Advisory Database
  • Advisories
  • Dependency Scanning
  1. cargo
  2. ›
  3. quiche
  4. ›
  5. CVE-2024-1410

CVE-2024-1410: quiche vulnerable to unbounded storage of information related to connection ID retirement

March 13, 2024

Cloudflare quiche was discovered to be vulnerable to unbounded storage of information related to connection ID retirement, which could lead to excessive resource consumption. Each QUIC connection possesses a set of connection Identifiers (IDs); see RFC 9000 Section 5.1. Endpoints declare the number of active connection IDs they are willing to support using the active_connection_id_limit transport parameter. The peer can create new IDs using a NEW_CONNECTION_ID frame but must stay within the active ID limit. This is done by retirement of old IDs, the endpoint sends NEW_CONNECTION_ID includes a value in the retire_prior_to field, which elicits a RETIRE_CONNECTION_ID frame as confirmation. An unauthenticated remote attacker can exploit the vulnerability by sending NEW_CONNECTION_ID frames and manipulating the connection (e.g. by restricting the peer’s congestion window size) so that RETIRE_CONNECTION_ID frames can only be sent at a slower rate than they are received, leading to storage of information related to connection IDs in an unbounded queue.

References

  • github.com/advisories/GHSA-xhg9-xwch-vr7x
  • github.com/cloudflare/quiche
  • github.com/cloudflare/quiche/commit/0c5733a84c41e9e178adc866b11ce59ac264f5af
  • github.com/cloudflare/quiche/commit/5be8143126f8cfa8a483d4a5ae475b9a46053fa1
  • github.com/cloudflare/quiche/commit/7ab42af5f5e97f20f1d63b7ea2f9ab0536678c40
  • github.com/cloudflare/quiche/commit/a983998c4408605905ee9a6ab0fc00e68436ac67
  • github.com/cloudflare/quiche/releases/tag/0.19.2
  • github.com/cloudflare/quiche/releases/tag/0.20.1
  • github.com/cloudflare/quiche/security/advisories/GHSA-xhg9-xwch-vr7x
  • nvd.nist.gov/vuln/detail/CVE-2024-1410

Code Behaviors & Features

Detect and mitigate CVE-2024-1410 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 0.19.2, all versions starting from 0.20.0 before 0.20.1

Fixed versions

  • 0.19.2
  • 0.20.1

Solution

Upgrade to versions 0.19.2, 0.20.1 or above.

Impact 3.7 LOW

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L

Learn more about CVSS

Weakness

  • CWE-400: Uncontrolled Resource Consumption

Source file

cargo/quiche/CVE-2024-1410.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:15:36 +0000.