-2.4:receptorctl-0:1.4.4-1.el9ap.noarch" }, "product_reference": "receptorctl-0:1.4.4-1.el9ap.noarch", "relates_to_product_reference": "9Base-Ansible-Automation-Platform-2.4" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-49295", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2024-01-11T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptorctl-0:1.4.4-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptorctl-0:1.4.4-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:receptorctl-0:1.4.4-1.el8ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptorctl-0:1.4.4-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptorctl-0:1.4.4-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:receptorctl-0:1.4.4-1.el9ap.noarch" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2257815" } ], "notes": [ { "category": "description", "text": "A memory exhaustion vulnerability was found in Quic-GO, where a malicious client exploits the path validation mechanism to induce the server into accumulating an unbounded queue of PATH_RESPONSE frames, depleting its memory. The attacker controls the victim\u0027s packet send rate by overwhelming the server with numerous packets containing PATH_CHALLENGE frames. Through selective acknowledgments of received packets and manipulation of peer\u0027s Round-Trip Time (RTT) estimates, the attacker induces congestion control mechanisms to reduce the server\u0027s send rate significantly. Consequently, the victim server is compelled to store an increasing number of queued PATH_RESPONSE frames, resulting in memory exhaustion.", "title": "Vulnerability description" }, { "category": "summary", "text": "quic-go: memory exhaustion attack against QUIC\u0027s path validation mechanism", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.4-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.4-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.4-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.4-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.4-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.4-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.4-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.4-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.4-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.4-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.4-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.4-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.4-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.4-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.4-1.el8ap.x86_64", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.4-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.4-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.4-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.4-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.4-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.4-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.4-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.4-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.4-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.4-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.4-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.4-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.4-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.4-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.4-1.el9ap.x86_64" ], "known_not_affected": [ "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptorctl-0:1.4.4-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptorctl-0:1.4.4-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:receptorctl-0:1.4.4-1.el8ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptorctl-0:1.4.4-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptorctl-0:1.4.4-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:receptorctl-0:1.4.4-1.el9ap.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-49295" }, { "category": "external", "summary": "RHBZ#2257815", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257815" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-49295", "url": "https://www.cve.org/CVERecord?id=CVE-2023-49295" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-49295", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-49295" }, { "category": "external", "summary": "https://github.com/quic-go/quic-go/security/advisories/GHSA-ppxx-5m9h-6vxf", "url": "https://github.com/quic-go/quic-go/security/advisories/GHSA-ppxx-5m9h-6vxf" }, { "category": "external", "summary": "https://seemann.io/posts/2023-12-18-exploiting-quics-path-validation/", "url": "https://seemann.io/posts/2023-12-18-exploiting-quics-path-validation/" } ], "release_date": "2024-01-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-02-19T01:16:12+00:00", "details": "Red Hat Ansible Automation Platform", "product_ids": [ "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.4-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.4-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.4-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.4-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.4-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.4-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.4-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.4-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.4-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.4-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.4-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.4-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.4-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.4-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.4-1.el8ap.x86_64", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.4-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.4-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.4-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.4-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.4-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.4-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.4-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.4-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.4-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.4-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.4-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.4-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.4-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.4-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.4-1.el9ap.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:0855" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.4-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.4-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.4-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.4-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.4-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptorctl-0:1.4.4-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.4-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.4-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.4-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.4-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.4-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptorctl-0:1.4.4-1.el8ap.noarch", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.4-1.el8ap.aarch64", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.4-1.el8ap.ppc64le", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.4-1.el8ap.s390x", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.4-1.el8ap.src", "8Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.4-1.el8ap.x86_64", "8Base-Ansible-Automation-Platform-2.4:receptorctl-0:1.4.4-1.el8ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.4-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.4-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.4-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.4-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptor-0:1.4.4-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4-Developer-1.1:receptorctl-0:1.4.4-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.4-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.4-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.4-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.4-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptor-0:1.4.4-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4-Inside-1.2:receptorctl-0:1.4.4-1.el9ap.noarch", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.4-1.el9ap.aarch64", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.4-1.el9ap.ppc64le", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.4-1.el9ap.s390x", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.4-1.el9ap.src", "9Base-Ansible-Automation-Platform-2.4:receptor-0:1.4.4-1.el9ap.x86_64", "9Base-Ansible-Automation-Platform-2.4:receptorctl-0:1.4.4-1.el9ap.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "quic-go: memory exhaustion attack against QUIC\u0027s path validation mechanism" } ] }
ghsa-ppxx-5m9h-6vxf
Vulnerability from github
An attacker can cause its peer to run out of memory sending a large number of PATH_CHALLENGE frames. The receiver is supposed to respond to each PATH_CHALLENGE frame with a PATH_RESPONSE frame. The attacker can prevent the receiver from sending out (the vast majority of) these PATH_RESPONSE frames by collapsing the peers congestion window (by selectively acknowledging received packets) and by manipulating the peer's RTT estimate.
