https://bugzilla.redhat.com/show_bug.cgi?id=2275236
Bug ID: 2275236
Summary: CVE-2024-22189 dnscrypt-proxy: quic-go: memory
exhaustion attack against QUIC's connection ID
mechanism [fedora-39]
Product: Fedora
Version: 39
Status: NEW
Component: dnscrypt-proxy
Keywords: Security, SecurityTracking
Severity: medium
Priority: medium
Assignee: davide(a)cavalca.name
Reporter: askrabec(a)redhat.com
QA Contact: extras-qa(a)fedoraproject.org
CC: davide(a)cavalca.name,
epel-packagers-sig(a)lists.fedoraproject.org,
go-sig(a)lists.fedoraproject.org, zebob.m(a)gmail.com
Target Milestone: ---
Classification: Fedora
More information about this security flaw is available in the following bug:
http://bugzilla.redhat.com/show_bug.cgi?id=2273513
Disclaimer: Community trackers are created by Red Hat Product Security team on
a best effort basis. Package maintainers are required to ascertain if the flaw
indeed affects their package, before starting the update process.
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2275236
Report this comment as SPAM:
https://bugzilla.redhat.com/enter_bug.cgi?product=Bugzilla&format=rep...