Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:rpm/redhat/receptor@1.4.4-1?arch=el9ap
purl pkg:rpm/redhat/receptor@1.4.4-1?arch=el9ap
Next non-vulnerable version None.
Latest non-vulnerable version None.
Risk 3.1
Vulnerabilities affecting this package (1)
Vulnerability Summary Fixed by
VCID-3vjt-1se3-rbhc
Aliases:
CVE-2023-49295
GHSA-ppxx-5m9h-6vxf
quic-go's path validation mechanism can be exploited to cause denial of service An attacker can cause its peer to run out of memory sending a large number of PATH_CHALLENGE frames. The receiver is supposed to respond to each PATH_CHALLENGE frame with a PATH_RESPONSE frame. The attacker can prevent the receiver from sending out (the vast majority of) these PATH_RESPONSE frames by collapsing the peers congestion window (by selectively acknowledging received packets) and by manipulating the peer's RTT estimate. I published a more detailed description of the attack and its mitigation in this blog post: https://seemann.io/posts/2023-12-18-exploiting-quics-path-validation/ There's no way to mitigate this attack, please update quic-go to a version that contains the fix. There are no reported fixed by versions.
Vulnerabilities fixed by this package (0)
Vulnerability Summary Aliases
This package is not known to fix vulnerabilities.

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-01T13:50:28.021361+00:00 RedHat Importer Affected by VCID-3vjt-1se3-rbhc https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-49295.json 38.0.0