Nil-Pointer Dereference in quic-go QUIC Implementation by Lyft
CVE-2025-29785
What is CVE-2025-29785?
The quic-go library, a Go implementation of the QUIC protocol, contains a vulnerability that allows a malicious QUIC client to exploit the loss recovery logic for path probe packets. By sending valid QUIC packets from multiple remote addresses, the attacker can trigger the server’s path validation logic, resulting in the server sending path probe packets. Following this, the attacker can craft specifically designed ACKs for the packets received from the server, leading to a nil-pointer dereference. This vulnerability was addressed in version 0.50.1 of quic-go, which includes a patch and automated tests to ensure that the fix covers all potential edge cases. At present, there are no known workarounds available.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.
Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.
Affected Version(s)
quic-go = 0.50.0
References
CVSS V3.1
Timeline
Vulnerability published
Vulnerability Reserved