I published a more detailed description of the attack and its mitigation in this blog post: https://seemann.io/posts/2023-12-18-exploiting-quics-path-validation/
There's no way to mitigate this attack, please update quic-go to a version that contains the fix.
{ "affected": [ { "package": { "ecosystem": "Go", "name": "github.com/quic-go/quic-go" }, "ranges": [ { "events": [ { "introduced": "0.40.0" }, { "fixed": "0.40.1" } ], "type": "ECOSYSTEM" } ], "versions": [ "0.40.0" ] }, { "package": { "ecosystem": "Go", "name": "github.com/quic-go/quic-go" }, "ranges": [ { "events": [ { "introduced": "0.39.0" }, { "fixed": "0.39.4" } ], "type": "ECOSYSTEM" } ] }, { "package": { "ecosystem": "Go", "name": "github.com/quic-go/quic-go" }, "ranges": [ { "events": [ { "introduced": "0.38.0" }, { "fixed": "0.38.2" } ], "type": "ECOSYSTEM" } ] }, { "package": { "ecosystem": "Go", "name": "github.com/quic-go/quic-go" }, "ranges": [ { "events": [ { "introduced": "0" }, { "fixed": "0.37.7" } ], "type": "ECOSYSTEM" } ] } ], "aliases": [ "CVE-2023-49295" ], "database_specific": { "cwe_ids": [ "CWE-400" ], "github_reviewed": true, "github_reviewed_at": "2024-01-10T15:08:40Z", "nvd_published_at": "2024-01-10T22:15:50Z", "severity": "MODERATE" }, "details": "An attacker can cause its peer to run out of memory sending a large number of PATH_CHALLENGE frames. The receiver is supposed to respond to each PATH_CHALLENGE frame with a PATH_RESPONSE frame. The attacker can prevent the receiver from sending out (the vast majority of) these PATH_RESPONSE frames by collapsing the peers congestion window (by selectively acknowledging received packets) and by manipulating the peer\u0027s RTT estimate.\n\nI published a more detailed description of the attack and its mitigation in this blog post: https://seemann.io/posts/2023-12-18-exploiting-quics-path-validation/\n\nThere\u0027s no way to mitigate this attack, please update quic-go to a version that contains the fix.", "id": "GHSA-ppxx-5m9h-6vxf", "modified": "2024-05-20T21:59:16Z", "published": "2024-01-10T15:08:40Z", "references": [ { "type": "WEB", "url": "https://github.com/quic-go/quic-go/security/advisories/GHSA-ppxx-5m9h-6vxf" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-49295" }, { "type": "WEB", "url": "https://github.com/quic-go/quic-go/commit/17fc98c2d81dbe685c19702dc694a9d606ac56dc" }, { "type": "WEB", "url": "https://github.com/quic-go/quic-go/commit/21609ddfeff93668c7625a85eb09f1541fdad965" }, { "type": "WEB", "url": "https://github.com/quic-go/quic-go/commit/3a9c18bcd27a01c551ac9bf8bd2b4bded77c189a" }, { "type": "WEB", "url": "https://github.com/quic-go/quic-go/commit/554d543b50b917369fb1394cc5396d928166cf49" }, { "type": "WEB", "url": "https://github.com/quic-go/quic-go/commit/6cc3d58935426191296171a6c0d1ee965e10534e" }, { "type": "WEB", "url": "https://github.com/quic-go/quic-go/commit/9aaefe19fc3dc8c8917cc87e6128bb56d9e9e6cc" }, { "type": "WEB", "url": "https://github.com/quic-go/quic-go/commit/a0ffa757499913f7be69aa78f573a6aee3430ae4" }, { "type": "WEB", "url": "https://github.com/quic-go/quic-go/commit/d7aa627ebde91cf799ada2a07443faa9b1e5abb8" }, { "type": "PACKAGE", "url": "https://github.com/quic-go/quic-go" }, { "type": "WEB", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/G5RSHDTVMYAIGYVVFGKTMFHAZJMA3EVV" }, { "type": "WEB", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZE7IOKXX5AATU2WR3V76X5Y3A44QAATG" }, { "type": "WEB", "url": "https://seemann.io/posts/2023-12-18-exploiting-quics-path-validation" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H", "type": "CVSS_V3" } ], "summary": "quic-go\u0027s path validation mechanism can be exploited to cause denial of service" }
opensuse-su-2025:14626-1
