Home

Description

Quicly, an IETF QUIC protocol implementation, is susceptible to a denial-of-service attack prior to commit d9d3df6a8530a102b57d840e39b0311ce5c9e14e. A remote attacker can exploit these bugs to trigger an assertion failure that crashes process using Quicly. Commit d9d3df6a8530a102b57d840e39b0311ce5c9e14e fixes the issue.

PUBLISHED Reserved 2025-09-29 | Published 2026-01-19 | Updated 2026-01-20 | Assigner GitHub_M




HIGH: 7.5CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Problem types

CWE-20: Improper Input Validation

Product status

< d9d3df6
affected

References

github.com/...quicly/security/advisories/GHSA-wr3c-345m-43v9

github.com/...ommit/d9d3df6a8530a102b57d840e39b0311ce5c9e14e

cve.org (CVE-2025-61684)

nvd.nist.gov (CVE-2025-61684)

Download JSON