Netty (and by extension gRPC Netty) is not affected. On Thu, Apr 11, 2024 at 1:56 PM jamesne...@gmail.com < jamesnether...@gmail.com> wrote:
> Hi, > > Given the recent news around vulnerabilities in the handling of of HTTP/2 > CONTINUATION frames: > > > https://www.linkedin.com/pulse/understanding-continuation-flood-new-http2-protocol-baek--qmcwc > > I was wondering whether the gRPC-Java Netty based server could be > affected? If so, is there any way to mitigate the problem? > > -- > James > > -- > You received this message because you are subscribed to the Google Groups " > grpc.io" group. > To unsubscribe from this group and stop receiving emails from it, send an > email to grpc-io+unsubscr...@googlegroups.com. > To view this discussion on the web visit > https://groups.google.com/d/msgid/grpc-io/28994aea-a4cb-40ef-bf1a-2b7376541658n%40googlegroups.com > <https://groups.google.com/d/msgid/grpc-io/28994aea-a4cb-40ef-bf1a-2b7376541658n%40googlegroups.com?utm_medium=email&utm_source=footer> > . > -- You received this message because you are subscribed to the Google Groups "grpc.io" group. To unsubscribe from this group and stop receiving emails from it, send an email to grpc-io+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/grpc-io/CA%2B4M1oPsQ6WUfiG3cT7Nv9s7SzBdOJ0h%3D96gJum%3D6-ct15brcw%40mail.gmail.com.
smime.p7s
Description: S/MIME Cryptographic Signature