Vulnerability from csaf_opensuse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "kubo-0.32.1-1.1 on GA media", "title": "Title of the patch" }, { "category": "description", "text": "These are all security issues fixed in the kubo-0.32.1-1.1 package on the GA media of openSUSE Tumbleweed.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-Tumbleweed-2025-14626", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2025_14626-1.json" }, { "category": "self", "summary": "SUSE CVE CVE-2023-49295 page", "url": "https://www.suse.com/security/cve/CVE-2023-49295/" } ], "title": "kubo-0.32.1-1.1 on GA media", "tracking": { "current_release_date": "2025-01-09T00:00:00Z", "generator": { "date": "2025-01-09T00:00:00Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2025:14626-1", "initial_release_date": "2025-01-09T00:00:00Z", "revision_history": [ { "date": "2025-01-09T00:00:00Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kubo-0.32.1-1.1.aarch64", "product": { "name": "kubo-0.32.1-1.1.aarch64", "product_id": "kubo-0.32.1-1.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "kubo-0.32.1-1.1.ppc64le", "product": { "name": "kubo-0.32.1-1.1.ppc64le", "product_id": "kubo-0.32.1-1.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "kubo-0.32.1-1.1.s390x", "product": { "name": "kubo-0.32.1-1.1.s390x", "product_id": "kubo-0.32.1-1.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kubo-0.32.1-1.1.x86_64", "product": { "name": "kubo-0.32.1-1.1.x86_64", "product_id": "kubo-0.32.1-1.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Tumbleweed", "product": { "name": "openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed", "product_identification_helper": { "cpe": "cpe:/o:opensuse:tumbleweed" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kubo-0.32.1-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kubo-0.32.1-1.1.aarch64" }, "product_reference": "kubo-0.32.1-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kubo-0.32.1-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kubo-0.32.1-1.1.ppc64le" }, "product_reference": "kubo-0.32.1-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kubo-0.32.1-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kubo-0.32.1-1.1.s390x" }, "product_reference": "kubo-0.32.1-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kubo-0.32.1-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kubo-0.32.1-1.1.x86_64" }, "product_reference": "kubo-0.32.1-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-49295", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-49295" } ], "notes": [ { "category": "general", "text": "quic-go is an implementation of the QUIC protocol (RFC 9000, RFC 9001, RFC 9002) in Go. An attacker can cause its peer to run out of memory sending a large number of PATH_CHALLENGE frames. The receiver is supposed to respond to each PATH_CHALLENGE frame with a PATH_RESPONSE frame. The attacker can prevent the receiver from sending out (the vast majority of) these PATH_RESPONSE frames by collapsing the peers congestion window (by selectively acknowledging received packets) and by manipulating the peer\u0027s RTT estimate. This vulnerability has been patched in versions 0.37.7, 0.38.2 and 0.39.4.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kubo-0.32.1-1.1.aarch64", "openSUSE Tumbleweed:kubo-0.32.1-1.1.ppc64le", "openSUSE Tumbleweed:kubo-0.32.1-1.1.s390x", "openSUSE Tumbleweed:kubo-0.32.1-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-49295", "url": "https://www.suse.com/security/cve/CVE-2023-49295" }, { "category": "external", "summary": "SUSE Bug 1234982 for CVE-2023-49295", "url": "https://bugzilla.suse.com/1234982" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kubo-0.32.1-1.1.aarch64", "openSUSE Tumbleweed:kubo-0.32.1-1.1.ppc64le", "openSUSE Tumbleweed:kubo-0.32.1-1.1.s390x", "openSUSE Tumbleweed:kubo-0.32.1-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kubo-0.32.1-1.1.aarch64", "openSUSE Tumbleweed:kubo-0.32.1-1.1.ppc64le", "openSUSE Tumbleweed:kubo-0.32.1-1.1.s390x", "openSUSE Tumbleweed:kubo-0.32.1-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-01-09T00:00:00Z", "details": "moderate" } ], "title": "CVE-2023-49295" } ] }
opensuse-su-2024:13570-1
