QUIC connections do not set an upper bound on the amount of data buffered when reading post-handshake messages, allowing a malicious QUIC connection to cause unbounded memory growth. With fix, connections now consistently reject messages larger than 65KiB in size.
[
{
"cpes": [
"cpe:2.3:a:go_standard_library:crypto_tls:*:*:*:*:*:*:*:*"
],
"vendor": "go_standard_library",
"product": "crypto_tls",
"versions": [
{
"status": "affected",
"version": "1.21.0-0",
"lessThan": "1.21.1",
"versionType": "semver"
}
],
"defaultStatus": "unknown"
}
]