Description

ngtcp2 is a C implementation of the IETF QUIC protocol. In versions prior to 1.22.1, ngtcp2_qlog_parameters_set_transport_params() serializes peer transport parameters into a fixed 1024-byte stack buffer without bounds checking. When qlog is enabled, a remote peer can send sufficiently large transport parameters during the QUIC handshake to cause writes beyond the buffer boundary, resulting in a stack buffer overflow. This affects deployments that enable the qlog callback and process untrusted peer transport parameters. This issue has been fixed in version 1.22.1. If developers are unable to immediately upgrade, they can disable the qlog on client.

INFO

Published Date :

2026-04-16T21:34:07.610Z

Last Modified :

2026-04-16T21:34:07.610Z

Source :

GitHub_M
AFFECTED PRODUCTS

The following products are affected by CVE-2026-40170 vulnerability.

Vendors Products
Ngtcp2
  • Ngtcp2
REFERENCES

Here, you will find a curated list of external links that provide in-depth information to CVE-2026-40170.

CVSS Vulnerability Scoring System

Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact