Quicly, an IETF QUIC protocol implementation, is susceptible to a denial-of-service attack prior to commit d9d3df6a8530a102b57d840e39b0311ce5c9e14e. A remote attacker can exploit these bugs to trigger an assertion failure that crashes process using Quicly. Commit d9d3df6a8530a102b57d840e39b0311ce5c9e14e fixes the issue.
{
"cna_assigner": "GitHub_M",
"cwe_ids": [
"CWE-20"
],
"osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/61xxx/CVE-2025-61684.json"
}"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-61684.json"
[
{
"signature_version": "v1",
"deprecated": false,
"digest": {
"length": 1435.0,
"function_hash": "330447917234780715116884208818365419057"
},
"signature_type": "Function",
"id": "CVE-2025-61684-2d5cd368",
"source": "https://github.com/h2o/quicly/commit/d9d3df6a8530a102b57d840e39b0311ce5c9e14e",
"target": {
"function": "test_downstream",
"file": "t/lossy.c"
}
},
{
"signature_version": "v1",
"deprecated": false,
"digest": {
"line_hashes": [
"29778764246675025856098287081834208603",
"100556119729017067749899313415801560323",
"309327536604343248030770973674050488051",
"54418473788405938332397646685727076168",
"171735076972988658971545600294582869474",
"33795088715017983417874223491481568343",
"231906130147037159758969149546923583390",
"308686423491702292545260722868580531111",
"241648440781633153404342609770655118268",
"105622321042226638393878150047624306823",
"155273014357286839408684094503056897596",
"288173772266509228024676830257721562994",
"31299942521313456959458018990298007684",
"314754947702479338109659742408044644131",
"62085115535628162648245723803311997085",
"58890052678731420123464246477292725518",
"214521790195536418809799172346847870416",
"114806600391115879909008303043282378963"
],
"threshold": 0.9
},
"signature_type": "Line",
"id": "CVE-2025-61684-4db8ab0c",
"source": "https://github.com/h2o/quicly/commit/d9d3df6a8530a102b57d840e39b0311ce5c9e14e",
"target": {
"file": "t/lossy.c"
}
},
{
"signature_version": "v1",
"deprecated": false,
"digest": {
"length": 1688.0,
"function_hash": "170338641696832950255584837203458839758"
},
"signature_type": "Function",
"id": "CVE-2025-61684-7e6b68fb",
"source": "https://github.com/h2o/quicly/commit/d9d3df6a8530a102b57d840e39b0311ce5c9e14e",
"target": {
"function": "test_bidirectional",
"file": "t/lossy.c"
}
}
]