UBUNTU-CVE-2025-59530

Source
https://ubuntu.com/security/CVE-2025-59530
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2025/UBUNTU-CVE-2025-59530.json
JSON Data
https://api.test.osv.dev/v1/vulns/UBUNTU-CVE-2025-59530
Upstream
Published
2025-10-10T16:15:00Z
Modified
2025-10-15T17:21:40Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
  • Ubuntu - medium
Summary
[none]
Details

quic-go is an implementation of the QUIC protocol in Go. In versions prior to 0.49.0, 0.54.1, and 0.55.0, a misbehaving or malicious server can cause a denial-of-service (DoS) attack on the quic-go client by triggering an assertion failure, leading to a process crash. This requires no authentication and can be exploited during the handshake phase. This was observed in the wild with certain server implementations. quic-go needs to be able to handle misbehaving server implementations, including those that prematurely send a HANDSHAKEDONE frame. Versions 0.49.0, 0.54.1, and 0.55.0 discard Initial keys when receiving a HANDSHAKEDONE frame, thereby correctly handling premature HANDSHAKE_DONE frames.

References

Affected packages

Ubuntu:22.04:LTS

golang-github-lucas-clemente-quic-go

Package

Name
golang-github-lucas-clemente-quic-go
Purl
pkg:deb/ubuntu/golang-github-lucas-clemente-quic-go@0.25.0-1?arch=source&distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

0.*

0.18.0-3
0.24.0-1
0.25.0-1

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "0.25.0-1",
            "binary_name": "golang-github-lucas-clemente-quic-go-dev"
        }
    ]
}

Database specific

source

"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2025/UBUNTU-CVE-2025-59530.json"

Ubuntu:24.04:LTS

golang-github-lucas-clemente-quic-go

Package

Name
golang-github-lucas-clemente-quic-go
Purl
pkg:deb/ubuntu/golang-github-lucas-clemente-quic-go@0.38.2-1?arch=source&distro=noble

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

0.*

0.37.4-1
0.38.2-1

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "0.38.2-1",
            "binary_name": "golang-github-lucas-clemente-quic-go-dev"
        }
    ]
}

Database specific

source

"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2025/UBUNTU-CVE-2025-59530.json"

Ubuntu:25.04

golang-github-lucas-clemente-quic-go

Package

Name
golang-github-lucas-clemente-quic-go
Purl
pkg:deb/ubuntu/golang-github-lucas-clemente-quic-go@0.50.0-1?arch=source&distro=plucky

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

0.*

0.46.0-2
0.50.0-1

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "0.50.0-1",
            "binary_name": "golang-github-lucas-clemente-quic-go-dev"
        }
    ]
}

Database specific

source

"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2025/UBUNTU-CVE-2025-59530.json"

Ubuntu:25.10

golang-github-lucas-clemente-quic-go

Package

Name
golang-github-lucas-clemente-quic-go
Purl
pkg:deb/ubuntu/golang-github-lucas-clemente-quic-go@0.50.1-2?arch=source&distro=questing

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

0.*

0.50.0-1
0.50.1-2

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "0.50.1-2",
            "binary_name": "golang-github-lucas-clemente-quic-go-dev"
        }
    ]
}

Database specific

source

"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2025/UBUNTU-CVE-2025-59530.json"