[ 
https://issues.apache.org/jira/browse/FLUME-3363?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=17089657#comment-17089657
 ] 

Faisal Dilawar commented on FLUME-3363:
---------------------------------------

[ Bulk Quotes Now|[https://bulkquotesnow.com/]]

> CVE-2019-20445
> --------------
>
>                 Key: FLUME-3363
>                 URL: https://issues.apache.org/jira/browse/FLUME-3363
>             Project: Flume
>          Issue Type: Improvement
>          Components: Channel
>    Affects Versions: 1.9.0
>            Reporter: dlzp
>            Priority: Blocker
>              Labels: Upgrade, netty, version
>             Fix For: 2.0.0
>
>
> flume-ng-core-1.9.0 requires the Netty component, and the required version is 
> as follows:
> <dependency>
>  <groupId>io.netty</groupId>
>  <artifactId>netty</artifactId>
>  <version>3.10.6.Final</version>
> </dependency>
> I think we should upgrade Netty to its latest version: netty-4.1.45.Final. 
> The reasons are as follows:
> The CVE-2019-20445 vulnerability exists in netty-3.10.6.Final: 
> HttpObjectDecoder.java in Netty before 4.1.44 allows a Content-Length header 
> to be accompanied by a second Content-Length header, or by a 
> Transfer-Encoding header. For details see: 
> https://nvd.nist.gov/vuln/detail/CVE-2019-20445
>  



--
This message was sent by Atlassian Jira
(v8.3.4#803005)

---------------------------------------------------------------------
To unsubscribe, e-mail: issues-unsubscr...@flume.apache.org
For additional commands, e-mail: issues-h...@flume.apache.org

Reply via email to