Advisory Database
  • Advisories
  • Dependency Scanning
  1. golang
  2. ›
  3. github.com/quic-go/quic-go
  4. ›
  5. CVE-2025-64702

CVE-2025-64702: quic-go HTTP/3 QPACK Header Expansion DoS

December 11, 2025 (updated December 17, 2025)

An attacker can cause excessive memory allocation in quic-go’s HTTP/3 client and server implementations by sending a QPACK-encoded HEADERS frame that decodes into a large header field section (many unique header names and/or large values). The implementation builds an http.Header (used on the http.Request and http.Response, respectively), while only enforcing limits on the size of the (QPACK-compressed) HEADERS frame, but not on the decoded header, leading to memory exhaustion.

References

  • github.com/advisories/GHSA-g754-hx8w-x2g6
  • github.com/quic-go/quic-go
  • github.com/quic-go/quic-go/commit/5b2d2129f8315da41e01eff0a847ab38a34e83a8
  • github.com/quic-go/quic-go/security/advisories/GHSA-g754-hx8w-x2g6
  • nvd.nist.gov/vuln/detail/CVE-2025-64702

Code Behaviors & Features

Detect and mitigate CVE-2025-64702 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 0.57.0

Fixed versions

  • 0.57.0

Solution

Upgrade to version 0.57.0 or above.

Impact 5.3 MEDIUM

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L

Learn more about CVSS

Weakness

  • CWE-770: Allocation of Resources Without Limits or Throttling

Source file

go/github.com/quic-go/quic-go/CVE-2025-64702.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Tue, 20 Jan 2026 00:18:25 +0000.