CVE-2023-39322
Grafana vulnerability analysis and mitigation

Overview

CVE-2023-39322 is a security vulnerability discovered in Go programming language's QUIC connections implementation. The vulnerability was identified in Go version 1.21.0 and was fixed in version 1.21.1. The issue stems from QUIC connections not setting an upper bound on the amount of data buffered when reading post-handshake messages (Go Issue, Go Advisory).

Technical details

The vulnerability occurs in the QUIC connection handling where there was no limit set on the amount of data that could be buffered when processing post-handshake messages. This implementation flaw could allow unbounded memory growth. The fix implemented in version 1.21.1 ensures that connections consistently reject messages larger than 65KiB in size. The vulnerability has been assigned a CVSS v3.1 base score of 7.5 (High) with the vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H (NVD).

Impact

The vulnerability could allow a malicious QUIC connection to cause unbounded memory growth in the affected system, potentially leading to a Denial of Service (DoS) condition. The impact is primarily on the availability of the system, with no direct effect on confidentiality or integrity (NetApp Advisory).

Mitigation and workarounds

The primary mitigation is to upgrade to Go version 1.21.1 or later, which includes the fix for this vulnerability. The fix implements a consistent message size limit of 65KiB for post-handshake messages. For affected systems, all Go packages should be upgraded to the patched version (Gentoo Advisory).

Community reactions

The vulnerability was publicly disclosed through the Go project's security announcement channels. The Go team classified this as a PUBLIC track vulnerability rather than PRIVATE track, noting that it affected a very new API and the primary known user (quic-go) had already released a workaround in a patch release (Go Dev).

Additional resources


SourceThis report was generated using AI

Related Grafana vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-66031HIGH8.7
  • JavaScriptJavaScript
  • kubeflow-centraldashboard
NoYesNov 26, 2025
CVE-2025-12816HIGH8.6
  • JavaScriptJavaScript
  • argo-workflows-fips-3.7
NoYesNov 25, 2025
CVE-2025-66412HIGH8.5
  • JavaScriptJavaScript
  • polkit
NoYesDec 01, 2025
CVE-2025-66035HIGH7.7
  • JavaScriptJavaScript
  • @angular/common
NoYesNov 26, 2025
CVE-2025-66030MEDIUM6.3
  • JavaScriptJavaScript
  • reaper
NoYesNov 26, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management