Quicly, an IETF QUIC protocol implementation, is susceptible to a denial-of-service attack prior to commit d9d3df6a8530a102b57d840e39b0311ce5c9e14e. A remote attacker can exploit these bugs to trigger an assertion failure that crashes process using Quicly. Commit d9d3df6a8530a102b57d840e39b0311ce5c9e14e fixes the issue.
References
Configurations
No configuration.
History
19 Jan 2026, 16:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-01-19 16:15
Updated : 2026-01-26 15:05
NVD link : CVE-2025-61684
Mitre link : CVE-2025-61684
CVE.ORG link : CVE-2025-61684
JSON object : View
Products Affected
No product.
CWE
CWE-20
Improper Input Validation
