{"id":"AZL-39749","summary":"CVE-2024-22189 affecting package coredns for versions less than 1.11.1-2","details":"quic-go is an implementation of the QUIC protocol in Go. Prior to version 0.42.0, an attacker can cause its peer to run out of memory sending a large number of `NEW_CONNECTION_ID` frames that retire old connection IDs. The receiver is supposed to respond to each retirement frame with a `RETIRE_CONNECTION_ID` frame. The attacker can prevent the receiver from sending out (the vast majority of) these `RETIRE_CONNECTION_ID` frames by collapsing the peers congestion window (by selectively acknowledging received packets) and by manipulating the peer's RTT estimate. Version 0.42.0 contains a patch for the issue. No known workarounds are available.","modified":"2026-04-01T05:13:50.817991Z","published":"2024-04-04T15:15:37Z","upstream":["CVE-2024-22189"],"references":[{"type":"WEB","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-22189"}],"affected":[{"package":{"name":"coredns","ecosystem":"Azure Linux:3","purl":"pkg:rpm/azure-linux/coredns"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.11.1-2"}]}],"database_specific":{"source":"https://github.com/microsoft/AzureLinuxVulnerabilityData/blob/main/osv/AZL-39749.json"}}],"schema_version":"1.7.5"}