Skip to content

Commit

Permalink
data/reports: add GO-2023-2045.yaml
Browse files Browse the repository at this point in the history
Aliases: CVE-2023-39322

Updates #2045

Change-Id: Ia87ee1ec604a0270f357536130e3abc022a84d0c
Reviewed-on: https://go-review.googlesource.com/c/vulndb/+/526168
Reviewed-by: Damien Neil <[email protected]>
LUCI-TryBot-Result: Go LUCI <[email protected]>
Auto-Submit: Tatiana Bradley <[email protected]>
  • Loading branch information
tatianab authored and gopherbot committed Sep 7, 2023
1 parent 3f811f3 commit b919569
Show file tree
Hide file tree
Showing 3 changed files with 178 additions and 0 deletions.
79 changes: 79 additions & 0 deletions data/cve/v5/GO-2023-2045.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,79 @@
{
"dataType": "CVE_RECORD",
"dataVersion": "5.0",
"cveMetadata": {
"cveId": "CVE-2023-39322"
},
"containers": {
"cna": {
"providerMetadata": {
"orgId": "1bb62c36-49e3-4200-9d77-64a1400537cc"
},
"title": "Memory exhaustion in QUIC connection handling in crypto/tls",
"descriptions": [
{
"lang": "en",
"value": "QUIC connections do not set an upper bound on the amount of data buffered when reading post-handshake messages, allowing a malicious QUIC connection to cause unbounded memory growth. With fix, connections now consistently reject messages larger than 65KiB in size."
}
],
"affected": [
{
"vendor": "Go standard library",
"product": "crypto/tls",
"collectionURL": "https://pkg.go.dev",
"packageName": "crypto/tls",
"versions": [
{
"version": "0",
"lessThan": "1.20.8",
"status": "affected",
"versionType": "semver"
},
{
"version": "1.21.0-0",
"lessThan": "1.21.1",
"status": "affected",
"versionType": "semver"
}
],
"programRoutines": [
{
"name": "QUICConn.HandleData"
}
],
"defaultStatus": "unaffected"
}
],
"problemTypes": [
{
"descriptions": [
{
"lang": "en",
"description": "CWE-400: Uncontrolled Resource Consumption"
}
]
}
],
"references": [
{
"url": "https://go.dev/issue/62266"
},
{
"url": "https://go.dev/cl/523039"
},
{
"url": "https://groups.google.com/g/golang-dev/c/2C5vbR-UNkI/m/L1hdrPhfBAAJ"
},
{
"url": "https://pkg.go.dev/vuln/GO-2023-2045"
}
],
"credits": [
{
"lang": "en",
"value": "Marten Seemann"
}
]
}
}
}
70 changes: 70 additions & 0 deletions data/osv/GO-2023-2045.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,70 @@
{
"schema_version": "1.3.1",
"id": "GO-2023-2045",
"modified": "0001-01-01T00:00:00Z",
"published": "0001-01-01T00:00:00Z",
"aliases": [
"CVE-2023-39322"
],
"summary": "Memory exhaustion in QUIC connection handling in crypto/tls",
"details": "QUIC connections do not set an upper bound on the amount of data buffered when reading post-handshake messages, allowing a malicious QUIC connection to cause unbounded memory growth.\n\nWith fix, connections now consistently reject messages larger than 65KiB in size.",
"affected": [
{
"package": {
"name": "stdlib",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
},
{
"fixed": "1.20.8"
},
{
"introduced": "1.21.0-0"
},
{
"fixed": "1.21.1"
}
]
}
],
"ecosystem_specific": {
"imports": [
{
"path": "crypto/tls",
"symbols": [
"QUICConn.HandleData"
]
}
]
}
}
],
"references": [
{
"type": "REPORT",
"url": "https://go.dev/issue/62266"
},
{
"type": "FIX",
"url": "https://go.dev/cl/523039"
},
{
"type": "WEB",
"url": "https://groups.google.com/g/golang-dev/c/2C5vbR-UNkI/m/L1hdrPhfBAAJ"
}
],
"credits": [
{
"name": "Marten Seemann"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2023-2045"
}
}
29 changes: 29 additions & 0 deletions data/reports/GO-2023-2045.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,29 @@
id: GO-2023-2045
modules:
- module: std
versions:
- fixed: 1.20.8
- introduced: 1.21.0-0
fixed: 1.21.1
vulnerable_at: 1.21.0
packages:
- package: crypto/tls
symbols:
- QUICConn.HandleData
summary: Memory exhaustion in QUIC connection handling in crypto/tls
description: |-
QUIC connections do not set an upper bound on the amount of data buffered when
reading post-handshake messages, allowing a malicious QUIC connection to cause
unbounded memory growth.
With fix, connections now consistently reject messages larger than 65KiB in
size.
credits:
- Marten Seemann
references:
- report: https://go.dev/issue/62266
- fix: https://go.dev/cl/523039
- web: https://groups.google.com/g/golang-dev/c/2C5vbR-UNkI/m/L1hdrPhfBAAJ
cve_metadata:
id: CVE-2023-39322
cwe: 'CWE-400: Uncontrolled Resource Consumption'

0 comments on commit b919569

Please sign in to comment.