First published: Wed Sep 06 2023(Updated: )
Golang Go is vulnerable to a denial of service, caused by an uncontrolled resource consumption flaw when reading post-handshake messages. By sending a specially crafted request, a remote attacker could exploit this vulnerability to cause unbounded memory growth, and results in a denial of service condition.
Credit: security@golang.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/golang | <1.20.8 | 1.20.8 |
redhat/golang | <1.21.1 | 1.21.1 |
IBM Planning Analytics Cloud | <=4.0 | |
Golang | >=1.21.0<1.21.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-39322 is a vulnerability that allows a malicious QUIC connection to cause unbounded memory growth by not setting an upper bound on the amount of data buffered when reading post-handshake messages.
CVE-2023-39322 affects Golang Go versions 1.21.0 up to but not including 1.21.1.
CVE-2023-39322 has a severity rating of 7.5 (high).
CVE-2023-39322 can be fixed by updating Golang Go to version 1.21.1 or higher.
CVE-2023-39322 has CWE (Common Weakness Enumeration) vulnerabilities 770 and 400.