vulnerability
Red Hat OpenShift: CVE-2023-39321: golang: crypto/tls: panic when processing post-handshake message on QUIC connections
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
8 | (AV:N/AC:L/Au:N/C:N/I:N/A:C) | 09/08/2023 | 11/01/2023 | 04/11/2025 |
Severity
8
CVSS
(AV:N/AC:L/Au:N/C:N/I:N/A:C)
Published
09/08/2023
Added
11/01/2023
Modified
04/11/2025
Description
Processing an incomplete post-handshake message for a QUIC connection can cause a panic.
Solution(s)
linuxrpm-upgrade-buildahlinuxrpm-upgrade-conmonlinuxrpm-upgrade-containernetworking-pluginslinuxrpm-upgrade-microshiftlinuxrpm-upgrade-openshift-clientslinuxrpm-upgrade-podmanlinuxrpm-upgrade-runclinuxrpm-upgrade-skopeo
References
- CVE-2023-39321
- https://attackerkb.com/topics/CVE-2023-39321
- REDHAT-RHSA-2023:5008
- REDHAT-RHSA-2023:5009
- REDHAT-RHSA-2023:5947
- REDHAT-RHSA-2023:5974
- REDHAT-RHSA-2023:6031
- REDHAT-RHSA-2023:6085
- REDHAT-RHSA-2023:6115
- REDHAT-RHSA-2023:6119
- REDHAT-RHSA-2023:6122
- REDHAT-RHSA-2023:6145
- REDHAT-RHSA-2023:6148
- REDHAT-RHSA-2023:6154
- REDHAT-RHSA-2023:6161
- REDHAT-RHSA-2023:6200
- REDHAT-RHSA-2023:6202
- REDHAT-RHSA-2023:6840
- REDHAT-RHSA-2023:7517
- REDHAT-RHSA-2023:7762
- REDHAT-RHSA-2023:7763
- REDHAT-RHSA-2023:7764
- REDHAT-RHSA-2023:7765
- REDHAT-RHSA-2023:7766
- REDHAT-RHSA-2024:0121
- REDHAT-RHSA-2024:1383
- REDHAT-RHSA-2024:1901
- REDHAT-RHSA-2024:2988
- REDHAT-RHSA-2024:3352
- REDHAT-RHSA-2024:3467

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.