Lucene search

K
ubuntucveUbuntu.comUB:CVE-2023-39322
HistorySep 08, 2023 - 12:00 a.m.

CVE-2023-39322

2023-09-0800:00:00
ubuntu.com
ubuntu.com
9
quic
cve-2023-39322
memory growth
fix
65kib limit

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

0.001 Low

EPSS

Percentile

37.8%

QUIC connections do not set an upper bound on the amount of data buffered
when reading post-handshake messages, allowing a malicious QUIC connection
to cause unbounded memory growth. With fix, connections now consistently
reject messages larger than 65KiB in size.

Notes

Author Note
mdeslaur Packages built using golang need to be rebuilt once the vulnerability has been fixed. This CVE entry does not list packages that need rebuilding outside of the main repository or the Ubuntu variants with PPA overlays.
sbeattie only affects golang-1.21

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

0.001 Low

EPSS

Percentile

37.8%