Vulnerability from csaf_opensuse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "syncthing-1.27.2-1.1 on GA media", "title": "Title of the patch" }, { "category": "description", "text": "These are all security issues fixed in the syncthing-1.27.2-1.1 package on the GA media of openSUSE Tumbleweed.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-Tumbleweed-2024-13570", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_13570-1.json" }, { "category": "self", "summary": "SUSE CVE CVE-2023-49295 page", "url": "https://www.suse.com/security/cve/CVE-2023-49295/" } ], "title": "syncthing-1.27.2-1.1 on GA media", "tracking": { "current_release_date": "2024-06-15T00:00:00Z", "generator": { "date": "2024-06-15T00:00:00Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2024:13570-1", "initial_release_date": "2024-06-15T00:00:00Z", "revision_history": [ { "date": "2024-06-15T00:00:00Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "syncthing-1.27.2-1.1.aarch64", "product": { "name": "syncthing-1.27.2-1.1.aarch64", "product_id": "syncthing-1.27.2-1.1.aarch64" } }, { "category": "product_version", "name": "syncthing-relaysrv-1.27.2-1.1.aarch64", "product": { "name": "syncthing-relaysrv-1.27.2-1.1.aarch64", "product_id": "syncthing-relaysrv-1.27.2-1.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "syncthing-1.27.2-1.1.ppc64le", "product": { "name": "syncthing-1.27.2-1.1.ppc64le", "product_id": "syncthing-1.27.2-1.1.ppc64le" } }, { "category": "product_version", "name": "syncthing-relaysrv-1.27.2-1.1.ppc64le", "product": { "name": "syncthing-relaysrv-1.27.2-1.1.ppc64le", "product_id": "syncthing-relaysrv-1.27.2-1.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "syncthing-1.27.2-1.1.s390x", "product": { "name": "syncthing-1.27.2-1.1.s390x", "product_id": "syncthing-1.27.2-1.1.s390x" } }, { "category": "product_version", "name": "syncthing-relaysrv-1.27.2-1.1.s390x", "product": { "name": "syncthing-relaysrv-1.27.2-1.1.s390x", "product_id": "syncthing-relaysrv-1.27.2-1.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "syncthing-1.27.2-1.1.x86_64", "product": { "name": "syncthing-1.27.2-1.1.x86_64", "product_id": "syncthing-1.27.2-1.1.x86_64" } }, { "category": "product_version", "name": "syncthing-relaysrv-1.27.2-1.1.x86_64", "product": { "name": "syncthing-relaysrv-1.27.2-1.1.x86_64", "product_id": "syncthing-relaysrv-1.27.2-1.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Tumbleweed", "product": { "name": "openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed", "product_identification_helper": { "cpe": "cpe:/o:opensuse:tumbleweed" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "syncthing-1.27.2-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:syncthing-1.27.2-1.1.aarch64" }, "product_reference": "syncthing-1.27.2-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "syncthing-1.27.2-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:syncthing-1.27.2-1.1.ppc64le" }, "product_reference": "syncthing-1.27.2-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "syncthing-1.27.2-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:syncthing-1.27.2-1.1.s390x" }, "product_reference": "syncthing-1.27.2-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "syncthing-1.27.2-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:syncthing-1.27.2-1.1.x86_64" }, "product_reference": "syncthing-1.27.2-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "syncthing-relaysrv-1.27.2-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:syncthing-relaysrv-1.27.2-1.1.aarch64" }, "product_reference": "syncthing-relaysrv-1.27.2-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "syncthing-relaysrv-1.27.2-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:syncthing-relaysrv-1.27.2-1.1.ppc64le" }, "product_reference": "syncthing-relaysrv-1.27.2-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "syncthing-relaysrv-1.27.2-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:syncthing-relaysrv-1.27.2-1.1.s390x" }, "product_reference": "syncthing-relaysrv-1.27.2-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "syncthing-relaysrv-1.27.2-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:syncthing-relaysrv-1.27.2-1.1.x86_64" }, "product_reference": "syncthing-relaysrv-1.27.2-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-49295", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-49295" } ], "notes": [ { "category": "general", "text": "quic-go is an implementation of the QUIC protocol (RFC 9000, RFC 9001, RFC 9002) in Go. An attacker can cause its peer to run out of memory sending a large number of PATH_CHALLENGE frames. The receiver is supposed to respond to each PATH_CHALLENGE frame with a PATH_RESPONSE frame. The attacker can prevent the receiver from sending out (the vast majority of) these PATH_RESPONSE frames by collapsing the peers congestion window (by selectively acknowledging received packets) and by manipulating the peer\u0027s RTT estimate. This vulnerability has been patched in versions 0.37.7, 0.38.2 and 0.39.4.