CVE-2025-29908: Netty QUIC hash collision DoS attack
An issue was discovered in the codec. A hash collision vulnerability (in the hash map used to manage connections) allows remote attackers to cause a considerable CPU load on the server (a Hash DoS attack) by initiating connections with colliding Source Connection IDs (SCIDs).
See https://github.com/ncc-pbottine/QUIC-Hash-Dos-Advisory
References
- github.com/advisories/GHSA-hqqc-jr88-p6x2
- github.com/ncc-pbottine/QUIC-Hash-Dos-Advisory
- github.com/netty/netty-incubator-codec-quic
- github.com/netty/netty-incubator-codec-quic/commit/e059bd9b78723f8b035e0c547e42ce263f03461c
- github.com/netty/netty-incubator-codec-quic/security/advisories/GHSA-hqqc-jr88-p6x2
- nvd.nist.gov/vuln/detail/CVE-2025-29908
Code Behaviors & Features
Detect and mitigate CVE-2025-29908 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →