Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-g754-hx8w-x2g6 | quic-go HTTP/3 QPACK Header Expansion DoS |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Fri, 12 Dec 2025 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 12 Dec 2025 09:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Quic-go Project
Quic-go Project quic-go |
|
| Vendors & Products |
Quic-go Project
Quic-go Project quic-go |
Thu, 11 Dec 2025 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | quic-go is an implementation of the QUIC protocol in Go. Versions 0.56.0 and below are vulnerable to excessive memory allocation through quic-go's HTTP/3 client and server implementations by sending a QPACK-encoded HEADERS frame that decodes into a large header field section (many unique header names and/or large values). The implementation builds an http.Header (used on the http.Request and http.Response, respectively), while only enforcing limits on the size of the (QPACK-compressed) HEADERS frame, but not on the decoded header, leading to memory exhaustion. This issue is fixed in version 0.57.0. | |
| Title | quic-go HTTP/3 QPACK Header Expansion DoS | |
| Weaknesses | CWE-770 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-12-12T20:45:30.439Z
Reserved: 2025-11-10T14:07:42.920Z
Link: CVE-2025-64702
Updated: 2025-12-12T20:44:58.953Z
Status : Awaiting Analysis
Published: 2025-12-11T21:15:54.707
Modified: 2025-12-12T15:17:31.973
Link: CVE-2025-64702
No data.
OpenCVE Enrichment
Updated: 2025-12-12T08:49:09Z
Github GHSA