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:syncthing-1.27.2-1.1.aarch64", "openSUSE Tumbleweed:syncthing-1.27.2-1.1.ppc64le", "openSUSE Tumbleweed:syncthing-1.27.2-1.1.s390x", "openSUSE Tumbleweed:syncthing-1.27.2-1.1.x86_64", "openSUSE Tumbleweed:syncthing-relaysrv-1.27.2-1.1.aarch64", "openSUSE Tumbleweed:syncthing-relaysrv-1.27.2-1.1.ppc64le", "openSUSE Tumbleweed:syncthing-relaysrv-1.27.2-1.1.s390x", "openSUSE Tumbleweed:syncthing-relaysrv-1.27.2-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-49295", "url": "https://www.suse.com/security/cve/CVE-2023-49295" }, { "category": "external", "summary": "SUSE Bug 1234982 for CVE-2023-49295", "url": "https://bugzilla.suse.com/1234982" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:syncthing-1.27.2-1.1.aarch64", "openSUSE Tumbleweed:syncthing-1.27.2-1.1.ppc64le", "openSUSE Tumbleweed:syncthing-1.27.2-1.1.s390x", "openSUSE Tumbleweed:syncthing-1.27.2-1.1.x86_64", "openSUSE Tumbleweed:syncthing-relaysrv-1.27.2-1.1.aarch64", "openSUSE Tumbleweed:syncthing-relaysrv-1.27.2-1.1.ppc64le", "openSUSE Tumbleweed:syncthing-relaysrv-1.27.2-1.1.s390x", "openSUSE Tumbleweed:syncthing-relaysrv-1.27.2-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:syncthing-1.27.2-1.1.aarch64", "openSUSE Tumbleweed:syncthing-1.27.2-1.1.ppc64le", "openSUSE Tumbleweed:syncthing-1.27.2-1.1.s390x", "openSUSE Tumbleweed:syncthing-1.27.2-1.1.x86_64", "openSUSE Tumbleweed:syncthing-relaysrv-1.27.2-1.1.aarch64", "openSUSE Tumbleweed:syncthing-relaysrv-1.27.2-1.1.ppc64le", "openSUSE Tumbleweed:syncthing-relaysrv-1.27.2-1.1.s390x", "openSUSE Tumbleweed:syncthing-relaysrv-1.27.2-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2023-49295" } ] }
fkie_cve-2023-49295
Vulnerability from fkie_nvd
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Vendor | Product | Version | |
---|---|---|---|
quic-go_project | quic-go | * | |
quic-go_project | quic-go | * | |
quic-go_project | quic-go | * | |
quic-go_project | quic-go | 0.40.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:quic-go_project:quic-go:*:*:*:*:*:*:*:*", "matchCriteriaId": "F0754377-65C6-4A24-8041-85F73B5630C9", "versionEndExcluding": "0.37.7", "vulnerable": true }, { "criteria": "cpe:2.3:a:quic-go_project:quic-go:*:*:*:*:*:*:*:*", "matchCriteriaId": "A687FF1B-43B1-4A23-895E-F328C03FA36F", "versionEndExcluding": "0.38.2", "versionStartIncluding": "0.38.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:quic-go_project:quic-go:*:*:*:*:*:*:*:*", "matchCriteriaId": "BF599C83-08F6-49B5-965E-927A2004F578", "versionEndExcluding": "0.39.4", "versionStartIncluding": "0.39.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:quic-go_project:quic-go:0.40.0:*:*:*:*:*:*:*", "matchCriteriaId": "BFFA39B2-37BF-4F09-99CD-3665ABC16177", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "quic-go is an implementation of the QUIC protocol (RFC 9000, RFC 9001, RFC 9002) in Go. An attacker can cause its peer to run out of memory sending a large number of PATH_CHALLENGE frames. The receiver is supposed to respond to each PATH_CHALLENGE frame with a PATH_RESPONSE frame. The attacker can prevent the receiver from sending out (the vast majority of) these PATH_RESPONSE frames by collapsing the peers congestion window (by selectively acknowledging received packets) and by manipulating the peer\u0027s RTT estimate. This vulnerability has been patched in versions 0.37.7, 0.38.2 and 0.39.4." }, { "lang": "es", "value": "quic-go es una implementaci\u00f3n del protocolo QUIC (RFC 9000, RFC 9001, RFC 9002) en Go. Un atacante puede hacer