[ https://issues.apache.org/jira/browse/FLUME-3363?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=17089657#comment-17089657 ]
Faisal Dilawar commented on FLUME-3363: --------------------------------------- [ Bulk Quotes Now|[https://bulkquotesnow.com/]] > CVE-2019-20445 > -------------- > > Key: FLUME-3363 > URL: https://issues.apache.org/jira/browse/FLUME-3363 > Project: Flume > Issue Type: Improvement > Components: Channel > Affects Versions: 1.9.0 > Reporter: dlzp > Priority: Blocker > Labels: Upgrade, netty, version > Fix For: 2.0.0 > > > flume-ng-core-1.9.0 requires the Netty component, and the required version is > as follows: > <dependency> > <groupId>io.netty</groupId> > <artifactId>netty</artifactId> > <version>3.10.6.Final</version> > </dependency> > I think we should upgrade Netty to its latest version: netty-4.1.45.Final. > The reasons are as follows: > The CVE-2019-20445 vulnerability exists in netty-3.10.6.Final: > HttpObjectDecoder.java in Netty before 4.1.44 allows a Content-Length header > to be accompanied by a second Content-Length header, or by a > Transfer-Encoding header. For details see: > https://nvd.nist.gov/vuln/detail/CVE-2019-20445 > -- This message was sent by Atlassian Jira (v8.3.4#803005) --------------------------------------------------------------------- To unsubscribe, e-mail: issues-unsubscr...@flume.apache.org For additional commands, e-mail: issues-h...@flume.apache.org