logo

CVE-2025-29908 io.netty.incubator:netty-incubator-codec-quic

Package

Manager: maven
Name: io.netty.incubator:netty-incubator-codec-quic
Vulnerable Version: >=0 <0.0.71.final

Severity

Level: Medium

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N

EPSS: 0.00088 pctl0.26069

Details

Netty QUIC hash collision DoS attack An issue was discovered in the codec. A hash collision vulnerability (in the hash map used to manage connections) allows remote attackers to cause a considerable CPU load on the server (a Hash DoS attack) by initiating connections with colliding Source Connection IDs (SCIDs). See https://github.com/ncc-pbottine/QUIC-Hash-Dos-Advisory

Metadata

Created: 2025-03-31T21:47:20Z
Modified: 2025-03-31T21:47:21Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/03/GHSA-hqqc-jr88-p6x2/GHSA-hqqc-jr88-p6x2.json
CWE IDs: ["CWE-407"]
Alternative ID: GHSA-hqqc-jr88-p6x2
Finding: F067
Auto approve: 1