My understanding is that Netty is only included for communication with
ZooKeeper and the SniHandler itself should only be used on a Netty server
(i.e. the ZooKeeper server) for an SSL connection.
So I don't believe it affects Solr beyond the netty-handler-*jar being
present.

In ZooKeeper itself, Netty was updated to 4.1.94.Final in the 3.8.2 release
https://github.com/apache/zookeeper/pull/2019

On Thu, 31 Aug 2023 at 14:56, Watermann, Rolf
<rolf.waterm...@coremedia.com.invalid> wrote:

> Hi,
>
> our trivy docker image scans on solr:9.2.1 and solr:8.11.2 reveal
> CVE-2023-34462 for netty-handler-4.1.89.Final.jar (or
> netty-handler-4.1.68.Final.jar for solr:8.11.2).
>
> https://access.redhat.com/security/cve/CVE-2023-34462
>
> "A flaw was found in Netty's SniHandler while navigating TLS handshake
> which may permit a large heap allocation if the handler did not have a
> timeout configured. This issue may allow an attacker to send a client hello
> packet which would cause the server to buffer large amounts of data per
> connection, potentially causing an out of memory error, resulting in Denial
> of Service."
>
> I checked the solr 9 workspace and executed its own dependency checks with
> "gradlew owasp".  The issue is reported here as well.  In the code I cannot
> find any netty usage at all, so I'm not sure about this dependency.
>
> https://solr.apache.org/security.html does not mention CVE-2023-34462.
> Can someone estimate the impact of this CVE on solr 9.2.1 and 8.11.2?  I
> noticed that netty-handler has been updated on the main branch meanwhile,
> but there is no release with the fix yet.  And anyway, in our production
> setups updates are not that simple, so 9.2.1 and 8.11.2 will remain for a
> another while, and the impact is still interesting for us.
>
> Thanks,
> Rolf

Reply via email to