CVE-2024-22189 Affecting k3s package, versions <1.29.3-r3
Threat Intelligence
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-WOLFILATEST-K3S-6593466
- published 9 Apr 2024
- disclosed 4 Apr 2024
Introduced: 4 Apr 2024
CVE-2024-22189 Open this link in a new tabHow to fix?
Upgrade Wolfi
k3s
to version 1.29.3-r3 or higher.
NVD Description
Note: Versions mentioned in the description apply only to the upstream k3s
package and not the k3s
package as distributed by Wolfi
.
See How to fix?
for Wolfi
relevant fixed versions and status.
quic-go is an implementation of the QUIC protocol in Go. Prior to version 0.42.0, an attacker can cause its peer to run out of memory sending a large number of NEW_CONNECTION_ID
frames that retire old connection IDs. The receiver is supposed to respond to each retirement frame with a RETIRE_CONNECTION_ID
frame. The attacker can prevent the receiver from sending out (the vast majority of) these RETIRE_CONNECTION_ID
frames by collapsing the peers congestion window (by selectively acknowledging received packets) and by manipulating the peer's RTT estimate. Version 0.42.0 contains a patch for the issue. No known workarounds are available.