QUIC connections do not set an upper bound on the amount of data buffered when reading post-handshake messages, allowing a malicious QUIC connection to cause unbounded memory growth. With fix, connections now consistently reject messages larger than 65KiB in size.
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: Go

Published: 2023-09-08T16:13:32.795Z

Updated: 2023-10-11T21:14:59.364Z

Reserved: 2023-07-27T17:05:55.187Z


Link: CVE-2023-39322

JSON object: View

cve-icon NVD Information

Status : Modified

Published: 2023-09-08T17:15:28.120

Modified: 2023-11-25T11:15:17.847


Link: CVE-2023-39322

JSON object: View

cve-icon Redhat Information

No data.

CWE