CVE-2022-30591

NameCVE-2022-30591
Descriptionquic-go through 0.27.0 allows remote attackers to cause a denial of service (CPU consumption) via a Slowloris variant in which incomplete QUIC or HTTP/3 requests are sent. This occurs because mtu_discoverer.go misparses the MTU Discovery service and consequently overflows the probe timer. NOTE: the vendor's position is that this behavior should not be listed as a vulnerability on the CVE List
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
golang-github-lucas-clemente-quic-go (PTS)bullseye0.19.3-1vulnerable
bookworm0.29.0-1vulnerable
sid, trixie0.46.0-2vulnerable

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
golang-github-lucas-clemente-quic-gosource(unstable)(unfixed)unimportant

Notes

Not considered a vulnerability by the vendor

Search for package or bug name: Reporting problems