QUIC connections do not set an upper bound on the amount of data buffered when reading post-handshake messages, allowing a malicious QUIC connection to cause unbounded memory growth. With fix, connections now consistently reject messages larger than 65KiB in size.
{
"availability": "No subscription required",
"binaries": [
{
"binary_version": "1.21.1-1~ubuntu20.04.1",
"binary_name": "golang-1.21"
},
{
"binary_version": "1.21.1-1~ubuntu20.04.1",
"binary_name": "golang-1.21-doc"
},
{
"binary_version": "1.21.1-1~ubuntu20.04.1",
"binary_name": "golang-1.21-go"
},
{
"binary_version": "1.21.1-1~ubuntu20.04.1",
"binary_name": "golang-1.21-src"
}
]
}
{
"availability": "No subscription required",
"binaries": [
{
"binary_version": "1.21.1-1~ubuntu22.04.1",
"binary_name": "golang-1.21"
},
{
"binary_version": "1.21.1-1~ubuntu22.04.1",
"binary_name": "golang-1.21-doc"
},
{
"binary_version": "1.21.1-1~ubuntu22.04.1",
"binary_name": "golang-1.21-go"
},
{
"binary_version": "1.21.1-1~ubuntu22.04.1",
"binary_name": "golang-1.21-src"
}
]
}
{
"availability": "No subscription required",
"binaries": [
{
"binary_version": "1.21.5-1",
"binary_name": "golang-1.21"
},
{
"binary_version": "1.21.5-1",
"binary_name": "golang-1.21-doc"
},
{
"binary_version": "1.21.5-1",
"binary_name": "golang-1.21-go"
},
{
"binary_version": "1.21.5-1",
"binary_name": "golang-1.21-src"
}
]
}