[ 
https://issues.apache.org/jira/browse/ATLAS-4853?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Disha Talreja updated ATLAS-4853:
---------------------------------
    Fix Version/s: 2.4.0

> Upgrade Netty to 4.1.108.Final
> ------------------------------
>
>                 Key: ATLAS-4853
>                 URL: https://issues.apache.org/jira/browse/ATLAS-4853
>             Project: Atlas
>          Issue Type: Task
>          Components:  atlas-core
>            Reporter: Disha Talreja
>            Assignee: Disha Talreja
>            Priority: Major
>             Fix For: 2.4.0
>
>         Attachments: ATLAS-4853.patch
>
>
> Upgrade Netty to 4.1.108.Final
> Netty is an asynchronous event-driven network application framework for rapid 
> development of maintainable high performance protocol servers & clients. The 
> `HttpPostRequestDecoder` can be tricked to accumulate data. While the decoder 
> can store items on the disk if configured so, there are no limits to the 
> number of fields the form can have, an attacher can send a chunked post 
> consisting of many small fields that will be accumulated in the 
> `bodyListHttpData` list. The decoder cumulates bytes in the `undecodedChunk` 
> buffer until it can decode a field, this field can cumulate data without 
> limits. This vulnerability is fixed in 4.1.108.Final.
> [https://nvd.nist.gov/vuln/detail/CVE-2024-29025]
> [https://github.com/advisories/GHSA-5jpm-x58v-624v] 
> [https://ossindex.sonatype.org/vulnerability/CVE-2024-29025] 



--
This message was sent by Atlassian Jira
(v8.20.10#820010)

Reply via email to