data/reports: add GO-2024-2459.yaml
Aliases: CVE-2023-49295, GHSA-ppxx-5m9h-6vxf
Fixes golang/vulndb#2459
Change-Id: I39aaa89bc36a53b56669fcc3b98d226f210e8592
Reviewed-on: https://go-review.googlesource.com/c/vulndb/+/556015
Auto-Submit: Jonathan Amsterdam <jba@google.com>
Reviewed-by: Damien Neil <dneil@google.com>
LUCI-TryBot-Result: Go LUCI <golang-scoped@luci-project-accounts.iam.gserviceaccount.com>
diff --git a/data/osv/GO-2024-2459.json b/data/osv/GO-2024-2459.json
new file mode 100644
index 0000000..710e190
--- /dev/null
+++ b/data/osv/GO-2024-2459.json
@@ -0,0 +1,97 @@
+{
+ "schema_version": "1.3.1",
+ "id": "GO-2024-2459",
+ "modified": "0001-01-01T00:00:00Z",
+ "published": "0001-01-01T00:00:00Z",
+ "aliases": [
+ "CVE-2023-49295",
+ "GHSA-ppxx-5m9h-6vxf"
+ ],
+ "summary": "Denial of service via path validation in github.com/quic-go/quic-go",
+ "details": "Denial of service via path validation in github.com/quic-go/quic-go",
+ "affected": [
+ {
+ "package": {
+ "name": "github.com/quic-go/quic-go",
+ "ecosystem": "Go"
+ },
+ "ranges": [
+ {
+ "type": "SEMVER",
+ "events": [
+ {
+ "introduced": "0"
+ },
+ {
+ "fixed": "0.37.7"
+ },
+ {
+ "introduced": "0.38.0"
+ },
+ {
+ "fixed": "0.38.2"
+ },
+ {
+ "introduced": "0.39.0"
+ },
+ {
+ "fixed": "0.39.4"
+ },
+ {
+ "introduced": "0.40.0"
+ },
+ {
+ "fixed": "0.40.1"
+ }
+ ]
+ }
+ ],
+ "ecosystem_specific": {}
+ }
+ ],
+ "references": [
+ {
+ "type": "ADVISORY",
+ "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-49295"
+ },
+ {
+ "type": "FIX",
+ "url": "https://github.com/quic-go/quic-go/commit/17fc98c2d81dbe685c19702dc694a9d606ac56dc"
+ },
+ {
+ "type": "FIX",
+ "url": "https://github.com/quic-go/quic-go/commit/21609ddfeff93668c7625a85eb09f1541fdad965"
+ },
+ {
+ "type": "FIX",
+ "url": "https://github.com/quic-go/quic-go/commit/3a9c18bcd27a01c551ac9bf8bd2b4bded77c189a"
+ },
+ {
+ "type": "FIX",
+ "url": "https://github.com/quic-go/quic-go/commit/554d543b50b917369fb1394cc5396d928166cf49"
+ },
+ {
+ "type": "FIX",
+ "url": "https://github.com/quic-go/quic-go/commit/6cc3d58935426191296171a6c0d1ee965e10534e"
+ },
+ {
+ "type": "FIX",
+ "url": "https://github.com/quic-go/quic-go/commit/9aaefe19fc3dc8c8917cc87e6128bb56d9e9e6cc"
+ },
+ {
+ "type": "FIX",
+ "url": "https://github.com/quic-go/quic-go/commit/a0ffa757499913f7be69aa78f573a6aee3430ae4"
+ },
+ {
+ "type": "FIX",
+ "url": "https://github.com/quic-go/quic-go/commit/d7aa627ebde91cf799ada2a07443faa9b1e5abb8"
+ },
+ {
+ "type": "WEB",
+ "url": "https://seemann.io/posts/2023-12-18-exploiting-quics-path-validation/"
+ }
+ ],
+ "database_specific": {
+ "url": "https://pkg.go.dev/vuln/GO-2024-2459"
+ }
+}
\ No newline at end of file
diff --git a/data/reports/GO-2024-2459.yaml b/data/reports/GO-2024-2459.yaml
new file mode 100644
index 0000000..8ec68e1
--- /dev/null
+++ b/data/reports/GO-2024-2459.yaml
@@ -0,0 +1,28 @@
+id: GO-2024-2459
+modules:
+ - module: github.com/quic-go/quic-go
+ versions:
+ - fixed: 0.37.7
+ - introduced: 0.38.0
+ fixed: 0.38.2
+ - introduced: 0.39.0
+ fixed: 0.39.4
+ - introduced: 0.40.0
+ fixed: 0.40.1
+ vulnerable_at: 0.40.0
+summary: Denial of service via path validation in github.com/quic-go/quic-go
+cves:
+ - CVE-2023-49295
+ghsas:
+ - GHSA-ppxx-5m9h-6vxf
+references:
+ - advisory: https://nvd.nist.gov/vuln/detail/CVE-2023-49295
+ - fix: https://github.com/quic-go/quic-go/commit/17fc98c2d81dbe685c19702dc694a9d606ac56dc
+ - fix: https://github.com/quic-go/quic-go/commit/21609ddfeff93668c7625a85eb09f1541fdad965
+ - fix: https://github.com/quic-go/quic-go/commit/3a9c18bcd27a01c551ac9bf8bd2b4bded77c189a
+ - fix: https://github.com/quic-go/quic-go/commit/554d543b50b917369fb1394cc5396d928166cf49
+ - fix: https://github.com/quic-go/quic-go/commit/6cc3d58935426191296171a6c0d1ee965e10534e
+ - fix: https://github.com/quic-go/quic-go/commit/9aaefe19fc3dc8c8917cc87e6128bb56d9e9e6cc
+ - fix: https://github.com/quic-go/quic-go/commit/a0ffa757499913f7be69aa78f573a6aee3430ae4
+ - fix: https://github.com/quic-go/quic-go/commit/d7aa627ebde91cf799ada2a07443faa9b1e5abb8
+ - web: https://seemann.io/posts/2023-12-18-exploiting-quics-path-validation/