NULL Pointer Dereference Affecting github.com/quic-go/quic-go/internal/ackhandler package, versions >=0.50.0 <0.50.1


Severity

Recommended
0.0
high
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.04% (11th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about NULL Pointer Dereference vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-GOLANG-GITHUBCOMQUICGOQUICGOINTERNALACKHANDLER-10292486
  • published2 Jun 2025
  • disclosed2 Jun 2025
  • creditthuc98

Introduced: 2 Jun 2025

NewCVE-2025-29785  (opens in a new tab)
CWE-476  (opens in a new tab)

How to fix?

Upgrade github.com/quic-go/quic-go/internal/ackhandler to version 0.50.1 or higher.

Overview

Affected versions of this package are vulnerable to NULL Pointer Dereference via the loss recovery logic for path probe packets. An attacker can trigger a nil-pointer dereference by sending valid QUIC packets from different remote addresses, thereby initiating the path validation logic added in the v0.50.0 release which causes the server to send path probe packets, followed by sending specifically crafted ACKs for packets received from the server.

CVSS Base Scores

version 4.0
version 3.1