-
Notifications
You must be signed in to change notification settings - Fork 3.8k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Upgrade io.netty:netty-codec-http2 dependency for the recent DoS vulnerability? #10617
Comments
When using grpc-netty, you are free to depend on netty 4.1.100.Final yourself, and thus upgrade to the newer version. You generally don't need to wait on us for dependency upgrades. We have done some testing against 4.1.100.Final and not seen any incompatibility. However, 4.1.100.Final doesn't fix CVE-2023-44487 by itself. You have to configure it by calling That approach is unwieldy to configure for gRPC, but may be better than nothing. Generally grpc-java server's aren't directly exposed to untrusted clients, so few probably would configure it. I'm looking to expose it on NettyServerBuilder. |
I just released 1.59.1 (it is available on Maven Central; it doesn't matter if it is indexed by search.maven.org; just try using it). It is compatible with Netty 4.1.100 (which doesn't help with the CVE for gRPC) and has a new API to limit RST frame rate (see #10675), which can do something for the CVE when it makes sense. It the same approach as in Netty, but not enabled by default. |
This volnerability can be exploited in gRPC servers (not clients) so should not directly impact the Fabric Gateway client API. However, updates to gRPC Java dependencies enables compatibility with Netty version 4.1.101.Final, which contains mitigations to this vulnerability and supports client applications that also expose gRPC services. See: - https://github.com/grpc/grpc-java/releases/tag/v1.59.1 - grpc/grpc-java#10617 Also updates dependency-check-maven to avoid use of sunset NVD data-feed. Signed-off-by: Mark S. Lewis <Mark.S.Lewis@outlook.com>
This vulnerability can be exploited in gRPC servers (not clients) so should not directly impact the Fabric Gateway client API. However, updates to gRPC Java dependencies enables compatibility with Netty version 4.1.101.Final, which contains mitigations to this vulnerability and supports client applications that also expose gRPC services. See: - https://github.com/grpc/grpc-java/releases/tag/v1.59.1 - grpc/grpc-java#10617 Also update dependency-check-maven to avoid use of sunset NVD data-feed. Signed-off-by: Mark S. Lewis <Mark.S.Lewis@outlook.com>
This vulnerability can be exploited in gRPC servers (not clients) so should not directly impact the Fabric Gateway client API. However, updates to gRPC Java dependencies enables compatibility with Netty version 4.1.101.Final, which contains mitigations to this vulnerability and supports client applications that also expose gRPC services. See: - https://github.com/grpc/grpc-java/releases/tag/v1.59.1 - grpc/grpc-java#10617 Also update dependency-check-maven to avoid use of sunset NVD data-feed. Signed-off-by: Mark S. Lewis <Mark.S.Lewis@outlook.com>
On Oct 10, 2023, there's a newly reported DoS vulnerability for
io.netty:netty-codec-http2
, which is a dependency ofio.grpc:grpc-netty
-- https://security.snyk.io/vuln/SNYK-JAVA-IONETTY-5953332The fix is to upgrade to
io.netty:netty-codec-http2
version4.1.100.Final
.However,
io.grpc:grpc-netty
seems fixed the version to4.1.97.Final
grpc-java/repositories.bzl
Line 29 in ccf9101
Also realized that the recent
1.59.0
release doesn't include this version change.What is the timeline to upgrade
io.netty:netty-codec-http2
dependency?The text was updated successfully, but these errors were encountered: