{"id":"CVE-2023-39322","details":"QUIC connections do not set an upper bound on the amount of data buffered when reading post-handshake messages, allowing a malicious QUIC connection to cause unbounded memory growth. With fix, connections now consistently reject messages larger than 65KiB in size.","aliases":["BIT-golang-2023-39322","GO-2023-2045"],"modified":"2026-04-12T08:01:05.892875Z","published":"2023-09-08T17:15:28.120Z","related":["ALSA-2023:7762","ALSA-2023:7763","ALSA-2023:7764","ALSA-2023:7765","ALSA-2023:7766","ALSA-2024:0121","ALSA-2025:7256","CGA-38v5-7p3f-9rx3","SUSE-SU-2023:3701-1","SUSE-SU-2023:4469-1","openSUSE-SU-2023:0360-1"],"references":[{"type":"ADVISORY","url":"https://groups.google.com/g/golang-dev/c/2C5vbR-UNkI/m/L1hdrPhfBAAJ"},{"type":"ADVISORY","url":"https://pkg.go.dev/vuln/GO-2023-2045"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/202311-09"},{"type":"ADVISORY","url":"https://security.netapp.com/advisory/ntap-20231020-0004/"},{"type":"REPORT","url":"https://go.dev/issue/62266"},{"type":"FIX","url":"https://go.dev/cl/523039"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/golang/go","events":[{"introduced":"c19c4c566c63818dfd059b352e52c4710eecf14d"},{"fixed":"2c1e5b05fe39fc5e6c730dd60e82946b8e67c6ba"}],"database_specific":{"extracted_events":[{"introduced":"1.21.0"},{"fixed":"1.21.1"}],"cpe":"cpe:2.3:a:golang:go:*:*:*:*:*:*:*:*","source":"CPE_FIELD"}}],"versions":["go1.21.0"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-39322.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}]}