-
CVSS Score
-The vulnerability stemmed from using a standard HashMap with ByteBuffer keys for connection management. The hash implementation for ByteBuffer was vulnerable to collision attacks. The patch replaces this with a SipHash-protected ConnectionIdChannelMap. Runtime detection would show:
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| io.netty.incubator:netty-incubator-codec-quic | maven | < 0.0.71.Final | 0.0.71.Final |
A Semantic Attack on Google Gemini - Read the Latest Research