Quicly, an IETF QUIC protocol implementation, is susceptible to a denial-of-service attack prior to commit d9d3df6a8530a102b57d840e39b0311ce5c9e14e. A remote attacker can exploit these bugs to trigger an assertion failure that crashes process using Quicly. Commit d9d3df6a8530a102b57d840e39b0311ce5c9e14e fixes the issue.
References
| Link | Resource |
|---|---|
| https://github.com/h2o/quicly/commit/d9d3df6a8530a102b57d840e39b0311ce5c9e14e | Patch |
| https://github.com/h2o/quicly/security/advisories/GHSA-wr3c-345m-43v9 | Vendor Advisory |
Configurations
History
27 Feb 2026, 19:41
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:h2o:quicly:*:*:*:*:*:*:*:* | |
| References | () https://github.com/h2o/quicly/commit/d9d3df6a8530a102b57d840e39b0311ce5c9e14e - Patch | |
| References | () https://github.com/h2o/quicly/security/advisories/GHSA-wr3c-345m-43v9 - Vendor Advisory | |
| CWE | CWE-617 | |
| First Time |
H2o quicly
H2o |
19 Jan 2026, 16:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-01-19 16:15
Updated : 2026-02-27 19:41
NVD link : CVE-2025-61684
Mitre link : CVE-2025-61684
CVE.ORG link : CVE-2025-61684
JSON object : View
Products Affected
h2o
- quicly
