QUIC connections do not set an upper bound on the amount...
High severity
Unreviewed
Published
Sep 8, 2023
to the GitHub Advisory Database
•
Updated Dec 4, 2023
Description
Published by the National Vulnerability Database
Sep 8, 2023
Published to the GitHub Advisory Database
Sep 8, 2023
Last updated
Dec 4, 2023
QUIC connections do not set an upper bound on the amount of data buffered when reading post-handshake messages, allowing a malicious QUIC connection to cause unbounded memory growth. With fix, connections now consistently reject messages larger than 65KiB in size.
References