Uncaught Exception Affecting golang-github-lucas-clemente-quic-go package, versions <0.50.1-1


Severity

Recommended
low

Based on default assessment until relevant scores are available.

Threat Intelligence

EPSS
0.05% (17th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Uncaught Exception vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-DEBIAN13-GOLANGGITHUBLUCASCLEMENTEQUICGO-10292649
  • published3 Jun 2025
  • disclosed2 Jun 2025

Introduced: 2 Jun 2025

CVE-2025-29785  (opens in a new tab)
CWE-248  (opens in a new tab)

How to fix?

Upgrade Debian:13 golang-github-lucas-clemente-quic-go to version 0.50.1-1 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream golang-github-lucas-clemente-quic-go package and not the golang-github-lucas-clemente-quic-go package as distributed by Debian. See How to fix? for Debian:13 relevant fixed versions and status.

quic-go is an implementation of the QUIC protocol in Go. The loss recovery logic for path probe packets that was added in the v0.50.0 release can be used to trigger a nil-pointer dereference by a malicious QUIC client. In order to do so, the attacker first sends valid QUIC packets from different remote addresses (thereby triggering the newly added path validation logic: the server sends path probe packets), and then sending ACKs for packets received from the server specifically crafted to trigger the nil-pointer dereference. v0.50.1 contains a patch that fixes the vulnerability. This release contains a test that generates random sequences of sent packets (both regular and path probe packets), that was used to verify that the patch actually covers all corner cases. No known workarounds are available.

CVSS Base Scores

version 3.1