Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Upgrade io.netty:netty-codec-http #1335

Closed
ALRubinger opened this issue Apr 26, 2024 · 10 comments
Closed

Upgrade io.netty:netty-codec-http #1335

ALRubinger opened this issue Apr 26, 2024 · 10 comments

Comments

@ALRubinger
Copy link

Patches sec vuln.

image
@ALRubinger ALRubinger added the triage Issue needs triaging label Apr 26, 2024
@github-actions github-actions bot removed the triage Issue needs triaging label Apr 26, 2024
@alecthomas alecthomas assigned worstell and unassigned alecthomas Apr 26, 2024
@worstell
Copy link
Contributor

@ALRubinger we pull this dependency in through io.grpc:grpc-core, which it appears we're already on the latest version of. we could depend explicitly on a later version of io.netty:netty-codec-http but it seems like diverging these dependencies introduces other risks - do you have a perspective/preference here?

@ALRubinger
Copy link
Author

@worstell Yep typically in these instances I'll force an upgrade of the transitive dependency and run it through the testsuite. If ✅, I assume all is good - but of course this depends on a testsuite w/ sufficient coverage.

@ALRubinger
Copy link
Author

Note that in this instance I'd expect the risk of upgrade to be small; it's a patch update which shouldn't remove any deprecated API calls and it should be designed to be forward-compatible. Testsuites at runtime are the only way to know for sure :)

@alecthomas
Copy link
Collaborator

Can you link to the CVE for this?

@alecthomas
Copy link
Collaborator

This seems like it might be relevant issue, and the maintainers state that gRPC is not impacted.

@ALRubinger
Copy link
Author

Can you link to the CVE for this?

https://nvd.nist.gov/vuln/detail/CVE-2024-29025

@alecthomas
Copy link
Collaborator

Ah different to the one above.

@ALRubinger
Copy link
Author

Yup and I follow where you're going with this - determining if you're using any vulnerable code paths. My recommendation is to try the upgrade regardless, because any consumers of FTL are going to have their vuln scanners light up even if we legitimately "ignore" this for us. Ideally io.grpc:grpc-core would address this (you can even file an issue with them requesting it!) so that us and every other downstream consumer of it gets this fixed at the root where it was introduced.

@ALRubinger
Copy link
Author

Ha, Sonatype does threat scanning too and sent this report:

image

So ideally our fixing it up or getting the root to do it helps. We can ignore in FOSSA but it'd still flag in Sonatype :)

@worstell worstell removed their assignment May 2, 2024
@stuartwdouglas
Copy link
Collaborator

No longer relevant after the JVM rewrite.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

4 participants