CVE-2022-30591

Source
https://cve.org/CVERecord?id=CVE-2022-30591
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-30591.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-30591
Downstream
Published
2022-07-06T12:15:08.173Z
Modified
2026-03-13T05:48:45.764899Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
[none]
Details

quic-go through 0.27.0 allows remote attackers to cause a denial of service (CPU consumption) via a Slowloris variant in which incomplete QUIC or HTTP/3 requests are sent. This occurs because mtu_discoverer.go misparses the MTU Discovery service and consequently overflows the probe timer. NOTE: the vendor's position is that this behavior should not be listed as a vulnerability on the CVE List

References

Affected packages

Git / github.com/lucas-clemente/quic-go

Affected ranges

Type
GIT
Repo
https://github.com/lucas-clemente/quic-go
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected
Database specific
{
    "versions": [
        {
            "introduced": "0"
        },
        {
            "last_affected": "0.27.0"
        }
    ]
}

Affected versions

v.*
v.0.21
v0.*
v0.21.0
v0.21.1
v0.22.0
v0.23.0
v0.24.0
v0.25.0
v0.26.0
v0.27.0
v0.4
v0.5.0
v0.6.0
v0.7.0

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-30591.json"