Import Source
https://github.com/microsoft/AzureLinuxVulnerabilityData/blob/main/osv/AZL-39851.json
JSON Data
https://api.test.osv.dev/v1/vulns/AZL-39851
Upstream
Published
2024-04-04T15:15:37Z
Modified
2026-04-01T05:13:29.924262Z
Summary
CVE-2024-22189 affecting package coredns for versions less than 1.11.1-6
Details

quic-go is an implementation of the QUIC protocol in Go. Prior to version 0.42.0, an attacker can cause its peer to run out of memory sending a large number of NEW_CONNECTION_ID frames that retire old connection IDs. The receiver is supposed to respond to each retirement frame with a RETIRE_CONNECTION_ID frame. The attacker can prevent the receiver from sending out (the vast majority of) these RETIRE_CONNECTION_ID frames by collapsing the peers congestion window (by selectively acknowledging received packets) and by manipulating the peer's RTT estimate. Version 0.42.0 contains a patch for the issue. No known workarounds are available.

References

Affected packages

Azure Linux:2 / coredns

Package

Name
coredns
Purl
pkg:rpm/azure-linux/coredns

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.11.1-6

Database specific

source
"https://github.com/microsoft/AzureLinuxVulnerabilityData/blob/main/osv/AZL-39851.json"