Source: golang-github-lucas-clemente-quic-go
Version: 0.46.0-2
Severity: important
Tags: security upstream
Forwarded: https://github.com/quic-go/quic-go/pull/4729
X-Debbugs-Cc: car...@debian.org, Debian Security Team <t...@security.debian.org>

Hi,

The following vulnerability was published for 
golang-github-lucas-clemente-quic-go.

CVE-2024-53259[0]:
| quic-go is an implementation of the QUIC protocol in Go. An off-path
| attacker can inject an ICMP Packet Too Large packet. Since affected
| quic-go versions used IP_PMTUDISC_DO, the kernel would then return a
| "message too large" error on sendmsg, i.e. when quic-go attempts to
| send a packet that exceeds the MTU claimed in that ICMP packet. By
| setting this value to smaller than 1200 bytes (the minimum MTU for
| QUIC), the attacker can disrupt a QUIC connection. Crucially, this
| can be done after completion of the handshake, thereby circumventing
| any TCP fallback that might be implemented on the application layer
| (for example, many browsers fall back to HTTP over TCP if they're
| unable to establish a QUIC connection). The attacker needs to at
| least know the client's IP and port tuple to mount an attack. This
| vulnerability is fixed in 0.48.2.


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2024-53259
    https://www.cve.org/CVERecord?id=CVE-2024-53259
[1] https://github.com/quic-go/quic-go/security/advisories/GHSA-px8v-pp82-rcvr
[2] https://github.com/quic-go/quic-go/pull/4729
[3] 
https://github.com/quic-go/quic-go/commit/34157e6455b07723d11385212a4e1328f57f1da5

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore

Reply via email to