Skip to content

[Improvement][Dependency][Security] Upgrade Netty to fix HTTP/2 DoS (CVE-2023-44487) #17952

@dill21yu

Description

@dill21yu

Search before asking

  • I had searched in the issues and found no similar feature requirement.

Description

Part of #15940
Current DolphinScheduler uses: <netty.version>4.1.53.Final</netty.version>
Netty 4.1.53.Final is affected by an HTTP/2 protocol denial-of-service vulnerability (CVE-2023-44487). To mitigate this security risk, upgrade Netty to a fixed, supported release (proposed: 4.1.100.Final).

Vulnerability
Vulnerability name: HTTP/2 protocol denial-of-service
CVE: CVE-2023-44487
Category: Denial of Service (protocol-level, HTTP/2)
Impact: A malicious or malformed HTTP/2 stream can cause excessive resource consumption or connection disruption in Netty-based HTTP/2 servers/clients.

Recommended fix
Upgrade Netty to at least a version where CVE-2023-44487 is fixed. Proposed: 4.1.100.Final.
Update the ${netty.version} property and any direct Netty dependency versions.
Run full test suite and do smoke tests for HTTP/2-related components to ensure no regressions.
Review any code that depends on Netty internals or on behavior that may have changed between 4.1.53 and 4.1.100; adjust if needed.
If the project uses shaded or bundled Netty artifacts, ensure the shading/bundling is updated too.

References
NVD: CVE-2023-44487
Netty releases: https://github.com/netty/netty/tags

Are you willing to submit a PR?

  • Yes I am willing to submit a PR!

Code of Conduct

Metadata

Metadata

Assignees

No one assigned

    Labels

    improvementmake more easy to user or prompt friendly

    Type

    No type
    No fields configured for issues without a type.

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions