There is a vulnerability in the fizz library prior to v2023.01.30.00 where a CHECK failure can be triggered remotely. This behavior requires the client supported cipher advertisement changing between the original ClientHello and the second ClientHello, crashing the process (impact is limited to denial of service).
                
            References
                    | Link | Resource | 
|---|---|
| https://github.com/facebookincubator/fizz/commit/8d3649841597bedfb6986c30431ebad0eb215265 | Patch | 
| https://www.facebook.com/security/advisories/cve-2023-23759 | Patch Vendor Advisory | 
Configurations
                    History
                    No history.
Information
                Published : 2023-05-18 22:15
Updated : 2023-11-07 04:07
NVD link : CVE-2023-23759
Mitre link : CVE-2023-23759
CVE.ORG link : CVE-2023-23759
JSON object : View
Products Affected
                - fizz
 
CWE
                
                    
                        
                        CWE-617
                        
            Reachable Assertion
