QUIC connections do not set an upper bound on the amount of data buffered when reading post-handshake messages, allowing a malicious QUIC connection to cause unbounded memory growth. With fix, connections now consistently reject messages larger than 65KiB in size.
{
"binaries": [
{
"binary_name": "golang-1.21",
"binary_version": "1.21.1-1~ubuntu20.04.1"
},
{
"binary_name": "golang-1.21-doc",
"binary_version": "1.21.1-1~ubuntu20.04.1"
},
{
"binary_name": "golang-1.21-go",
"binary_version": "1.21.1-1~ubuntu20.04.1"
},
{
"binary_name": "golang-1.21-src",
"binary_version": "1.21.1-1~ubuntu20.04.1"
}
],
"availability": "No subscription required"
}
{
"binaries": [
{
"binary_name": "golang-1.21",
"binary_version": "1.21.1-1~ubuntu22.04.1"
},
{
"binary_name": "golang-1.21-doc",
"binary_version": "1.21.1-1~ubuntu22.04.1"
},
{
"binary_name": "golang-1.21-go",
"binary_version": "1.21.1-1~ubuntu22.04.1"
},
{
"binary_name": "golang-1.21-src",
"binary_version": "1.21.1-1~ubuntu22.04.1"
}
],
"availability": "No subscription required"
}
{
"binaries": [
{
"binary_name": "golang-1.21",
"binary_version": "1.21.5-1"
},
{
"binary_name": "golang-1.21-doc",
"binary_version": "1.21.5-1"
},
{
"binary_name": "golang-1.21-go",
"binary_version": "1.21.5-1"
},
{
"binary_name": "golang-1.21-src",
"binary_version": "1.21.5-1"
}
],
"availability": "No subscription required"
}