Netty QUIC hash collision DoS attack
Moderate severity
GitHub Reviewed
Published
Mar 31, 2025
in
netty/netty-incubator-codec-quic
•
Updated Mar 31, 2025
Package
Affected versions
< 0.0.71.Final
Patched versions
0.0.71.Final
Description
Published by the National Vulnerability Database
Mar 31, 2025
Published to the GitHub Advisory Database
Mar 31, 2025
Reviewed
Mar 31, 2025
Last updated
Mar 31, 2025
An issue was discovered in the codec. A hash collision vulnerability (in the hash map used to manage connections) allows remote attackers to cause a considerable CPU load on the server (a Hash DoS attack) by initiating connections with colliding Source Connection IDs (SCIDs).
See https://github.com/ncc-pbottine/QUIC-Hash-Dos-Advisory
References