que su par se quede sin memoria enviando una gran cantidad de tramas PATH_CHALLENGE. Se supone que el receptor debe responder a cada trama PATH_CHALLENGE con una trama PATH_RESPONSE. El atacante puede evitar que el receptor env\u00ede (la gran mayor\u00eda de) estas tramas PATH_RESPONSE colapsando la ventana de congesti\u00f3n del par (al reconocer selectivamente los paquetes recibidos) y manipulando la estimaci\u00f3n de RTT del par. Esta vulnerabilidad ha sido parcheada en las versiones 0.37.7, 0.38.2 y 0.39.4." } ], "id": "CVE-2023-49295", "lastModified": "2024-11-21T08:33:12.607", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H", "version": "3.1" }, "exploitabilityScore": 1.6, "impactScore": 4.7, "source": "security-advisories@github.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-01-10T22:15:50.610", "references": [ { "source": "security-advisories@github.com", "tags": [ "Patch" ], "url": "https://github.com/quic-go/quic-go/commit/17fc98c2d81dbe685c19702dc694a9d606ac56dc" }, { "source": "security-advisories@github.com", "tags": [ "Patch" ], "url": "https://github.com/quic-go/quic-go/commit/21609ddfeff93668c7625a85eb09f1541fdad965" }, { "source": "security-advisories@github.com", "tags": [ "Patch" ], "url": "https://github.com/quic-go/quic-go/commit/3a9c18bcd27a01c551ac9bf8bd2b4bded77c189a" }, { "source": "security-advisories@github.com", "tags": [ "Patch" ], "url": "https://github.com/quic-go/quic-go/commit/554d543b50b917369fb1394cc5396d928166cf49" }, { "source": "security-advisories@github.com", "tags": [ "Patch" ], "url": "https://github.com/quic-go/quic-go/commit/6cc3d58935426191296171a6c0d1ee965e10534e" }, { "source": "security-advisories@github.com", "tags": [ "Patch" ], "url": "https://github.com/quic-go/quic-go/commit/9aaefe19fc3dc8c8917cc87e6128bb56d9e9e6cc" }, { "source": "security-advisories@github.com", "tags": [ "Patch" ], "url": "https://github.com/quic-go/quic-go/commit/a0ffa757499913f7be69aa78f573a6aee3430ae4" }, { "source": "security-advisories@github.com", "tags": [ "Patch" ], "url": "https://github.com/quic-go/quic-go/commit/d7aa627ebde91cf799ada2a07443faa9b1e5abb8" }, { "source": "security-advisories@github.com", "tags": [ "Vendor Advisory" ], "url": "https://github.com/quic-go/quic-go/security/advisories/GHSA-ppxx-5m9h-6vxf" }, { "source": "security-advisories@github.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/G5RSHDTVMYAIGYVVFGKTMFHAZJMA3EVV/" }, { "source": "security-advisories@github.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZE7IOKXX5AATU2WR3V76X5Y3A44QAATG/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://github.com/quic-go/quic-go/commit/17fc98c2d81dbe685c19702dc694a9d606ac56dc" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://github.com/quic-go/quic-go/commit/21609ddfeff93668c7625a85eb09f1541fdad965" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://github.com/quic-go/quic-go/commit/3a9c18bcd27a01c551ac9bf8bd2b4bded77c189a" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://github.com/quic-go/quic-go/commit/554d543b50b917369fb1394cc5396d928166cf49" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://github.com/quic-go/quic-go/commit/6cc3d58935426191296171a6c0d1ee965e10534e" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://github.com/quic-go/quic-go/commit/9aaefe19fc3dc8c8917cc87e6128bb56d9e9e6cc" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://github.com/quic-go/quic-go/commit/a0ffa757499913f7be69aa78f573a6aee3430ae4" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://github.com/quic-go/quic-go/commit/d7aa627ebde91cf799ada2a07443faa9b1e5abb8" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://github.com/quic-go/quic-go/security/advisories/GHSA-ppxx-5m9h-6vxf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/G5RSHDTVMYAIGYVVFGKTMFHAZJMA3EVV/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZE7IOKXX5AATU2WR3V76X5Y3A44QAATG/" } ], "sourceIdentifier": "security-advisories@github.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-400" } ], "source": "security-advisories@github.com", "type": "Primary" } ] }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.