UBUNTU-CVE-2025-64702

Source
https://ubuntu.com/security/CVE-2025-64702
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2025/UBUNTU-CVE-2025-64702.json
JSON Data
https://api.osv.dev/v1/vulns/UBUNTU-CVE-2025-64702
Upstream
Published
2025-12-11T21:15:00Z
Modified
2025-12-17T20:46:24.562079Z
Severity
  • 5.3 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L CVSS Calculator
  • Ubuntu - medium
Summary
[none]
Details

quic-go is an implementation of the QUIC protocol in Go. Versions 0.56.0 and below are vulnerable to excessive memory allocation through quic-go's HTTP/3 client and server implementations by sending a QPACK-encoded HEADERS frame that decodes into a large header field section (many unique header names and/or large values). The implementation builds an http.Header (used on the http.Request and http.Response, respectively), while only enforcing limits on the size of the (QPACK-compressed) HEADERS frame, but not on the decoded header, leading to memory exhaustion. This issue is fixed in version 0.57.0.

References

Affected packages

Ubuntu:22.04:LTS

golang-github-lucas-clemente-quic-go

Package

Name
golang-github-lucas-clemente-quic-go
Purl
pkg:deb/ubuntu/golang-github-lucas-clemente-quic-go@0.25.0-1?arch=source&distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

0.*

0.18.0-3
0.24.0-1
0.25.0-1

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "golang-github-lucas-clemente-quic-go-dev",
            "binary_version": "0.25.0-1"
        }
    ]
}

Database specific

source

"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2025/UBUNTU-CVE-2025-64702.json"

Ubuntu:24.04:LTS

golang-github-lucas-clemente-quic-go

Package

Name
golang-github-lucas-clemente-quic-go
Purl
pkg:deb/ubuntu/golang-github-lucas-clemente-quic-go@0.38.2-1?arch=source&distro=noble

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

0.*

0.37.4-1
0.38.2-1

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "golang-github-lucas-clemente-quic-go-dev",
            "binary_version": "0.38.2-1"
        }
    ]
}

Database specific

source

"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2025/UBUNTU-CVE-2025-64702.json"

Ubuntu:25.04

golang-github-lucas-clemente-quic-go

Package

Name
golang-github-lucas-clemente-quic-go
Purl
pkg:deb/ubuntu/golang-github-lucas-clemente-quic-go@0.50.0-1?arch=source&distro=plucky

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

0.*

0.46.0-2
0.50.0-1

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "golang-github-lucas-clemente-quic-go-dev",
            "binary_version": "0.50.0-1"
        }
    ]
}

Database specific

source

"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2025/UBUNTU-CVE-2025-64702.json"

Ubuntu:25.10

golang-github-lucas-clemente-quic-go

Package

Name
golang-github-lucas-clemente-quic-go
Purl
pkg:deb/ubuntu/golang-github-lucas-clemente-quic-go@0.50.1-2?arch=source&distro=questing

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

0.*

0.50.0-1
0.50.1-2

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "golang-github-lucas-clemente-quic-go-dev",
            "binary_version": "0.50.1-2"
        }
    ]
}

Database specific

source

"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2025/UBUNTU-CVE-2025-64702.json"