Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-47m2-4cr7-mhcw | quic-go: Panic occurs when queuing undecryptable packets after handshake completion |
Tue, 21 Oct 2025 13:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Quic-go Project
Quic-go Project quic-go |
|
| Vendors & Products |
Quic-go Project
Quic-go Project quic-go |
Thu, 16 Oct 2025 00:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
| |
| Metrics |
threat_severity
|
threat_severity
|
Fri, 10 Oct 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 10 Oct 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | quic-go is an implementation of the QUIC protocol in Go. In versions prior to 0.49.0, 0.54.1, and 0.55.0, a misbehaving or malicious server can cause a denial-of-service (DoS) attack on the quic-go client by triggering an assertion failure, leading to a process crash. This requires no authentication and can be exploited during the handshake phase. This was observed in the wild with certain server implementations. quic-go needs to be able to handle misbehaving server implementations, including those that prematurely send a HANDSHAKE_DONE frame. Versions 0.49.0, 0.54.1, and 0.55.0 discard Initial keys when receiving a HANDSHAKE_DONE frame, thereby correctly handling premature HANDSHAKE_DONE frames. | |
| Title | quic-go has Client Crash Due to Premature HANDSHAKE_DONE Frame | |
| Weaknesses | CWE-617 CWE-755 |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-10-10T16:31:47.457Z
Reserved: 2025-09-17T17:04:20.373Z
Link: CVE-2025-59530
Updated: 2025-10-10T16:31:41.920Z
Status : Deferred
Published: 2025-10-10T16:15:52.387
Modified: 2026-04-15T00:35:42.020
Link: CVE-2025-59530
OpenCVE Enrichment
Updated: 2025-10-21T13:14:10Z
Github GHSA